package hacl-star
Install
Dune Dependency
Authors
Maintainers
Sources
md5=1ab1ada1189c4e61ddda06275cc3093f
sha512=710645d22a22f5d276a26019bda8f137861e3f0dc1f9e170eb9d25c88dc84293af01fd40923181a28a063a9b8d281cb51e28c7016144f7c8bb1d63b18797fbe1
doc/hacl-star/Hacl_star/Hacl/index.html
Module Hacl_star.Hacl
Source
This module provides direct access to all HACL* implementations
bytes
is ultimately an alias for Stdlib.Bytes.t
, the type of buffers currently used throughout the library
AEAD
Chacha20-Poly1305
Different implementations of Chacha20-Poly1305. A multiplexing interface is also available.
Portable C implementation of Chacha20-Poly1305 that runs on any 32-bit platform
128-bit vectorized C implementation of Chacha20-Poly1305 that runs on platforms with 128-bit vector support
256-bit vectorized C implementation of Chacha20-Poly1305 that runs on platforms with 256-bit vector support
ECDH, EdDSA, and ECDSA
Curve25519
Different implementations of ECDH using Curve25519. A multiplexing interface is also available.
Portable C implementation that is optimized for use on 64-bit platforms that support 128-bit arithmetic, will still compile and execute on 32-bit platforms
Ed25519
EdDSA using Curve25519
Portable implementation
P-256
Hashing
SHA-2
Portable C implementations of SHA-2. Multiplexing interfaces for SHA-224 and SHA-256 are also available.
Direct hashing with SHA-224
Direct hashing with SHA-256
Direct hashing with SHA-384
Direct hashing with SHA-512
SHA-3
Portable C implementations of SHA-3
Direct hashing with SHA3-224
Direct hashing with SHA3-256
Direct hashing with SHA3-384
Direct hashing with SHA3-512
BLAKE2
The BLAKE2 hash function has 2 variants:
- BLAKE2b, optimised for 64-bit architectures
- BLAKE2s, optimised for 8- to 32-bit architectures
Portable BLAKE2b implementation
Vectorized BLAKE2b implementation, requiring 256-bit vector support
Portable BLAKE2s implementation
Vectorized BLAKE2s implementation, requiring 128-bit vector support
Legacy (deprecated)
Legacy algorithms, which are not suitable for cryptographic applications.
Direct hashing with MD5
Direct hashing with SHA-1
MACs
Message authentication codes
Multiplexing interfaces for these algorithms are also available.
HMAC
Portable C implementation of HMAC-SHA-256
Portable C implementation of HMAC-SHA-384
Portable C implementation of HMAC-SHA-512
Portable C implementation of HMAC-BLAKE2b
Portable C implementation of HMAC-BLAKE2s
Poly1305
Portable C implementation of Poly1305
Vectorized C implementation of Poly1305 that runs on platforms with 128-bit vector support
Vectorized C implementation of Poly1305 that runs on platforms with 256-bit vector support
NaCl
Box (public-key authenticated encryption) and Secretbox (secret-key authenticated encryption)
Key derivation
HKDF
HMAC-based key derivation function
Portable implementations of HKDF. Agile and multiplexing interfaces are also available.
Portable C implementation of HKDF using SHA2-256
Portable C implementation of HKDF using SHA2-512
Portable C implementation of HKDF using BLAKE2b
Portable C implementation of HKDF using BLAKE2s
Randomness (not verified)
A randomness function implemented with platform-dependent code for Unix and Windows