You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Bring swift-crypto up to date with CryptoKit 2025 Beta 1 (#359)
This PR sets swift-crypto up for alignment with the WWDC 2025 CryptoKit
APIs. This includes the parity APIs for MLKEM and MLDSA, as well as
XWing.
At this time the SHA3 APIs are disabled, as they require a novel
implementation strategy. This will come later in the summer. All API
features that require SHA3 are therefore also disabled at runtime.
/// - key: A cryptographic key used to seal the message.
44
-
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``AES.GCM.Nonce()``.
47
+
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``AES/GCM/Nonce/init()``.
45
48
/// - authenticatedData: Additional data to be authenticated.
/// - key: A cryptographic key used to seal the message.
59
-
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``AES.GCM.Nonce()``.
62
+
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``AES/GCM/Nonce/init()``.
60
63
///
61
64
/// - Returns: The sealed message.
62
65
publicstaticfunc seal<Plaintext:DataProtocol>
63
-
(_ message:Plaintext, using key:SymmetricKey, nonce:Nonce?=nil)throws->SealedBox{
66
+
(_ message:Plaintext, using key:SymmetricKey, nonce:Nonce?=nil)throws(CryptoKitMetaError)->SealedBox{
@@ -39,7 +43,7 @@ public enum ChaChaPoly: Cipher {
39
43
/// - Parameters:
40
44
/// - message: The plaintext data to seal.
41
45
/// - key: A cryptographic key used to seal the message.
42
-
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``ChaChaPoly.Nonce()``.
46
+
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``ChaChaPoly/Nonce/init()``.
43
47
/// - authenticatedData: Additional data to be authenticated.
44
48
///
45
49
/// - Returns: The sealed message.
@@ -54,7 +58,7 @@ public enum ChaChaPoly: Cipher {
54
58
/// - Parameters:
55
59
/// - message: The plaintext data to seal.
56
60
/// - key: A cryptographic key used to seal the message.
57
-
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``ChaChaPoly.Nonce()``.
61
+
/// - nonce: The nonce the sealing process requires. If you don't provide a nonce, the method generates a random one by invoking ``ChaChaPoly/Nonce/init()``.
0 commit comments