crypto_auth
This page lists all primitives grouped under operation
crypto_auth
.
For each primitive, all listed implementations were checked across a number of compilers, compiler options, and hosts.
The progress bar shows the relative number of successes, fails, and errors:
crypto_aead_decrypt returns nonzero
The absolute number of successes, fails, and errors is shown to the left of the progress bar.
The following code was used to flag secret data, and test implementations:
1 | void timecop_doit(void) |
2 | { |
3 | poison(k, klen); |
4 | crypto_auth(h,m,TUNE_BYTES,k); |
5 | unpoison(k, klen); |
6 | unpoison(h, hlen); |
7 | crypto_auth_verify(h,m,TUNE_BYTES,k); |
8 | } |
Click an implementation to see all checked compiler options.
hmacmd5
hmacsha256
hmacsha512256
pyrhash
siphash24
siphash48
zero