package | WordPress |
---|---|
inherited_from | \ParagonIE_Sodium_Compat |
bin2hex(string $string) : string
psalm-suppress | MixedArgument |
---|
string
A string (probably raw binary)
\SodiumException |
|
---|---|
\TypeError |
string
A hexadecimal-encoded stringcompare(string $left, string $right) : integer
Compared to memcmp(), compare() is more useful for sorting.
psalm-suppress | MixedArgument |
---|
string
The left operand; must be a string
string
The right operand; must be a string
\SodiumException |
|
---|---|
\TypeError |
integer
If < 0 if the left operand is less than the right
If = 0 if both strings are equal
If > 0 if the right operand is less than the leftcrypto_aead_aes256gcm_decrypt(string $ciphertext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
) : string | boolean
Algorithm: AES-256-GCM
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Encrypted message (with Poly1305 MAC appended)
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
boolean
The original plaintext messagecrypto_aead_aes256gcm_encrypt(string $plaintext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
) : string
Algorithm: AES-256-GCM
psalm-suppress | MixedArgument |
---|
string
Message to be encrypted
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with a 16-byte GCM message
authentication code appendedcrypto_aead_aes256gcm_is_available() : boolean
psalm-suppress | UndefinedFunction |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
boolean
crypto_aead_aes256gcm_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_aead_chacha20poly1305_decrypt(string $ciphertext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
) : string
Algorithm: ChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Encrypted message (with Poly1305 MAC appended)
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
The original plaintext messagecrypto_aead_chacha20poly1305_encrypt(string $plaintext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
) : string
Algorithm: ChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
psalm-suppress | MixedArgument |
---|
string
Message to be encrypted
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with a 16-byte Poly1305 message
authentication code appendedcrypto_aead_chacha20poly1305_ietf_decrypt(string $ciphertext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
) : string
Algorithm: ChaCha20-Poly1305
IETF mode uses a 96-bit random nonce with a 32-bit counter. Regular mode uses a 64-bit random nonce with a 64-bit counter.
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Encrypted message (with Poly1305 MAC appended)
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 12 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
The original plaintext messagecrypto_aead_chacha20poly1305_ietf_encrypt(string $plaintext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
) : string
Algorithm: ChaCha20-Poly1305
IETF mode uses a 96-bit random nonce with a 32-bit counter. Regular mode uses a 64-bit random nonce with a 64-bit counter.
psalm-suppress | MixedArgument |
---|
string
Message to be encrypted
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with a 16-byte Poly1305 message
authentication code appendedcrypto_aead_chacha20poly1305_ietf_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_aead_chacha20poly1305_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_aead_xchacha20poly1305_ietf_decrypt(string $ciphertext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
, boolean $dontFallback= false
) : string | boolean
Algorithm: XChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
psalm-suppress | MixedArgument |
---|
string
Encrypted message (with Poly1305 MAC appended)
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
boolean
Don't fallback to ext/sodium
\SodiumException |
|
---|---|
\TypeError |
string
boolean
The original plaintext messagecrypto_aead_xchacha20poly1305_ietf_encrypt(string $plaintext= ''
, string $assocData= ''
, string $nonce= ''
, string $key= ''
, boolean $dontFallback= false
) : string
Algorithm: XChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
psalm-suppress | MixedArgument |
---|
string
Message to be encrypted
string
Authenticated Associated Data (unencrypted)
string
Number to be used only Once; must be 8 bytes
string
Encryption key
boolean
Don't fallback to ext/sodium
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with a 16-byte Poly1305 message
authentication code appendedcrypto_aead_xchacha20poly1305_ietf_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_auth(string $message, string $key) : string
Algorithm: HMAC-SHA512-256. Which is HMAC-SHA-512 truncated to 256 bits. Not to be confused with HMAC-SHA-512/256 which would use the SHA-512/256 hash function (uses different initial parameters but still truncates to 256 bits to sidestep length-extension attacks).
psalm-suppress | MixedArgument |
---|
string
Message to be authenticated
string
Symmetric authentication key
\SodiumException |
|
---|---|
\TypeError |
string
Message authentication codecrypto_auth_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_auth_verify(string $mac, string $message, string $key) : boolean
psalm-suppress | MixedArgument |
---|
string
Message authentication code
string
Message whose authenticity you are attempting to verify (with a given MAC and key)
string
Symmetric authentication key
\SodiumException |
|
---|---|
\TypeError |
boolean
TRUE if authenticated, FALSE otherwisecrypto_box(string $plaintext, string $nonce, string $keypair) : string
Algorithm: X25519-XSalsa20-Poly1305. X25519: Elliptic-Curve Diffie Hellman over Curve25519. XSalsa20: Extended-nonce variant of salsa20. Poyl1305: Polynomial MAC for one-time message authentication.
psalm-suppress | MixedArgument |
---|
string
The message to be encrypted
string
A Number to only be used Once; must be 24 bytes
string
Your secret key and your recipient's public key
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with 16-byte Poly1305 MACcrypto_box_keypair() : string
psalm-suppress | MixedArgument |
---|
\SodiumException |
|
---|---|
\TypeError |
string
A 64-byte string; the first 32 are your secret key, while
the last 32 are your public key. crypto_box_secretkey()
and crypto_box_publickey() exist to separate them so you
don't accidentally get them mixed up!crypto_box_keypair_from_secretkey_and_publickey(string $secretKey, string $publicKey) : string
psalm-suppress | MixedArgument |
---|
string
Secret key
string
Public key
\SodiumException |
|
---|---|
\TypeError |
string
Keypaircrypto_box_open(string $ciphertext, string $nonce, string $keypair) : string
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Encrypted message
string
Number to only be used Once; must be 24 bytes
string
Your secret key and the sender's public key
\SodiumException |
|
---|---|
\TypeError |
string
The original plaintext messagecrypto_box_publickey(string $keypair) : string
psalm-suppress | MixedArgument |
---|
string
Keypair containing secret and public key
\SodiumException |
|
---|---|
\TypeError |
string
Your crypto_box public keycrypto_box_publickey_from_secretkey(string $secretKey) : string
psalm-suppress | MixedArgument |
---|
string
Any X25519 secret key
\SodiumException |
|
---|---|
\TypeError |
string
The corresponding X25519 public keycrypto_box_seal(string $plaintext, string $publicKey) : string
Algorithm: X25519-XSalsa20-Poly1305, as with crypto_box. The sender's X25519 keypair is ephemeral. Nonce is generated from the BLAKE2b hash of both public keys.
This provides ciphertext integrity.
psalm-suppress | MixedArgument |
---|
string
Message to be sealed
string
Your recipient's public key
\SodiumException |
|
---|---|
\TypeError |
string
Sealed message that only your recipient can
decryptcrypto_box_seal_open(string $ciphertext, string $keypair) : string
This validates ciphertext integrity.
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Sealed message to be opened
string
Your crypto_box keypair
\SodiumException |
|
---|---|
\TypeError |
string
The original plaintext messagecrypto_box_secretkey(string $keypair) : string
psalm-suppress | MixedArgument |
---|
string
\SodiumException |
|
---|---|
\TypeError |
string
Your crypto_box secret keycrypto_box_seed_keypair(string $seed) : string
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | UndefinedFunction |
string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_generichash(string $message, string|null $key= ''
, integer $length= self::CRYPTO_GENERICHASH_BYTES
) : string
psalm-suppress | MixedArgument |
---|
string
The message to be hashed
string
null
If specified, must be a string between 16 and 64 bytes long
integer
Output length in bytes; must be between 16 and 64 (default = 32)
\SodiumException |
|
---|---|
\TypeError |
string
Raw binarycrypto_generichash_final(string $ctx, integer $length = self::CRYPTO_GENERICHASH_BYTES
) : string
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | ReferenceConstraintViolation |
string
BLAKE2 hashing context. Generated by crypto_generichash_init().
integer
Hash output size.
\SodiumException |
|
---|---|
\TypeError |
string
Final BLAKE2b hash.crypto_generichash_init(string|null $key= ''
, integer $length= self::CRYPTO_GENERICHASH_BYTES
) : string
psalm-suppress | MixedArgument |
---|
string
null
If specified must be a string between 16 and 64 bytes
integer
The size of the desired hash output
\SodiumException |
|
---|---|
\TypeError |
string
A BLAKE2 hashing context, encoded as a string
(To be 100% compatible with ext/libsodium)crypto_generichash_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_generichash_update(string $ctx, string $message) : void
param-out | string $ctx |
---|---|
psalm-suppress | MixedArgument |
psalm-suppress | ReferenceConstraintViolation |
string
BLAKE2 hashing context. Generated by crypto_generichash_init(). $ctx is passed by reference and gets updated in-place.
string
The message to append to the existing hash state.
\SodiumException |
|
---|---|
\TypeError |
crypto_kx(string $my_secret, string $their_public, string $client_public, string $server_public) : string
Typically, you would designate one machine to be the client and the other to be the server. The first two keys are what you'd expect for scalarmult() below, but the latter two public keys don't swap places.
ALICE | BOB | Client | Server | |
---|---|---|---|---|
shared = crypto_kx( | shared = crypto_kx( | |||
alice_sk, | bob_sk, | <- contextual | ||
bob_pk, | alice_pk, | <- contextual | ||
alice_pk, | alice_pk, | <----- static | ||
bob_pk | bob_pk | <----- static | ||
) | ) |
They are used along with the scalarmult product to generate a 256-bit BLAKE2b hash unique to the client and server keys.
psalm-suppress | MixedArgument |
---|
string
string
string
string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_pwhash(integer $outlen, string $passwd, string $salt, integer $opslimit, integer $memlimit, integer|null $alg = null
) : string
psalm-suppress | MixedArgument |
---|
integer
string
string
integer
integer
integer
null
\SodiumException |
|
---|---|
\TypeError |
string
crypto_pwhash_is_available() : boolean
This returns TRUE if the native crypto_pwhash API is available by libsodium. This returns FALSE if only sodium_compat is available.
boolean
crypto_pwhash_scryptsalsa208sha256(integer $outlen, string $passwd, string $salt, integer $opslimit, integer $memlimit) : string
integer
string
string
integer
integer
\SodiumException |
|
---|---|
\TypeError |
string
crypto_pwhash_scryptsalsa208sha256_is_available() : boolean
This returns TRUE if the native crypto_pwhash API is available by libsodium. This returns FALSE if only sodium_compat is available.
boolean
crypto_pwhash_scryptsalsa208sha256_str(string $passwd, integer $opslimit, integer $memlimit) : string
string
integer
integer
\SodiumException |
|
---|---|
\TypeError |
string
crypto_pwhash_scryptsalsa208sha256_str_verify(string $passwd, string $hash) : boolean
string
string
\SodiumException |
|
---|---|
\TypeError |
boolean
crypto_pwhash_str(string $passwd, integer $opslimit, integer $memlimit) : string
psalm-suppress | MixedArgument |
---|
string
integer
integer
\SodiumException |
|
---|---|
\TypeError |
string
crypto_pwhash_str_verify(string $passwd, string $hash) : boolean
psalm-suppress | MixedArgument |
---|
string
string
\SodiumException |
|
---|---|
\TypeError |
boolean
crypto_scalarmult(string $secretKey, string $publicKey) : string
Algorithm: X25519 (ECDH over Curve25519)
psalm-suppress | MixedArgument |
---|
string
string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_scalarmult_base(string $secretKey) : string
psalm-suppress | TooFewArguments |
---|---|
psalm-suppress | MixedArgument |
string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_secretbox(string $plaintext, string $nonce, string $key) : string
Algorithm: XSalsa20-Poly1305
psalm-suppress | MixedArgument |
---|
string
The message you're encrypting
string
A Number to be used Once; must be 24 bytes
string
Symmetric encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with Poly1305 MACcrypto_secretbox_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_secretbox_open(string $ciphertext, string $nonce, string $key) : string
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Ciphertext with Poly1305 MAC
string
A Number to be used Once; must be 24 bytes
string
Symmetric encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Original plaintext messagecrypto_secretbox_xchacha20poly1305(string $plaintext, string $nonce, string $key) : string
Algorithm: XChaCha20-Poly1305
psalm-suppress | MixedArgument |
---|
string
The message you're encrypting
string
A Number to be used Once; must be 24 bytes
string
Symmetric encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Ciphertext with Poly1305 MACcrypto_secretbox_xchacha20poly1305_open(string $ciphertext, string $nonce, string $key) : string
psalm-suppress | MixedArgument |
---|
string
Ciphertext with Poly1305 MAC
string
A Number to be used Once; must be 24 bytes
string
Symmetric encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Original plaintext messagecrypto_shorthash(string $message, string $key) : string
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Input message
string
SipHash-2-4 key
\SodiumException |
|
---|---|
\TypeError |
string
Hashcrypto_shorthash_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_sign(string $message, string $secretKey) : string
Algorithm: Ed25519 (EdDSA over Curve25519)
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
Message to be signed.
string
Secret signing key.
\SodiumException |
|
---|---|
\TypeError |
string
Signed message (signature is prefixed).crypto_sign_detached(string $message, string $secretKey) : string
Algorithm: Ed25519 (EdDSA over Curve25519)
psalm-suppress | MixedArgument |
---|
string
Message to be signed
string
Secret signing key
\SodiumException |
|
---|---|
\TypeError |
string
Digital signaturecrypto_sign_ed25519_pk_to_curve25519(string $pk) : string
psalm-suppress | MixedArgument |
---|
string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_sign_ed25519_sk_to_curve25519(string $sk) : string
psalm-suppress | MixedArgument |
---|
string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_sign_keypair() : string
\SodiumException |
|
---|---|
\TypeError |
string
crypto_sign_open(string $signedMessage, string $publicKey) : string
psalm-suppress | MixedArgument |
---|---|
psalm-suppress | MixedInferredReturnType |
psalm-suppress | MixedReturnStatement |
string
A signed message
string
A public key
\SodiumException |
|
---|---|
\TypeError |
string
The original message (if the signature is
valid for this public key)crypto_sign_publickey(string $keypair) : string
psalm-suppress | MixedArgument |
---|
string
Keypair
\SodiumException |
|
---|---|
\TypeError |
string
Public keycrypto_sign_publickey_from_secretkey(string $secretKey) : string
psalm-suppress | MixedArgument |
---|
string
Your Ed25519 secret key
\SodiumException |
|
---|---|
\TypeError |
string
The corresponding Ed25519 public keycrypto_sign_secretkey(string $keypair) : string
psalm-suppress | MixedArgument |
---|
string
Keypair
\SodiumException |
|
---|---|
\TypeError |
string
Secret keycrypto_sign_seed_keypair(string $seed) : string
psalm-suppress | MixedArgument |
---|
string
Input seed
\SodiumException |
|
---|---|
\TypeError |
string
Keypaircrypto_sign_verify_detached(string $signature, string $message, string $publicKey) : boolean
psalm-suppress | MixedArgument |
---|
string
Digital sginature
string
Message to be verified
string
Public key
\SodiumException |
|
---|---|
\TypeError |
boolean
TRUE if this signature is good for this public key;
FALSE otherwisecrypto_stream(integer $len, string $nonce, string $key) : string
psalm-suppress | MixedArgument |
---|
integer
Number of bytes desired
string
Number to be used Once; must be 24 bytes
string
XSalsa20 key
\SodiumException |
|
---|---|
\TypeError |
string
Pseudorandom stream that can be XORed with messages
to provide encryption (but not authentication; see
Poly1305 or crypto_auth() for that, which is not
optional for security)crypto_stream_keygen() : string
\Exception |
|
---|---|
\Error |
string
crypto_stream_xor(string $message, string $nonce, string $key) : string
Unless you are following expert advice, do not used this feature.
Algorithm: XSalsa20
This DOES NOT provide ciphertext integrity.
psalm-suppress | MixedArgument |
---|
string
Plaintext message
string
Number to be used Once; must be 24 bytes
string
Encryption key
\SodiumException |
|
---|---|
\TypeError |
string
Encrypted text which is vulnerable to chosen-
ciphertext attacks unless you implement some
other mitigation to the ciphertext (i.e.
Encrypt then MAC)hex2bin(string $string) : string
psalm-suppress | TooFewArguments |
---|---|
psalm-suppress | MixedArgument |
string
Hexadecimal string
\SodiumException |
|
---|---|
\TypeError |
string
Raw binary stringincrement(string $var) : void
psalm-suppress | MixedArgument |
---|
string
\SodiumException |
|
---|---|
\TypeError |
library_version_major() : integer
psalm-suppress | MixedInferredReturnType |
---|---|
psalm-suppress | UndefinedFunction |
integer
library_version_minor() : integer
psalm-suppress | MixedInferredReturnType |
---|---|
psalm-suppress | UndefinedFunction |
integer
memcmp(string $left, string $right) : integer
psalm-suppress | MixedArgument |
---|
string
string
\SodiumException |
|
---|---|
\TypeError |
integer
memzero(string|null $var) : void
param-out | string|null $var |
---|---|
psalm-suppress | TooFewArguments |
string
null
\SodiumException |
(Unless libsodium is installed) |
---|---|
\TypeError |
polyfill_is_fast() : boolean
boolean
randombytes_buf(integer $numBytes) : string
Proudly uses /dev/urandom (if getrandom(2) is not available).
integer
\Exception |
|
---|---|
\TypeError |
string
randombytes_random16() : integer
\Exception |
|
---|---|
\Error |
|
\TypeError |
integer
randombytes_uniform(integer $range) : integer
integer
\Exception |
|
---|---|
\Error |
|
\TypeError |
integer
runtime_speed_test(integer $iterations, integer $maxTimeout) : boolean
Usage: If runtime_speed_test() returns FALSE, then our 32-bit implementation is to slow to use safely without risking timeouts. If this happens, install sodium from PECL to get acceptable performance.
integer
Number of multiplications to attempt
integer
Milliseconds
\SodiumException |
---|
boolean
TRUE if we're fast enough, FALSE is notversion_string() : string
psalm-suppress | MixedInferredReturnType |
---|---|
psalm-suppress | UndefinedFunction |
string
useNewSodiumAPI() : boolean
ref | https://wiki.php.net/rfc/libsodium |
---|
boolean
use_fallback(string $sodium_func_name = ''
) : boolean
If ext/libsodium is available, use it. Return TRUE. Otherwise, we have to use the code provided herein. Return FALSE.
string
boolean
$disableFallbackForUnitTests : boolean
false
It should only be used for unit testing.
$fastMult : boolean
false
CRYPTO_AEAD_AES256GCM_ABYTES = 16
CRYPTO_AEAD_AES256GCM_KEYBYTES = 32
CRYPTO_AEAD_AES256GCM_NPUBBYTES = 12
CRYPTO_AEAD_AES256GCM_NSECBYTES = 0
CRYPTO_AEAD_CHACHA20POLY1305_ABYTES = 16
CRYPTO_AEAD_CHACHA20POLY1305_IETF_ABYTES = 16
CRYPTO_AEAD_CHACHA20POLY1305_IETF_KEYBYTES = 32
CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES = 12
CRYPTO_AEAD_CHACHA20POLY1305_IETF_NSECBYTES = 0
CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES = 32
CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES = 8
CRYPTO_AEAD_CHACHA20POLY1305_NSECBYTES = 0
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES = 16
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES = 32
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES = 24
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NSECBYTES = 0
CRYPTO_AUTH_BYTES = 32
CRYPTO_AUTH_KEYBYTES = 32
CRYPTO_BOX_KEYPAIRBYTES = 64
CRYPTO_BOX_MACBYTES = 16
CRYPTO_BOX_NONCEBYTES = 24
CRYPTO_BOX_PUBLICKEYBYTES = 32
CRYPTO_BOX_SEALBYTES = 16
CRYPTO_BOX_SECRETKEYBYTES = 32
CRYPTO_BOX_SEEDBYTES = 32
CRYPTO_GENERICHASH_BYTES = 32
CRYPTO_GENERICHASH_BYTES_MAX = 64
CRYPTO_GENERICHASH_BYTES_MIN = 16
CRYPTO_GENERICHASH_KEYBYTES = 32
CRYPTO_GENERICHASH_KEYBYTES_MAX = 64
CRYPTO_GENERICHASH_KEYBYTES_MIN = 16
CRYPTO_KX_BYTES = 32
CRYPTO_KX_PUBLICKEYBYTES = 32
CRYPTO_KX_SECRETKEYBYTES = 32
CRYPTO_KX_SEEDBYTES = 32
CRYPTO_PWHASH_ALG_ARGON2I13 = 1
CRYPTO_PWHASH_ALG_ARGON2ID13 = 2
CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE = 33554432
CRYPTO_PWHASH_MEMLIMIT_MODERATE = 134217728
CRYPTO_PWHASH_MEMLIMIT_SENSITIVE = 536870912
CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE = 4
CRYPTO_PWHASH_OPSLIMIT_MODERATE = 6
CRYPTO_PWHASH_OPSLIMIT_SENSITIVE = 8
CRYPTO_PWHASH_SALTBYTES = 16
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_INTERACTIVE = 16777216
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_SENSITIVE = 1073741824
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_INTERACTIVE = 534288
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_SENSITIVE = 33554432
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES = 32
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_STRPREFIX = '$7$'
CRYPTO_PWHASH_STRPREFIX = '$argon2i$'
CRYPTO_SCALARMULT_BYTES = 32
CRYPTO_SCALARMULT_SCALARBYTES = 32
CRYPTO_SECRETBOX_KEYBYTES = 32
CRYPTO_SECRETBOX_MACBYTES = 16
CRYPTO_SECRETBOX_NONCEBYTES = 24
CRYPTO_SHORTHASH_BYTES = 8
CRYPTO_SHORTHASH_KEYBYTES = 16
CRYPTO_SIGN_BYTES = 64
CRYPTO_SIGN_KEYPAIRBYTES = 96
CRYPTO_SIGN_PUBLICKEYBYTES = 32
CRYPTO_SIGN_SECRETKEYBYTES = 64
CRYPTO_SIGN_SEEDBYTES = 32
CRYPTO_STREAM_KEYBYTES = 32
CRYPTO_STREAM_NONCEBYTES = 24
LIBRARY_VERSION_MAJOR = 9
LIBRARY_VERSION_MINOR = 1
VERSION_STRING = 'polyfill-1.0.8'