| package | WordPress |
|---|---|
| inherited_from | \ParagonIE_Sodium_Compat |
bin2hex(string $string) : string
| psalm-suppress | MixedArgument |
|---|
stringA string (probably raw binary)
\SodiumException |
|
|---|---|
\TypeError |
stringA hexadecimal-encoded stringcompare(string $left, string $right) : integer
Compared to memcmp(), compare() is more useful for sorting.
| psalm-suppress | MixedArgument |
|---|
stringThe left operand; must be a string
stringThe right operand; must be a string
\SodiumException |
|
|---|---|
\TypeError |
integerIf < 0 if the left operand is less than the right
If = 0 if both strings are equal
If > 0 if the right operand is less than the leftcrypto_aead_aes256gcm_decrypt(string $ciphertext= '', string $assocData= '', string $nonce= '', string $key= '') : string | boolean
Algorithm: AES-256-GCM
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringEncrypted message (with Poly1305 MAC appended)
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringbooleanThe original plaintext messagecrypto_aead_aes256gcm_encrypt(string $plaintext= '', string $assocData= '', string $nonce= '', string $key= '') : string
Algorithm: AES-256-GCM
| psalm-suppress | MixedArgument |
|---|
stringMessage to be encrypted
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with a 16-byte GCM message
authentication code appendedcrypto_aead_aes256gcm_is_available() : boolean
| psalm-suppress | UndefinedFunction |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
booleancrypto_aead_aes256gcm_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_aead_chacha20poly1305_decrypt(string $ciphertext= '', string $assocData= '', string $nonce= '', string $key= '') : string
Algorithm: ChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringEncrypted message (with Poly1305 MAC appended)
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringThe original plaintext messagecrypto_aead_chacha20poly1305_encrypt(string $plaintext= '', string $assocData= '', string $nonce= '', string $key= '') : string
Algorithm: ChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
| psalm-suppress | MixedArgument |
|---|
stringMessage to be encrypted
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with a 16-byte Poly1305 message
authentication code appendedcrypto_aead_chacha20poly1305_ietf_decrypt(string $ciphertext= '', string $assocData= '', string $nonce= '', string $key= '') : string
Algorithm: ChaCha20-Poly1305
IETF mode uses a 96-bit random nonce with a 32-bit counter. Regular mode uses a 64-bit random nonce with a 64-bit counter.
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringEncrypted message (with Poly1305 MAC appended)
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 12 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringThe original plaintext messagecrypto_aead_chacha20poly1305_ietf_encrypt(string $plaintext= '', string $assocData= '', string $nonce= '', string $key= '') : string
Algorithm: ChaCha20-Poly1305
IETF mode uses a 96-bit random nonce with a 32-bit counter. Regular mode uses a 64-bit random nonce with a 64-bit counter.
| psalm-suppress | MixedArgument |
|---|
stringMessage to be encrypted
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with a 16-byte Poly1305 message
authentication code appendedcrypto_aead_chacha20poly1305_ietf_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_aead_chacha20poly1305_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_aead_xchacha20poly1305_ietf_decrypt(string $ciphertext= '', string $assocData= '', string $nonce= '', string $key= '', boolean $dontFallback= false) : string | boolean
Algorithm: XChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
| psalm-suppress | MixedArgument |
|---|
stringEncrypted message (with Poly1305 MAC appended)
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
booleanDon't fallback to ext/sodium
\SodiumException |
|
|---|---|
\TypeError |
stringbooleanThe original plaintext messagecrypto_aead_xchacha20poly1305_ietf_encrypt(string $plaintext= '', string $assocData= '', string $nonce= '', string $key= '', boolean $dontFallback= false) : string
Algorithm: XChaCha20-Poly1305
This mode uses a 64-bit random nonce with a 64-bit counter. IETF mode uses a 96-bit random nonce with a 32-bit counter.
| psalm-suppress | MixedArgument |
|---|
stringMessage to be encrypted
stringAuthenticated Associated Data (unencrypted)
stringNumber to be used only Once; must be 8 bytes
stringEncryption key
booleanDon't fallback to ext/sodium
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with a 16-byte Poly1305 message
authentication code appendedcrypto_aead_xchacha20poly1305_ietf_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_auth(string $message, string $key) : string
Algorithm: HMAC-SHA512-256. Which is HMAC-SHA-512 truncated to 256 bits. Not to be confused with HMAC-SHA-512/256 which would use the SHA-512/256 hash function (uses different initial parameters but still truncates to 256 bits to sidestep length-extension attacks).
| psalm-suppress | MixedArgument |
|---|
stringMessage to be authenticated
stringSymmetric authentication key
\SodiumException |
|
|---|---|
\TypeError |
stringMessage authentication codecrypto_auth_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_auth_verify(string $mac, string $message, string $key) : boolean
| psalm-suppress | MixedArgument |
|---|
stringMessage authentication code
stringMessage whose authenticity you are attempting to verify (with a given MAC and key)
stringSymmetric authentication key
\SodiumException |
|
|---|---|
\TypeError |
booleanTRUE if authenticated, FALSE otherwisecrypto_box(string $plaintext, string $nonce, string $keypair) : string
Algorithm: X25519-XSalsa20-Poly1305. X25519: Elliptic-Curve Diffie Hellman over Curve25519. XSalsa20: Extended-nonce variant of salsa20. Poyl1305: Polynomial MAC for one-time message authentication.
| psalm-suppress | MixedArgument |
|---|
stringThe message to be encrypted
stringA Number to only be used Once; must be 24 bytes
stringYour secret key and your recipient's public key
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with 16-byte Poly1305 MACcrypto_box_keypair() : string
| psalm-suppress | MixedArgument |
|---|
\SodiumException |
|
|---|---|
\TypeError |
stringA 64-byte string; the first 32 are your secret key, while
the last 32 are your public key. crypto_box_secretkey()
and crypto_box_publickey() exist to separate them so you
don't accidentally get them mixed up!crypto_box_keypair_from_secretkey_and_publickey(string $secretKey, string $publicKey) : string
| psalm-suppress | MixedArgument |
|---|
stringSecret key
stringPublic key
\SodiumException |
|
|---|---|
\TypeError |
stringKeypaircrypto_box_open(string $ciphertext, string $nonce, string $keypair) : string
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringEncrypted message
stringNumber to only be used Once; must be 24 bytes
stringYour secret key and the sender's public key
\SodiumException |
|
|---|---|
\TypeError |
stringThe original plaintext messagecrypto_box_publickey(string $keypair) : string
| psalm-suppress | MixedArgument |
|---|
stringKeypair containing secret and public key
\SodiumException |
|
|---|---|
\TypeError |
stringYour crypto_box public keycrypto_box_publickey_from_secretkey(string $secretKey) : string
| psalm-suppress | MixedArgument |
|---|
stringAny X25519 secret key
\SodiumException |
|
|---|---|
\TypeError |
stringThe corresponding X25519 public keycrypto_box_seal(string $plaintext, string $publicKey) : string
Algorithm: X25519-XSalsa20-Poly1305, as with crypto_box. The sender's X25519 keypair is ephemeral. Nonce is generated from the BLAKE2b hash of both public keys.
This provides ciphertext integrity.
| psalm-suppress | MixedArgument |
|---|
stringMessage to be sealed
stringYour recipient's public key
\SodiumException |
|
|---|---|
\TypeError |
stringSealed message that only your recipient can
decryptcrypto_box_seal_open(string $ciphertext, string $keypair) : string
This validates ciphertext integrity.
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringSealed message to be opened
stringYour crypto_box keypair
\SodiumException |
|
|---|---|
\TypeError |
stringThe original plaintext messagecrypto_box_secretkey(string $keypair) : string
| psalm-suppress | MixedArgument |
|---|
string
\SodiumException |
|
|---|---|
\TypeError |
stringYour crypto_box secret keycrypto_box_seed_keypair(string $seed) : string
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | UndefinedFunction |
string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_generichash(string $message, string|null $key= '', integer $length= self::CRYPTO_GENERICHASH_BYTES) : string
| psalm-suppress | MixedArgument |
|---|
stringThe message to be hashed
stringnullIf specified, must be a string between 16 and 64 bytes long
integerOutput length in bytes; must be between 16 and 64 (default = 32)
\SodiumException |
|
|---|---|
\TypeError |
stringRaw binarycrypto_generichash_final(string $ctx, integer $length = self::CRYPTO_GENERICHASH_BYTES) : string
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | ReferenceConstraintViolation |
stringBLAKE2 hashing context. Generated by crypto_generichash_init().
integerHash output size.
\SodiumException |
|
|---|---|
\TypeError |
stringFinal BLAKE2b hash.crypto_generichash_init(string|null $key= '', integer $length= self::CRYPTO_GENERICHASH_BYTES) : string
| psalm-suppress | MixedArgument |
|---|
stringnullIf specified must be a string between 16 and 64 bytes
integerThe size of the desired hash output
\SodiumException |
|
|---|---|
\TypeError |
stringA BLAKE2 hashing context, encoded as a string
(To be 100% compatible with ext/libsodium)crypto_generichash_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_generichash_update(string $ctx, string $message) : void
| param-out | string $ctx |
|---|---|
| psalm-suppress | MixedArgument |
| psalm-suppress | ReferenceConstraintViolation |
stringBLAKE2 hashing context. Generated by crypto_generichash_init(). $ctx is passed by reference and gets updated in-place.
stringThe message to append to the existing hash state.
\SodiumException |
|
|---|---|
\TypeError |
crypto_kx(string $my_secret, string $their_public, string $client_public, string $server_public) : string
Typically, you would designate one machine to be the client and the other to be the server. The first two keys are what you'd expect for scalarmult() below, but the latter two public keys don't swap places.
| ALICE | BOB | Client | Server | |
|---|---|---|---|---|
| shared = crypto_kx( | shared = crypto_kx( | |||
| alice_sk, | bob_sk, | <- contextual | ||
| bob_pk, | alice_pk, | <- contextual | ||
| alice_pk, | alice_pk, | <----- static | ||
| bob_pk | bob_pk | <----- static | ||
| ) | ) |
They are used along with the scalarmult product to generate a 256-bit BLAKE2b hash unique to the client and server keys.
| psalm-suppress | MixedArgument |
|---|
string
string
string
string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_pwhash(integer $outlen, string $passwd, string $salt, integer $opslimit, integer $memlimit, integer|null $alg = null) : string
| psalm-suppress | MixedArgument |
|---|
integer
string
string
integer
integer
integernull
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_pwhash_is_available() : boolean
This returns TRUE if the native crypto_pwhash API is available by libsodium. This returns FALSE if only sodium_compat is available.
booleancrypto_pwhash_scryptsalsa208sha256(integer $outlen, string $passwd, string $salt, integer $opslimit, integer $memlimit) : string
integer
string
string
integer
integer
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_pwhash_scryptsalsa208sha256_is_available() : boolean
This returns TRUE if the native crypto_pwhash API is available by libsodium. This returns FALSE if only sodium_compat is available.
booleancrypto_pwhash_scryptsalsa208sha256_str(string $passwd, integer $opslimit, integer $memlimit) : string
string
integer
integer
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_pwhash_scryptsalsa208sha256_str_verify(string $passwd, string $hash) : boolean
string
string
\SodiumException |
|
|---|---|
\TypeError |
booleancrypto_pwhash_str(string $passwd, integer $opslimit, integer $memlimit) : string
| psalm-suppress | MixedArgument |
|---|
string
integer
integer
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_pwhash_str_verify(string $passwd, string $hash) : boolean
| psalm-suppress | MixedArgument |
|---|
string
string
\SodiumException |
|
|---|---|
\TypeError |
booleancrypto_scalarmult(string $secretKey, string $publicKey) : string
Algorithm: X25519 (ECDH over Curve25519)
| psalm-suppress | MixedArgument |
|---|
string
string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_scalarmult_base(string $secretKey) : string
| psalm-suppress | TooFewArguments |
|---|---|
| psalm-suppress | MixedArgument |
string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_secretbox(string $plaintext, string $nonce, string $key) : string
Algorithm: XSalsa20-Poly1305
| psalm-suppress | MixedArgument |
|---|
stringThe message you're encrypting
stringA Number to be used Once; must be 24 bytes
stringSymmetric encryption key
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with Poly1305 MACcrypto_secretbox_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_secretbox_open(string $ciphertext, string $nonce, string $key) : string
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringCiphertext with Poly1305 MAC
stringA Number to be used Once; must be 24 bytes
stringSymmetric encryption key
\SodiumException |
|
|---|---|
\TypeError |
stringOriginal plaintext messagecrypto_secretbox_xchacha20poly1305(string $plaintext, string $nonce, string $key) : string
Algorithm: XChaCha20-Poly1305
| psalm-suppress | MixedArgument |
|---|
stringThe message you're encrypting
stringA Number to be used Once; must be 24 bytes
stringSymmetric encryption key
\SodiumException |
|
|---|---|
\TypeError |
stringCiphertext with Poly1305 MACcrypto_secretbox_xchacha20poly1305_open(string $ciphertext, string $nonce, string $key) : string
| psalm-suppress | MixedArgument |
|---|
stringCiphertext with Poly1305 MAC
stringA Number to be used Once; must be 24 bytes
stringSymmetric encryption key
\SodiumException |
|
|---|---|
\TypeError |
stringOriginal plaintext messagecrypto_shorthash(string $message, string $key) : string
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringInput message
stringSipHash-2-4 key
\SodiumException |
|
|---|---|
\TypeError |
stringHashcrypto_shorthash_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_sign(string $message, string $secretKey) : string
Algorithm: Ed25519 (EdDSA over Curve25519)
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringMessage to be signed.
stringSecret signing key.
\SodiumException |
|
|---|---|
\TypeError |
stringSigned message (signature is prefixed).crypto_sign_detached(string $message, string $secretKey) : string
Algorithm: Ed25519 (EdDSA over Curve25519)
| psalm-suppress | MixedArgument |
|---|
stringMessage to be signed
stringSecret signing key
\SodiumException |
|
|---|---|
\TypeError |
stringDigital signaturecrypto_sign_ed25519_pk_to_curve25519(string $pk) : string
| psalm-suppress | MixedArgument |
|---|
string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_sign_ed25519_sk_to_curve25519(string $sk) : string
| psalm-suppress | MixedArgument |
|---|
string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_sign_keypair() : string
\SodiumException |
|
|---|---|
\TypeError |
stringcrypto_sign_open(string $signedMessage, string $publicKey) : string
| psalm-suppress | MixedArgument |
|---|---|
| psalm-suppress | MixedInferredReturnType |
| psalm-suppress | MixedReturnStatement |
stringA signed message
stringA public key
\SodiumException |
|
|---|---|
\TypeError |
stringThe original message (if the signature is
valid for this public key)crypto_sign_publickey(string $keypair) : string
| psalm-suppress | MixedArgument |
|---|
stringKeypair
\SodiumException |
|
|---|---|
\TypeError |
stringPublic keycrypto_sign_publickey_from_secretkey(string $secretKey) : string
| psalm-suppress | MixedArgument |
|---|
stringYour Ed25519 secret key
\SodiumException |
|
|---|---|
\TypeError |
stringThe corresponding Ed25519 public keycrypto_sign_secretkey(string $keypair) : string
| psalm-suppress | MixedArgument |
|---|
stringKeypair
\SodiumException |
|
|---|---|
\TypeError |
stringSecret keycrypto_sign_seed_keypair(string $seed) : string
| psalm-suppress | MixedArgument |
|---|
stringInput seed
\SodiumException |
|
|---|---|
\TypeError |
stringKeypaircrypto_sign_verify_detached(string $signature, string $message, string $publicKey) : boolean
| psalm-suppress | MixedArgument |
|---|
stringDigital sginature
stringMessage to be verified
stringPublic key
\SodiumException |
|
|---|---|
\TypeError |
booleanTRUE if this signature is good for this public key;
FALSE otherwisecrypto_stream(integer $len, string $nonce, string $key) : string
| psalm-suppress | MixedArgument |
|---|
integerNumber of bytes desired
stringNumber to be used Once; must be 24 bytes
stringXSalsa20 key
\SodiumException |
|
|---|---|
\TypeError |
stringPseudorandom stream that can be XORed with messages
to provide encryption (but not authentication; see
Poly1305 or crypto_auth() for that, which is not
optional for security)crypto_stream_keygen() : string
\Exception |
|
|---|---|
\Error |
stringcrypto_stream_xor(string $message, string $nonce, string $key) : string
Unless you are following expert advice, do not used this feature.
Algorithm: XSalsa20
This DOES NOT provide ciphertext integrity.
| psalm-suppress | MixedArgument |
|---|
stringPlaintext message
stringNumber to be used Once; must be 24 bytes
stringEncryption key
\SodiumException |
|
|---|---|
\TypeError |
stringEncrypted text which is vulnerable to chosen-
ciphertext attacks unless you implement some
other mitigation to the ciphertext (i.e.
Encrypt then MAC)hex2bin(string $string) : string
| psalm-suppress | TooFewArguments |
|---|---|
| psalm-suppress | MixedArgument |
stringHexadecimal string
\SodiumException |
|
|---|---|
\TypeError |
stringRaw binary stringincrement(string $var) : void
| psalm-suppress | MixedArgument |
|---|
string
\SodiumException |
|
|---|---|
\TypeError |
library_version_major() : integer
| psalm-suppress | MixedInferredReturnType |
|---|---|
| psalm-suppress | UndefinedFunction |
integerlibrary_version_minor() : integer
| psalm-suppress | MixedInferredReturnType |
|---|---|
| psalm-suppress | UndefinedFunction |
integermemcmp(string $left, string $right) : integer
| psalm-suppress | MixedArgument |
|---|
string
string
\SodiumException |
|
|---|---|
\TypeError |
integermemzero(string|null $var) : void
| param-out | string|null $var |
|---|---|
| psalm-suppress | TooFewArguments |
stringnull
\SodiumException |
(Unless libsodium is installed) |
|---|---|
\TypeError |
polyfill_is_fast() : boolean
booleanrandombytes_buf(integer $numBytes) : string
Proudly uses /dev/urandom (if getrandom(2) is not available).
integer
\Exception |
|
|---|---|
\TypeError |
stringrandombytes_random16() : integer
\Exception |
|
|---|---|
\Error |
|
\TypeError |
integerrandombytes_uniform(integer $range) : integer
integer
\Exception |
|
|---|---|
\Error |
|
\TypeError |
integerruntime_speed_test(integer $iterations, integer $maxTimeout) : boolean
Usage: If runtime_speed_test() returns FALSE, then our 32-bit implementation is to slow to use safely without risking timeouts. If this happens, install sodium from PECL to get acceptable performance.
integerNumber of multiplications to attempt
integerMilliseconds
\SodiumException |
|---|
booleanTRUE if we're fast enough, FALSE is notversion_string() : string
| psalm-suppress | MixedInferredReturnType |
|---|---|
| psalm-suppress | UndefinedFunction |
stringuseNewSodiumAPI() : boolean
| ref | https://wiki.php.net/rfc/libsodium |
|---|
booleanuse_fallback(string $sodium_func_name = '') : boolean
If ext/libsodium is available, use it. Return TRUE. Otherwise, we have to use the code provided herein. Return FALSE.
string
boolean$disableFallbackForUnitTests : boolean
falseIt should only be used for unit testing.
$fastMult : boolean
falseCRYPTO_AEAD_AES256GCM_ABYTES = 16
CRYPTO_AEAD_AES256GCM_KEYBYTES = 32
CRYPTO_AEAD_AES256GCM_NPUBBYTES = 12
CRYPTO_AEAD_AES256GCM_NSECBYTES = 0
CRYPTO_AEAD_CHACHA20POLY1305_ABYTES = 16
CRYPTO_AEAD_CHACHA20POLY1305_IETF_ABYTES = 16
CRYPTO_AEAD_CHACHA20POLY1305_IETF_KEYBYTES = 32
CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES = 12
CRYPTO_AEAD_CHACHA20POLY1305_IETF_NSECBYTES = 0
CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES = 32
CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES = 8
CRYPTO_AEAD_CHACHA20POLY1305_NSECBYTES = 0
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES = 16
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES = 32
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES = 24
CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NSECBYTES = 0
CRYPTO_AUTH_BYTES = 32
CRYPTO_AUTH_KEYBYTES = 32
CRYPTO_BOX_KEYPAIRBYTES = 64
CRYPTO_BOX_MACBYTES = 16
CRYPTO_BOX_NONCEBYTES = 24
CRYPTO_BOX_PUBLICKEYBYTES = 32
CRYPTO_BOX_SEALBYTES = 16
CRYPTO_BOX_SECRETKEYBYTES = 32
CRYPTO_BOX_SEEDBYTES = 32
CRYPTO_GENERICHASH_BYTES = 32
CRYPTO_GENERICHASH_BYTES_MAX = 64
CRYPTO_GENERICHASH_BYTES_MIN = 16
CRYPTO_GENERICHASH_KEYBYTES = 32
CRYPTO_GENERICHASH_KEYBYTES_MAX = 64
CRYPTO_GENERICHASH_KEYBYTES_MIN = 16
CRYPTO_KX_BYTES = 32
CRYPTO_KX_PUBLICKEYBYTES = 32
CRYPTO_KX_SECRETKEYBYTES = 32
CRYPTO_KX_SEEDBYTES = 32
CRYPTO_PWHASH_ALG_ARGON2I13 = 1
CRYPTO_PWHASH_ALG_ARGON2ID13 = 2
CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE = 33554432
CRYPTO_PWHASH_MEMLIMIT_MODERATE = 134217728
CRYPTO_PWHASH_MEMLIMIT_SENSITIVE = 536870912
CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE = 4
CRYPTO_PWHASH_OPSLIMIT_MODERATE = 6
CRYPTO_PWHASH_OPSLIMIT_SENSITIVE = 8
CRYPTO_PWHASH_SALTBYTES = 16
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_INTERACTIVE = 16777216
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_SENSITIVE = 1073741824
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_INTERACTIVE = 534288
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_SENSITIVE = 33554432
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES = 32
CRYPTO_PWHASH_SCRYPTSALSA208SHA256_STRPREFIX = '$7$'
CRYPTO_PWHASH_STRPREFIX = '$argon2i$'
CRYPTO_SCALARMULT_BYTES = 32
CRYPTO_SCALARMULT_SCALARBYTES = 32
CRYPTO_SECRETBOX_KEYBYTES = 32
CRYPTO_SECRETBOX_MACBYTES = 16
CRYPTO_SECRETBOX_NONCEBYTES = 24
CRYPTO_SHORTHASH_BYTES = 8
CRYPTO_SHORTHASH_KEYBYTES = 16
CRYPTO_SIGN_BYTES = 64
CRYPTO_SIGN_KEYPAIRBYTES = 96
CRYPTO_SIGN_PUBLICKEYBYTES = 32
CRYPTO_SIGN_SECRETKEYBYTES = 64
CRYPTO_SIGN_SEEDBYTES = 32
CRYPTO_STREAM_KEYBYTES = 32
CRYPTO_STREAM_NONCEBYTES = 24
LIBRARY_VERSION_MAJOR = 9
LIBRARY_VERSION_MINOR = 1
VERSION_STRING = 'polyfill-1.0.8'