The MD5 function is now considered cryptographically broken. Namely, it is trivial to find multiple inputs producing the same hash. For a fast-performing, cryptographically secure hash function, see SHA512/256, BLAKE2 or BLAKE3.

Fields

s: [4]u32,
buf: [64]u8,
buf_len: u8,
total_len: u64,

Namespaces

Functions

fn final(d: *Self, out: *[digest_length]u8) void

No documentation provided.

fn hash(b: []const u8, out: *[digest_length]u8, options: Options) void

No documentation provided.

fn init(options: Options) Self

No documentation provided.

fn update(d: *Self, b: []const u8) void

No documentation provided.

Values

block_length
comptime_int
digest_length
comptime_int