package hacl_x25519
Primitives for Elliptic Curve Cryptography taken from Project Everest
Install
Dune Dependency
Authors
Maintainers
Sources
hacl_x25519-v0.2.2.tbz
sha256=816754a8e8f9739d0e6d98ced6e50b026a28d59232445c5051a66e4332cc572d
sha512=9a0fb07af4af999a12cb65f3bc15487c5999ddf6fff0a923cf4b8087a15933632266be55ec01cff3b15d354c9e526d906a7e15aee84c743f58f8cdfe899b110d
Description
This is an implementation of the X25519 key exchange algorithm, using code from Project Everest.
Cryptographic primitives should not be used in end applications, they are better used as part of a cryptographic library.
Published: 03 Nov 2020
README
README.md
hacl
These are bindings to the various primitives present in Project Everest.
In particular, the C code comes from this snapshot (from the hacl-star-raw 0.2.1 opam package, execute ./build_local.sh
). Hacl_Hash.{c,h}
have been stripped down to only SHA-512.
Dependencies (5)
-
conf-pkg-config
build
- ocaml
- eqaf
-
cstruct
>= "3.5.0" & < "6.1.0"
-
dune
>= "2.6"
Dev Dependencies (7)
-
yojson
with-test & >= "1.6.0"
-
stdlib-shims
with-test
-
ppx_deriving_yojson
with-test
-
ppx_blob
with-test
-
alcotest
with-test
-
hex
with-test
-
benchmark
with-test
Used by (3)
-
awa
< "0.0.2"
-
tls
>= "0.12.0" & < "0.13.0"
-
tls-mirage
>= "0.12.0" & < "0.13.0"
Conflicts (2)
-
ocaml-freestanding
< "0.6.0"
-
mirage-xen
< "6.0.0"
sectionYPositions = computeSectionYPositions($el), 10)"
x-init="setTimeout(() => sectionYPositions = computeSectionYPositions($el), 10)"
>
On This Page