Expand description
Structs§
- Ever
Crypt_ AEAD_ state_ s - Ever
Crypt_ Hash_ Incremental_ hash_ state_ s - Ever
Crypt_ Hash_ state_ s_ s - Hacl_
Bignum_ Mont Arithmetic_ bn_ mont_ ctx_ u64_ s - Hacl_
HMAC_ DRBG_ state_ s - Hacl_
Streaming_ Keccak_ hash_ buf_ s - Hacl_
Streaming_ Keccak_ state_ s - Hacl_
Streaming_ MD_ state_ 32_ s - Hacl_
Streaming_ MD_ state_ 64_ s
Constants§
- Ever
Crypt_ Error_ Authentication Failure - Ever
Crypt_ Error_ Decode Error - Ever
Crypt_ Error_ InvalidIV Length - Ever
Crypt_ Error_ Invalid Key - Ever
Crypt_ Error_ Maximum Length Exceeded - Ever
Crypt_ Error_ Success - Ever
Crypt_ Error_ Unsupported Algorithm - Spec_
Agile_ AEAD_ AES128_ CCM - Spec_
Agile_ AEAD_ AES128_ CCM8 - Spec_
Agile_ AEAD_ AES128_ GCM - Spec_
Agile_ AEAD_ AES256_ CCM - Spec_
Agile_ AEAD_ AES256_ CCM8 - Spec_
Agile_ AEAD_ AES256_ GCM - Spec_
Agile_ AEAD_ CHACH A20_ POLY1305 - Spec_
FFDHE_ FFDH E2048 - Spec_
FFDHE_ FFDH E3072 - Spec_
FFDHE_ FFDH E4096 - Spec_
FFDHE_ FFDH E6144 - Spec_
FFDHE_ FFDH E8192 - Spec_
Hash_ Definitions_ Blake2B - Spec_
Hash_ Definitions_ Blake2S - Spec_
Hash_ Definitions_ MD5 - Spec_
Hash_ Definitions_ SHA1 - Spec_
Hash_ Definitions_ SHA2_ 224 - Spec_
Hash_ Definitions_ SHA2_ 256 - Spec_
Hash_ Definitions_ SHA2_ 384 - Spec_
Hash_ Definitions_ SHA2_ 512 - Spec_
Hash_ Definitions_ SHA3_ 224 - Spec_
Hash_ Definitions_ SHA3_ 256 - Spec_
Hash_ Definitions_ SHA3_ 384 - Spec_
Hash_ Definitions_ SHA3_ 512 - Spec_
Hash_ Definitions_ Shake128 - Spec_
Hash_ Definitions_ Shake256
Functions§
- Ever
Crypt_ ⚠AEAD_ alg_ of_ state - Return the algorithm used in the AEAD state.
- Ever
Crypt_ ⚠AEAD_ create_ in - Create the required AEAD state for the algorithm.
- Ever
Crypt_ ⚠AEAD_ decrypt - Verify the authenticity of
ad||cipherand decryptcipherintodst. - Ever
Crypt_ ⚠AEAD_ decrypt_ expand - Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes128_ gcm - Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes128_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes256_ gcm - Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes256_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ chacha20_ poly1305 - Ever
Crypt_ ⚠AEAD_ encrypt - Encrypt and authenticate a message (
plain) with associated data (ad). - Ever
Crypt_ ⚠AEAD_ encrypt_ expand - Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes128_ gcm - Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes128_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes256_ gcm - Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes256_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ chacha20_ poly1305 - Ever
Crypt_ ⚠AEAD_ free - Cleanup and free the AEAD state.
- Ever
Crypt_ ⚠AEAD_ uu___ is_ Ek - Ever
Crypt_ ⚠Auto Config2_ disable_ adx - Ever
Crypt_ ⚠Auto Config2_ disable_ aesni - Ever
Crypt_ ⚠Auto Config2_ disable_ avx - Ever
Crypt_ ⚠Auto Config2_ disable_ avx2 - Ever
Crypt_ ⚠Auto Config2_ disable_ avx512 - Ever
Crypt_ ⚠Auto Config2_ disable_ bmi2 - Ever
Crypt_ ⚠Auto Config2_ disable_ movbe - Ever
Crypt_ ⚠Auto Config2_ disable_ pclmulqdq - Ever
Crypt_ ⚠Auto Config2_ disable_ rdrand - Ever
Crypt_ ⚠Auto Config2_ disable_ shaext - Ever
Crypt_ ⚠Auto Config2_ disable_ sse - Ever
Crypt_ ⚠Auto Config2_ has_ adx - Ever
Crypt_ ⚠Auto Config2_ has_ aesni - Ever
Crypt_ ⚠Auto Config2_ has_ avx - Ever
Crypt_ ⚠Auto Config2_ has_ avx2 - Ever
Crypt_ ⚠Auto Config2_ has_ avx512 - Ever
Crypt_ ⚠Auto Config2_ has_ bmi2 - Ever
Crypt_ ⚠Auto Config2_ has_ movbe - Ever
Crypt_ ⚠Auto Config2_ has_ pclmulqdq - Ever
Crypt_ ⚠Auto Config2_ has_ rdrand - Ever
Crypt_ ⚠Auto Config2_ has_ shaext - Ever
Crypt_ ⚠Auto Config2_ has_ sse - Ever
Crypt_ ⚠Auto Config2_ has_ vec128 - Ever
Crypt_ ⚠Auto Config2_ has_ vec256 - Ever
Crypt_ ⚠Auto Config2_ init - Ever
Crypt_ ⚠Auto Config2_ recall - Ever
Crypt_ ⚠Curve25519_ ecdh - Execute the diffie-hellmann key exchange.
- Ever
Crypt_ ⚠Curve25519_ scalarmult - Compute the scalar multiple of a point.
- Ever
Crypt_ ⚠Curve25519_ secret_ to_ public - Calculate a public point from a secret/private key.
- Ever
Crypt_ ⚠Ed25519_ expand_ keys - Ever
Crypt_ ⚠Ed25519_ secret_ to_ public - Ever
Crypt_ ⚠Ed25519_ sign - Ever
Crypt_ ⚠Ed25519_ sign_ expanded - Ever
Crypt_ ⚠Ed25519_ verify - Ever
Crypt_ ⚠HKDF_ expand - Expand pseudorandom key to desired length.
- Ever
Crypt_ ⚠HKDF_ extract - Extract a fixed-length pseudorandom key from input keying material.
- Ever
Crypt_ ⚠HMAC_ compute - Ever
Crypt_ ⚠HMAC_ is_ supported_ alg - Ever
Crypt_ ⚠Hash_ Incremental_ alg_ of_ state - Perform a run-time test to determine which algorithm was chosen for the given piece of state.
- Ever
Crypt_ ⚠Hash_ Incremental_ create_ in - Allocate initial state for the agile hash. The argument
astands for the choice of algorithm (see Hacl_Spec.h). This API will automatically pick the most efficient implementation, provided you have called EverCrypt_AutoConfig2_init() before. The state is to be freed by callingfree. - Ever
Crypt_ ⚠Hash_ Incremental_ finish - Write the resulting hash into
dst, an array whose length is algorithm-specific. You can use the macros defined earlier in this file to allocate a destination buffer of the right length. The state remains valid after a call tofinish, meaning the user may feed more data into the hash viaupdate. (The finish function operates on an internal copy of the state and therefore does not invalidate the client-held state.) - Ever
Crypt_ ⚠Hash_ Incremental_ free - Free a state previously allocated with
create_in. - Ever
Crypt_ ⚠Hash_ Incremental_ hash - Hash
input, of lenlen, intodst, an array whose length is determined by your choice of algorithma(see Hacl_Spec.h). You can use the macros defined earlier in this file to allocate a destination buffer of the right length. This API will automatically pick the most efficient implementation, provided you have called EverCrypt_AutoConfig2_init() before. - Ever
Crypt_ ⚠Hash_ Incremental_ hash_ len - Ever
Crypt_ ⚠Hash_ Incremental_ init - Reset an existing state to the initial hash state with empty data.
- Ever
Crypt_ ⚠Hash_ Incremental_ update - Feed an arbitrary amount of data into the hash. This function returns
EverCrypt_Error_Success for success, or EverCrypt_Error_MaximumLengthExceeded if
the combined length of all of the data passed to
update(since the last call toinit) exceeds 2^61-1 bytes or 2^64-1 bytes, depending on the choice of algorithm. Both limits are unlikely to be attained in practice. - Hacl_
Bignum64_ ⚠add - Write
a + b mod 2 ^ (64 * len)inres. - Hacl_
Bignum64_ ⚠add_ mod - Write
(a + b) mod ninres. - Hacl_
Bignum64_ ⚠bn_ to_ bytes_ be - Serialize a bignum into big-endian memory.
- Hacl_
Bignum64_ ⚠bn_ to_ bytes_ le - Serialize a bignum into little-endian memory.
- Hacl_
Bignum64_ ⚠eq_ mask - Returns 2^64 - 1 if a = b, otherwise returns 0.
- Hacl_
Bignum64_ ⚠lt_ mask - Returns 2^64 - 1 if a < b, otherwise returns 0.
- Hacl_
Bignum64_ ⚠mod - Write
a mod ninres. - Hacl_
Bignum64_ ⚠mod_ exp_ consttime - Write
a ^ b mod ninres. - Hacl_
Bignum64_ ⚠mod_ exp_ consttime_ precomp - Write
a ^ b mod ninres. - Hacl_
Bignum64_ ⚠mod_ exp_ vartime - Write
a ^ b mod ninres. - Hacl_
Bignum64_ ⚠mod_ exp_ vartime_ precomp - Write
a ^ b mod ninres. - Hacl_
Bignum64_ ⚠mod_ inv_ prime_ vartime - Write
a ^ (-1) mod ninres. - Hacl_
Bignum64_ ⚠mod_ inv_ prime_ vartime_ precomp - Write
a ^ (-1) mod ninres. - Hacl_
Bignum64_ ⚠mod_ precomp - Write
a mod ninres. - Hacl_
Bignum64_ ⚠mont_ ctx_ free - Deallocate the memory previously allocated by Hacl_Bignum64_mont_ctx_init.
- Hacl_
Bignum64_ ⚠mont_ ctx_ init - Heap-allocate and initialize a montgomery context.
- Hacl_
Bignum64_ ⚠mul - Write
a * binres. - Hacl_
Bignum64_ ⚠new_ bn_ from_ bytes_ be - Load a bid-endian bignum from memory.
- Hacl_
Bignum64_ ⚠new_ bn_ from_ bytes_ le - Load a little-endian bignum from memory.
- Hacl_
Bignum64_ ⚠sqr - Write
a * ainres. - Hacl_
Bignum64_ ⚠sub - Write
a - b mod 2 ^ (64 * len)inres. - Hacl_
Bignum64_ ⚠sub_ mod - Write
(a - b) mod ninres. - Hacl_
Blake2b_ ⚠32_ blake2b - Write the BLAKE2b digest of message
dusing keykintooutput. - Hacl_
Blake2b_ ⚠32_ blake2b_ finish - Hacl_
Blake2b_ ⚠32_ blake2b_ init - Hacl_
Blake2b_ ⚠32_ blake2b_ malloc - Hacl_
Blake2b_ ⚠32_ blake2b_ update_ key - Hacl_
Blake2b_ ⚠256_ blake2b - Write the BLAKE2b digest of message
dusing keykintooutput. - Hacl_
Blake2b_ ⚠256_ blake2b_ finish - Hacl_
Blake2b_ ⚠256_ blake2b_ init - Hacl_
Blake2b_ ⚠256_ blake2b_ malloc - Hacl_
Blake2b_ ⚠256_ blake2b_ update_ key - Hacl_
Blake2b_ ⚠256_ load_ state256b_ from_ state32 - Hacl_
Blake2b_ ⚠256_ store_ state256b_ to_ state32 - Hacl_
Blake2s_ ⚠32_ blake2s - Write the BLAKE2s digest of message
dusing keykintooutput. - Hacl_
Blake2s_ ⚠32_ blake2s_ finish - Hacl_
Blake2s_ ⚠32_ blake2s_ init - Hacl_
Blake2s_ ⚠32_ blake2s_ malloc - Hacl_
Blake2s_ ⚠32_ blake2s_ update_ key - Hacl_
Blake2s_ ⚠32_ blake2s_ update_ last - Hacl_
Blake2s_ ⚠32_ blake2s_ update_ multi - Hacl_
Blake2s_ ⚠128_ blake2s - Write the BLAKE2s digest of message
dusing keykintooutput. - Hacl_
Blake2s_ ⚠128_ blake2s_ finish - Hacl_
Blake2s_ ⚠128_ blake2s_ init - Hacl_
Blake2s_ ⚠128_ blake2s_ malloc - Hacl_
Blake2s_ ⚠128_ blake2s_ update_ key - Hacl_
Blake2s_ ⚠128_ blake2s_ update_ last - Hacl_
Blake2s_ ⚠128_ blake2s_ update_ multi - Hacl_
Blake2s_ ⚠128_ load_ state128s_ from_ state32 - Hacl_
Blake2s_ ⚠128_ store_ state128s_ to_ state32 - Hacl_
Chacha20 ⚠Poly1305_ 32_ aead_ decrypt - Decrypt a ciphertext
cipherwith keyk. - Hacl_
Chacha20 ⚠Poly1305_ 32_ aead_ encrypt - Encrypt a message
mwith keyk. - Hacl_
Chacha20 ⚠Poly1305_ 128_ aead_ decrypt - Decrypt a ciphertext
cipherwith keyk. - Hacl_
Chacha20 ⚠Poly1305_ 128_ aead_ encrypt - Encrypt a message
mwith keyk. - Hacl_
Chacha20 ⚠Poly1305_ 256_ aead_ decrypt - Decrypt a ciphertext
cipherwith keyk. - Hacl_
Chacha20 ⚠Poly1305_ 256_ aead_ encrypt - Encrypt a message
mwith keyk. - Hacl_
Curve25519_ ⚠51_ ecdh - Execute the diffie-hellmann key exchange.
- Hacl_
Curve25519_ ⚠51_ scalarmult - Compute the scalar multiple of a point.
- Hacl_
Curve25519_ ⚠51_ secret_ to_ public - Calculate a public point from a secret/private key.
- Hacl_
Curve25519_ ⚠64_ ecdh - Execute the diffie-hellmann key exchange.
- Hacl_
Curve25519_ ⚠64_ scalarmult - Compute the scalar multiple of a point.
- Hacl_
Curve25519_ ⚠64_ secret_ to_ public - Calculate a public point from a secret/private key.
- Hacl_
Ed25519_ ⚠expand_ keys - Compute the expanded keys for an Ed25519 signature.
- Hacl_
Ed25519_ ⚠secret_ to_ public - Compute the public key from the private key.
- Hacl_
Ed25519_ ⚠sign - Create an Ed25519 signature.
- Hacl_
Ed25519_ ⚠sign_ expanded - Create an Ed25519 signature with the (precomputed) expanded keys.
- Hacl_
Ed25519_ ⚠verify - Verify an Ed25519 signature.
- Hacl_
HKDF_ ⚠expand_ blake2b_ 32 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ blake2s_ 32 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ sha2_ 256 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ sha2_ 384 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ sha2_ 512 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠extract_ blake2b_ 32 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ blake2s_ 32 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ sha2_ 256 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ sha2_ 384 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ sha2_ 512 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HMAC_ ⚠DRBG_ create_ in - Create a DRBG state.
- Hacl_
HMAC_ ⚠DRBG_ free - Hacl_
HMAC_ ⚠DRBG_ generate - Generate output.
- Hacl_
HMAC_ ⚠DRBG_ instantiate - Instantiate the DRBG.
- Hacl_
HMAC_ ⚠DRBG_ min_ length - Return the minimal entropy input length of the desired hash function.
- Hacl_
HMAC_ ⚠DRBG_ reseed - Reseed the DRBG.
- Hacl_
HMAC_ ⚠DRBG_ uu___ is_ State - Hacl_
HMAC_ ⚠compute_ blake2b_ 32 - Write the HMAC-BLAKE2b MAC of a message (
data) by using a key (key) intodst. - Hacl_
HMAC_ ⚠compute_ blake2s_ 32 - Write the HMAC-BLAKE2s MAC of a message (
data) by using a key (key) intodst. - Hacl_
HMAC_ ⚠compute_ sha2_ 256 - Write the HMAC-SHA-2-256 MAC of a message (
data) by using a key (key) intodst. - Hacl_
HMAC_ ⚠compute_ sha2_ 384 - Write the HMAC-SHA-2-384 MAC of a message (
data) by using a key (key) intodst. - Hacl_
HMAC_ ⚠compute_ sha2_ 512 - Write the HMAC-SHA-2-512 MAC of a message (
data) by using a key (key) intodst. - Hacl_
HMAC_ ⚠legacy_ compute_ sha1 - Write the HMAC-SHA-1 MAC of a message (
data) by using a key (key) intodst. - Hacl_
P256_ ⚠compressed_ to_ raw - Convert a public key from compressed to its raw form.
- Hacl_
P256_ ⚠dh_ initiator - Compute the public key from the private key.
- Hacl_
P256_ ⚠dh_ responder - Execute the diffie-hellmann key exchange.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ sha2 - Create an ECDSA signature using SHA2-256.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ sha384 - Create an ECDSA signature using SHA2-384.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ sha512 - Create an ECDSA signature using SHA2-512.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ without_ hash - Create an ECDSA signature WITHOUT hashing first.
- Hacl_
P256_ ⚠ecdsa_ verif_ p256_ sha2 - Verify an ECDSA signature using SHA2-256.
- Hacl_
P256_ ⚠ecdsa_ verif_ p256_ sha384 - Verify an ECDSA signature using SHA2-384.
- Hacl_
P256_ ⚠ecdsa_ verif_ p256_ sha512 - Verify an ECDSA signature using SHA2-512.
- Hacl_
P256_ ⚠ecdsa_ verif_ without_ hash - Verify an ECDSA signature WITHOUT hashing first.
- Hacl_
P256_ ⚠raw_ to_ compressed - Convert a public key from raw to its compressed form.
- Hacl_
P256_ ⚠raw_ to_ uncompressed - Convert a public key from raw to its uncompressed form.
- Hacl_
P256_ ⚠uncompressed_ to_ raw - Convert a public key from uncompressed to its raw form.
- Hacl_
P256_ ⚠validate_ private_ key - Private key validation.
- Hacl_
P256_ ⚠validate_ public_ key - Public key validation.
- Hacl_
RSAPSS_ ⚠mgf_ hash - The mask generation function defined in the Public Key Cryptography Standard #1 (https://www.ietf.org/rfc/rfc2437.txt Section 10.2.1)
- Hacl_
RSAPSS_ ⚠new_ rsapss_ load_ pkey - Load a public key from key parts.
- Hacl_
RSAPSS_ ⚠new_ rsapss_ load_ skey - Load a secret key from key parts.
- Hacl_
RSAPSS_ ⚠rsapss_ pkey_ verify - Verify the signature
sgntof a messagemsg. - Hacl_
RSAPSS_ ⚠rsapss_ sign - Sign a message
msgand write the signature tosgnt. - Hacl_
RSAPSS_ ⚠rsapss_ skey_ sign - Sign a message
msgand write the signature tosgnt. - Hacl_
RSAPSS_ ⚠rsapss_ verify - Verify the signature
sgntof a messagemsg. - Hacl_
SHA3_ ⚠sha3_ 224 - Hacl_
SHA3_ ⚠sha3_ 256 - Hacl_
SHA3_ ⚠sha3_ 384 - Hacl_
SHA3_ ⚠sha3_ 512 - Hacl_
SHA3_ ⚠shake128_ hacl - Hacl_
SHA3_ ⚠shake256_ hacl - Hacl_
Streaming_ ⚠Keccak_ block_ len - Hacl_
Streaming_ ⚠Keccak_ copy - Hacl_
Streaming_ ⚠Keccak_ finish - Hacl_
Streaming_ ⚠Keccak_ free - Hacl_
Streaming_ ⚠Keccak_ get_ alg - Hacl_
Streaming_ ⚠Keccak_ hash_ len - Hacl_
Streaming_ ⚠Keccak_ is_ shake - Hacl_
Streaming_ ⚠Keccak_ malloc - Hacl_
Streaming_ ⚠Keccak_ reset - Hacl_
Streaming_ ⚠Keccak_ squeeze - Hacl_
Streaming_ ⚠Keccak_ update - Hacl_
Streaming_ ⚠SHA2_ copy_ 256 - Copies the state passed as argument into a newly allocated state (deep copy).
The state is to be freed by calling
free_256. Cloning the state this way is useful, for instance, if your control-flow diverges and you need to feed more (different) data into the hash in each branch. - Hacl_
Streaming_ ⚠SHA2_ copy_ 512 - Copies the state passed as argument into a newly allocated state (deep copy).
The state is to be freed by calling
free_512. Cloning the state this way is useful, for instance, if your control-flow diverges and you need to feed more (different) data into the hash in each branch. - Hacl_
Streaming_ ⚠SHA2_ create_ in_ 224 - Hacl_
Streaming_ ⚠SHA2_ create_ in_ 256 - Allocate initial state for the SHA2_256 hash. The state is to be freed by
calling
free_256. - Hacl_
Streaming_ ⚠SHA2_ create_ in_ 384 - Hacl_
Streaming_ ⚠SHA2_ create_ in_ 512 - Hacl_
Streaming_ ⚠SHA2_ finish_ 224 - Write the resulting hash into
dst, an array of 28 bytes. The state remains valid after a call tofinish_224, meaning the user may feed more data into the hash viaupdate_224. - Hacl_
Streaming_ ⚠SHA2_ finish_ 256 - Write the resulting hash into
dst, an array of 32 bytes. The state remains valid after a call tofinish_256, meaning the user may feed more data into the hash viaupdate_256. (The finish_256 function operates on an internal copy of the state and therefore does not invalidate the client-held statep.) - Hacl_
Streaming_ ⚠SHA2_ finish_ 384 - Write the resulting hash into
dst, an array of 48 bytes. The state remains valid after a call tofinish_384, meaning the user may feed more data into the hash viaupdate_384. - Hacl_
Streaming_ ⚠SHA2_ finish_ 512 - Write the resulting hash into
dst, an array of 64 bytes. The state remains valid after a call tofinish_512, meaning the user may feed more data into the hash viaupdate_512. (The finish_512 function operates on an internal copy of the state and therefore does not invalidate the client-held statep.) - Hacl_
Streaming_ ⚠SHA2_ free_ 224 - Hacl_
Streaming_ ⚠SHA2_ free_ 256 - Free a state allocated with
create_in_256. - Hacl_
Streaming_ ⚠SHA2_ free_ 384 - Hacl_
Streaming_ ⚠SHA2_ free_ 512 - Free a state allocated with
create_in_512. - Hacl_
Streaming_ ⚠SHA2_ hash_ 224 - Hash
input, of leninput_len, intodst, an array of 28 bytes. - Hacl_
Streaming_ ⚠SHA2_ hash_ 256 - Hash
input, of leninput_len, intodst, an array of 32 bytes. - Hacl_
Streaming_ ⚠SHA2_ hash_ 384 - Hash
input, of leninput_len, intodst, an array of 48 bytes. - Hacl_
Streaming_ ⚠SHA2_ hash_ 512 - Hash
input, of leninput_len, intodst, an array of 64 bytes. - Hacl_
Streaming_ ⚠SHA2_ init_ 224 - Hacl_
Streaming_ ⚠SHA2_ init_ 256 - Reset an existing state to the initial hash state with empty data.
- Hacl_
Streaming_ ⚠SHA2_ init_ 384 - Hacl_
Streaming_ ⚠SHA2_ init_ 512 - Hacl_
Streaming_ ⚠SHA2_ update_ 224 - Hacl_
Streaming_ ⚠SHA2_ update_ 256 - Feed an arbitrary amount of data into the hash. This function returns 0 for
success, or 1 if the combined length of all of the data passed to
update_256(since the last call toinit_256) exceeds 2^61-1 bytes. - Hacl_
Streaming_ ⚠SHA2_ update_ 384 - Hacl_
Streaming_ ⚠SHA2_ update_ 512 - Feed an arbitrary amount of data into the hash. This function returns 0 for
success, or 1 if the combined length of all of the data passed to
update_512(since the last call toinit_512) exceeds 2^125-1 bytes.
Type Aliases§
- Ever
Crypt_ Error_ error_ code - Ever
Crypt_ Hash_ Incremental_ hash_ state - Ever
Crypt_ Hash_ state_ s - Hacl_
Bignum_ Mont Arithmetic_ bn_ mont_ ctx_ u64 - Hacl_
HMAC_ DRBG_ state - Hacl_
HMAC_ DRBG_ supported_ alg - Hacl_
Streaming_ Keccak_ hash_ buf - Hacl_
Streaming_ Keccak_ state - Hacl_
Streaming_ MD_ state_ 32 - Hacl_
Streaming_ MD_ state_ 64 - Hacl_
Streaming_ SHA2_ state_ sha2_ 224 - Hacl_
Streaming_ SHA2_ state_ sha2_ 256 - Hacl_
Streaming_ SHA2_ state_ sha2_ 384 - Hacl_
Streaming_ SHA2_ state_ sha2_ 512 - Hacl_
Streaming_ Types_ error_ code - Lib_
IntVector_ Intrinsics_ vec128 - Spec_
Agile_ AEAD_ alg - Spec_
FFDHE_ ffdhe_ alg - Spec_
Hash_ Definitions_ hash_ alg - uint32x4_
t