Expand description
§HACL Sys
Bindings to HACL C code
Structs§
- Ever
Crypt_ AEAD_ state_ s_ s - Hacl_
HMAC_ DRBG_ state_ s - Hacl_
Hash_ Blake2b_ Simd256_ block_ state_ t_ s - Hacl_
Hash_ Blake2b_ Simd256_ state_ t_ s - Hacl_
Hash_ Blake2b_ block_ state_ t_ s - Hacl_
Hash_ Blake2b_ state_ t_ s - Hacl_
Hash_ Blake2s_ Simd128_ block_ state_ t_ s - Hacl_
Hash_ Blake2s_ Simd128_ state_ t_ s - Hacl_
Hash_ Blake2s_ block_ state_ t_ s - Hacl_
Hash_ Blake2s_ state_ t_ s - Hacl_
Hash_ SHA3_ hash_ buf_ s - Hacl_
Hash_ SHA3_ state_ t_ s - Hacl_
Streaming_ MD_ state_ 32_ s - Hacl_
Streaming_ MD_ state_ 64_ s
Constants§
- Hacl_
Streaming_ Types_ Invalid Algorithm - Hacl_
Streaming_ Types_ Invalid Length - Hacl_
Streaming_ Types_ Maximum Length Exceeded - Hacl_
Streaming_ Types_ Success - Spec_
Agile_ AEAD_ AES128_ CCM - Spec_
Agile_ AEAD_ AES128_ CCM8 - Spec_
Agile_ AEAD_ AES128_ GCM - Spec_
Agile_ AEAD_ AES256_ CCM - Spec_
Agile_ AEAD_ AES256_ CCM8 - Spec_
Agile_ AEAD_ AES256_ GCM - Spec_
Agile_ AEAD_ CHACH A20_ POLY1305 - Spec_
FFDHE_ FFDH E2048 - Spec_
FFDHE_ FFDH E3072 - Spec_
FFDHE_ FFDH E4096 - Spec_
FFDHE_ FFDH E6144 - Spec_
FFDHE_ FFDH E8192 - Spec_
Hash_ Definitions_ Blake2B - Spec_
Hash_ Definitions_ Blake2S - Spec_
Hash_ Definitions_ MD5 - Spec_
Hash_ Definitions_ SHA1 - Spec_
Hash_ Definitions_ SHA2_ 224 - Spec_
Hash_ Definitions_ SHA2_ 256 - Spec_
Hash_ Definitions_ SHA2_ 384 - Spec_
Hash_ Definitions_ SHA2_ 512 - Spec_
Hash_ Definitions_ SHA3_ 224 - Spec_
Hash_ Definitions_ SHA3_ 256 - Spec_
Hash_ Definitions_ SHA3_ 384 - Spec_
Hash_ Definitions_ SHA3_ 512 - Spec_
Hash_ Definitions_ Shake128 - Spec_
Hash_ Definitions_ Shake256
Functions§
- Ever
Crypt_ ⚠AEAD_ alg_ of_ state - Return the algorithm used in the AEAD state.
- Ever
Crypt_ ⚠AEAD_ create_ in - Create the required AEAD state for the algorithm.
- Ever
Crypt_ ⚠AEAD_ decrypt - Verify the authenticity of
ad
||cipher
and decryptcipher
intodst
. - Ever
Crypt_ ⚠AEAD_ decrypt_ expand - Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes128_ gcm - Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes128_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes256_ gcm - Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ aes256_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ decrypt_ expand_ chacha20_ poly1305 - Ever
Crypt_ ⚠AEAD_ encrypt - Encrypt and authenticate a message (
plain
) with associated data (ad
). - Ever
Crypt_ ⚠AEAD_ encrypt_ expand - Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes128_ gcm - Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes128_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes256_ gcm - Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ aes256_ gcm_ no_ check - WARNING: this function doesn’t perform any dynamic hardware check. You MUST make sure your hardware supports the implementation of AESGCM. Besides, this function was not designed for cross-compilation: if you compile it on a system which doesn’t support Vale, it will compile it to a function which makes the program exit.
- Ever
Crypt_ ⚠AEAD_ encrypt_ expand_ chacha20_ poly1305 - Ever
Crypt_ ⚠AEAD_ free - Cleanup and free the AEAD state.
- Ever
Crypt_ ⚠AEAD_ uu___ is_ Ek - Both encryption and decryption require a state that holds the key. The state may be reused as many times as desired.
- Ever
Crypt_ ⚠Auto Config2_ disable_ adx - Ever
Crypt_ ⚠Auto Config2_ disable_ aesni - Ever
Crypt_ ⚠Auto Config2_ disable_ avx - Ever
Crypt_ ⚠Auto Config2_ disable_ avx2 - Ever
Crypt_ ⚠Auto Config2_ disable_ avx512 - Ever
Crypt_ ⚠Auto Config2_ disable_ bmi2 - Ever
Crypt_ ⚠Auto Config2_ disable_ movbe - Ever
Crypt_ ⚠Auto Config2_ disable_ pclmulqdq - Ever
Crypt_ ⚠Auto Config2_ disable_ rdrand - Ever
Crypt_ ⚠Auto Config2_ disable_ shaext - Ever
Crypt_ ⚠Auto Config2_ disable_ sse - Ever
Crypt_ ⚠Auto Config2_ has_ adx - Ever
Crypt_ ⚠Auto Config2_ has_ aesni - Ever
Crypt_ ⚠Auto Config2_ has_ avx - Ever
Crypt_ ⚠Auto Config2_ has_ avx2 - Ever
Crypt_ ⚠Auto Config2_ has_ avx512 - Ever
Crypt_ ⚠Auto Config2_ has_ bmi2 - Ever
Crypt_ ⚠Auto Config2_ has_ movbe - Ever
Crypt_ ⚠Auto Config2_ has_ pclmulqdq - Ever
Crypt_ ⚠Auto Config2_ has_ rdrand - Ever
Crypt_ ⚠Auto Config2_ has_ shaext - Ever
Crypt_ ⚠Auto Config2_ has_ sse - Ever
Crypt_ ⚠Auto Config2_ has_ vec128 - Ever
Crypt_ ⚠Auto Config2_ has_ vec256 - Ever
Crypt_ ⚠Auto Config2_ init - Ever
Crypt_ ⚠Auto Config2_ recall - Hacl_
AEAD_ ⚠Chacha20 Poly1305_ Simd128_ decrypt - Decrypt a ciphertext
input
with keykey
. - Hacl_
AEAD_ ⚠Chacha20 Poly1305_ Simd128_ encrypt - Encrypt a message
input
with keykey
. - Hacl_
AEAD_ ⚠Chacha20 Poly1305_ Simd256_ decrypt - Decrypt a ciphertext
input
with keykey
. - Hacl_
AEAD_ ⚠Chacha20 Poly1305_ Simd256_ encrypt - Encrypt a message
input
with keykey
. - Hacl_
AEAD_ ⚠Chacha20 Poly1305_ decrypt - Decrypt a ciphertext
input
with keykey
. - Hacl_
AEAD_ ⚠Chacha20 Poly1305_ encrypt - Encrypt a message
input
with keykey
. - Hacl_
Curve25519_ ⚠51_ ecdh - Execute the diffie-hellmann key exchange.
- Hacl_
Curve25519_ ⚠51_ scalarmult - Compute the scalar multiple of a point.
- Hacl_
Curve25519_ ⚠51_ secret_ to_ public - Calculate a public point from a secret/private key.
- Hacl_
Curve25519_ ⚠64_ ecdh - Execute the diffie-hellmann key exchange.
- Hacl_
Curve25519_ ⚠64_ scalarmult - Compute the scalar multiple of a point.
- Hacl_
Curve25519_ ⚠64_ secret_ to_ public - Calculate a public point from a secret/private key.
- Hacl_
Ed25519_ ⚠expand_ keys - Compute the expanded keys for an Ed25519 signature.
- Hacl_
Ed25519_ ⚠secret_ to_ public - Compute the public key from the private key.
- Hacl_
Ed25519_ ⚠sign - Create an Ed25519 signature.
- Hacl_
Ed25519_ ⚠sign_ expanded - Create an Ed25519 signature with the (precomputed) expanded keys.
- Hacl_
Ed25519_ ⚠verify - Verify an Ed25519 signature.
- Hacl_
HKDF_ ⚠expand_ blake2b_ 32 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ blake2s_ 32 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ sha2_ 256 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ sha2_ 384 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠expand_ sha2_ 512 - Expand pseudorandom key to desired length.
- Hacl_
HKDF_ ⚠extract_ blake2b_ 32 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ blake2s_ 32 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ sha2_ 256 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ sha2_ 384 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HKDF_ ⚠extract_ sha2_ 512 - Extract a fixed-length pseudorandom key from input keying material.
- Hacl_
HMAC_ ⚠DRBG_ create_ in - Create a DRBG state.
- Hacl_
HMAC_ ⚠DRBG_ free - Hacl_
HMAC_ ⚠DRBG_ generate - Generate output.
- Hacl_
HMAC_ ⚠DRBG_ instantiate - Instantiate the DRBG.
- Hacl_
HMAC_ ⚠DRBG_ min_ length - Return the minimal entropy input length of the desired hash function.
- Hacl_
HMAC_ ⚠DRBG_ reseed - Reseed the DRBG.
- Hacl_
HMAC_ ⚠DRBG_ uu___ is_ State - Hacl_
HMAC_ ⚠compute_ blake2b_ 32 - Write the HMAC-BLAKE2b MAC of a message (
data
) by using a key (key
) intodst
. - Hacl_
HMAC_ ⚠compute_ blake2s_ 32 - Write the HMAC-BLAKE2s MAC of a message (
data
) by using a key (key
) intodst
. - Hacl_
HMAC_ ⚠compute_ sha1 - Write the HMAC-SHA-1 MAC of a message (
data
) by using a key (key
) intodst
. - Hacl_
HMAC_ ⚠compute_ sha2_ 256 - Write the HMAC-SHA-2-256 MAC of a message (
data
) by using a key (key
) intodst
. - Hacl_
HMAC_ ⚠compute_ sha2_ 384 - Write the HMAC-SHA-2-384 MAC of a message (
data
) by using a key (key
) intodst
. - Hacl_
HMAC_ ⚠compute_ sha2_ 512 - Write the HMAC-SHA-2-512 MAC of a message (
data
) by using a key (key
) intodst
. - Hacl_
Hash_ ⚠Blake2b_ Simd256_ digest - Finish function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ Simd256_ free - Free state function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ Simd256_ hash_ with_ key - Write the BLAKE2b digest of message
input
using keykey
intooutput
. - Hacl_
Hash_ ⚠Blake2b_ Simd256_ malloc - State allocation function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ Simd256_ reset - Re-initialization function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ Simd256_ update - Update function when there is no key; 0 = success, 1 = max length exceeded
- Hacl_
Hash_ ⚠Blake2b_ digest - Finish function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ free - Free state function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ hash_ with_ key - Write the BLAKE2b digest of message
input
using keykey
intooutput
. - Hacl_
Hash_ ⚠Blake2b_ malloc - State allocation function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ reset - Re-initialization function when there is no key
- Hacl_
Hash_ ⚠Blake2b_ update - Update function when there is no key; 0 = success, 1 = max length exceeded
- Hacl_
Hash_ ⚠Blake2s_ Simd128_ digest - Finish function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ Simd128_ free - Free state function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ Simd128_ hash_ with_ key - Write the BLAKE2s digest of message
input
using keykey
intooutput
. - Hacl_
Hash_ ⚠Blake2s_ Simd128_ malloc - State allocation function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ Simd128_ reset - Re-initialization function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ Simd128_ update - Update function when there is no key; 0 = success, 1 = max length exceeded
- Hacl_
Hash_ ⚠Blake2s_ digest - Finish function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ free - Free state function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ hash_ with_ key - Write the BLAKE2s digest of message
input
using keykey
intooutput
. - Hacl_
Hash_ ⚠Blake2s_ malloc - State allocation function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ reset - Re-initialization function when there is no key
- Hacl_
Hash_ ⚠Blake2s_ update - Update function when there is no key; 0 = success, 1 = max length exceeded
- Hacl_
Hash_ ⚠SHA1_ copy - Hacl_
Hash_ ⚠SHA1_ digest - Hacl_
Hash_ ⚠SHA1_ free - Hacl_
Hash_ ⚠SHA1_ hash - Hacl_
Hash_ ⚠SHA1_ malloc - Hacl_
Hash_ ⚠SHA1_ reset - Hacl_
Hash_ ⚠SHA1_ update - 0 = success, 1 = max length exceeded
- Hacl_
Hash_ ⚠SHA2_ copy_ 256 - Copies the state passed as argument into a newly allocated state (deep copy).
The state is to be freed by calling
free_256
. Cloning the state this way is useful, for instance, if your control-flow diverges and you need to feed more (different) data into the hash in each branch. - Hacl_
Hash_ ⚠SHA2_ copy_ 512 - Copies the state passed as argument into a newly allocated state (deep copy).
The state is to be freed by calling
free_512
. Cloning the state this way is useful, for instance, if your control-flow diverges and you need to feed more (different) data into the hash in each branch. - Hacl_
Hash_ ⚠SHA2_ digest_ 224 - Write the resulting hash into
output
, an array of 28 bytes. The state remains valid after a call todigest_224
, meaning the user may feed more data into the hash viaupdate_224
. - Hacl_
Hash_ ⚠SHA2_ digest_ 256 - Write the resulting hash into
output
, an array of 32 bytes. The state remains valid after a call todigest_256
, meaning the user may feed more data into the hash viaupdate_256
. (The digest_256 function operates on an internal copy of the state and therefore does not invalidate the client-held statep
.) - Hacl_
Hash_ ⚠SHA2_ digest_ 384 - Write the resulting hash into
output
, an array of 48 bytes. The state remains valid after a call todigest_384
, meaning the user may feed more data into the hash viaupdate_384
. - Hacl_
Hash_ ⚠SHA2_ digest_ 512 - Write the resulting hash into
output
, an array of 64 bytes. The state remains valid after a call todigest_512
, meaning the user may feed more data into the hash viaupdate_512
. (The digest_512 function operates on an internal copy of the state and therefore does not invalidate the client-held statep
.) - Hacl_
Hash_ ⚠SHA2_ free_ 224 - Hacl_
Hash_ ⚠SHA2_ free_ 256 - Free a state allocated with
malloc_256
. - Hacl_
Hash_ ⚠SHA2_ free_ 384 - Hacl_
Hash_ ⚠SHA2_ free_ 512 - Free a state allocated with
malloc_512
. - Hacl_
Hash_ ⚠SHA2_ hash_ 224 - Hash
input
, of leninput_len
, intooutput
, an array of 28 bytes. - Hacl_
Hash_ ⚠SHA2_ hash_ 256 - Hash
input
, of leninput_len
, intooutput
, an array of 32 bytes. - Hacl_
Hash_ ⚠SHA2_ hash_ 384 - Hash
input
, of leninput_len
, intooutput
, an array of 48 bytes. - Hacl_
Hash_ ⚠SHA2_ hash_ 512 - Hash
input
, of leninput_len
, intooutput
, an array of 64 bytes. - Hacl_
Hash_ ⚠SHA2_ malloc_ 224 - Hacl_
Hash_ ⚠SHA2_ malloc_ 256 - Allocate initial state for the SHA2_256 hash. The state is to be freed by
calling
free_256
. - Hacl_
Hash_ ⚠SHA2_ malloc_ 384 - Hacl_
Hash_ ⚠SHA2_ malloc_ 512 - Hacl_
Hash_ ⚠SHA2_ reset_ 224 - Hacl_
Hash_ ⚠SHA2_ reset_ 256 - Reset an existing state to the initial hash state with empty data.
- Hacl_
Hash_ ⚠SHA2_ reset_ 384 - Hacl_
Hash_ ⚠SHA2_ reset_ 512 - Hacl_
Hash_ ⚠SHA2_ update_ 224 - Hacl_
Hash_ ⚠SHA2_ update_ 256 - Feed an arbitrary amount of data into the hash. This function returns 0 for
success, or 1 if the combined length of all of the data passed to
update_256
(since the last call toreset_256
) exceeds 2^61-1 bytes. - Hacl_
Hash_ ⚠SHA2_ update_ 384 - Hacl_
Hash_ ⚠SHA2_ update_ 512 - Feed an arbitrary amount of data into the hash. This function returns 0 for
success, or 1 if the combined length of all of the data passed to
update_512
(since the last call toreset_512
) exceeds 2^125-1 bytes. - Hacl_
Hash_ ⚠SHA3_ absorb_ inner - Hacl_
Hash_ ⚠SHA3_ block_ len - Hacl_
Hash_ ⚠SHA3_ copy - Hacl_
Hash_ ⚠SHA3_ digest - Hacl_
Hash_ ⚠SHA3_ free - Hacl_
Hash_ ⚠SHA3_ get_ alg - Hacl_
Hash_ ⚠SHA3_ hash_ len - Hacl_
Hash_ ⚠SHA3_ is_ shake - Hacl_
Hash_ ⚠SHA3_ keccak - Hacl_
Hash_ ⚠SHA3_ malloc - Hacl_
Hash_ ⚠SHA3_ reset - Hacl_
Hash_ ⚠SHA3_ sha3_ 224 - Hacl_
Hash_ ⚠SHA3_ sha3_ 256 - Hacl_
Hash_ ⚠SHA3_ sha3_ 384 - Hacl_
Hash_ ⚠SHA3_ sha3_ 512 - Hacl_
Hash_ ⚠SHA3_ shake128_ hacl - Hacl_
Hash_ ⚠SHA3_ shake256_ hacl - Hacl_
Hash_ ⚠SHA3_ squeeze - Hacl_
Hash_ ⚠SHA3_ squeeze0 - Hacl_
Hash_ ⚠SHA3_ update - Hacl_
P256_ ⚠compressed_ to_ raw - Convert a public key from compressed to its raw form.
- Hacl_
P256_ ⚠dh_ initiator - Compute the public key from the private key.
- Hacl_
P256_ ⚠dh_ responder - Execute the diffie-hellmann key exchange.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ sha2 - Create an ECDSA signature using SHA2-256.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ sha384 - Create an ECDSA signature using SHA2-384.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ sha512 - Create an ECDSA signature using SHA2-512.
- Hacl_
P256_ ⚠ecdsa_ sign_ p256_ without_ hash - Create an ECDSA signature WITHOUT hashing first.
- Hacl_
P256_ ⚠ecdsa_ verif_ p256_ sha2 - Verify an ECDSA signature using SHA2-256.
- Hacl_
P256_ ⚠ecdsa_ verif_ p256_ sha384 - Verify an ECDSA signature using SHA2-384.
- Hacl_
P256_ ⚠ecdsa_ verif_ p256_ sha512 - Verify an ECDSA signature using SHA2-512.
- Hacl_
P256_ ⚠ecdsa_ verif_ without_ hash - Verify an ECDSA signature WITHOUT hashing first.
- Hacl_
P256_ ⚠raw_ to_ compressed - Convert a public key from raw to its compressed form.
- Hacl_
P256_ ⚠raw_ to_ uncompressed - Convert a public key from raw to its uncompressed form.
- Hacl_
P256_ ⚠uncompressed_ to_ raw - Convert a public key from uncompressed to its raw form.
- Hacl_
P256_ ⚠validate_ private_ key - Private key validation.
- Hacl_
P256_ ⚠validate_ public_ key - Public key validation.
- Hacl_
RSAPSS_ ⚠mgf_ hash - The mask generation function defined in the Public Key Cryptography Standard #1 (https://www.ietf.org/rfc/rfc2437.txt Section 10.2.1)
- Hacl_
RSAPSS_ ⚠new_ rsapss_ load_ pkey - Load a public key from key parts.
- Hacl_
RSAPSS_ ⚠new_ rsapss_ load_ skey - Load a secret key from key parts.
- Hacl_
RSAPSS_ ⚠rsapss_ pkey_ verify - Verify the signature
sgnt
of a messagemsg
. - Hacl_
RSAPSS_ ⚠rsapss_ sign - Sign a message
msg
and write the signature tosgnt
. - Hacl_
RSAPSS_ ⚠rsapss_ skey_ sign - Sign a message
msg
and write the signature tosgnt
. - Hacl_
RSAPSS_ ⚠rsapss_ verify - Verify the signature
sgnt
of a messagemsg
. - hacl_
free ⚠
Type Aliases§
- Ever
Crypt_ AEAD_ state_ s - Ever
Crypt_ Error_ error_ code - Hacl_
HMAC_ DRBG_ state - Hacl_
HMAC_ DRBG_ supported_ alg - Hacl_
Hash_ Blake2b_ Simd256_ block_ state_ t - Hacl_
Hash_ Blake2b_ Simd256_ state_ t - Hacl_
Hash_ Blake2b_ block_ state_ t - Hacl_
Hash_ Blake2b_ state_ t - Hacl_
Hash_ Blake2s_ Simd128_ block_ state_ t - Hacl_
Hash_ Blake2s_ Simd128_ state_ t - Hacl_
Hash_ Blake2s_ block_ state_ t - Hacl_
Hash_ Blake2s_ state_ t - Hacl_
Hash_ SHA1_ state_ t - Hacl_
Hash_ SHA2_ state_ t_ 224 - Hacl_
Hash_ SHA2_ state_ t_ 256 - Hacl_
Hash_ SHA2_ state_ t_ 384 - Hacl_
Hash_ SHA2_ state_ t_ 512 - Hacl_
Hash_ SHA3_ hash_ buf - Hacl_
Hash_ SHA3_ state_ t - Hacl_
Streaming_ MD_ state_ 32 - Hacl_
Streaming_ MD_ state_ 64 - Hacl_
Streaming_ Types_ error_ code - Lib_
IntVector_ Intrinsics_ vec128 - Lib_
IntVector_ Intrinsics_ vec256 - Spec_
Agile_ AEAD_ alg - Spec_
FFDHE_ ffdhe_ alg - Spec_
Hash_ Definitions_ hash_ alg - __m128i
- __m256i