Vault 7: Projects
This publication series is about specific projects related to the Vault 7 main publication.
1.4.3 How the Library Works
Provides a description of how the library works.
Description
Each algorithm implemented by the crypto hash library operates in the same way. First, the user will initialize a hash
"context," which will store temporary hash values and information about the hash being calculated. The user will then provide
some message data to the hash module. The cryptographic hash algorithms implemented by this library will parse the
message data into blocks and run the hash algorithm on each of those blocks. When the user has passed all of the message
to the hash module, he or she will instruct the module to finish calculating the hash. The module will add any necessary
padding to the message, finish calculating the hash, and return a message digest to the user.
1.4 Using the Library MLA - Crypto Hash Library Help How the Library Works
8
1
Protego_Release_01_05-Related-OEM-Documentation-MLA_v2013_12_20-help_mla_crypto_hash.pdf