Mercurial > dropbear
comparison crypt.out @ 0:d7da3b1e1540 libtomcrypt
put back the 0.95 makefile which was inadvertently merged over
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Mon, 31 May 2004 18:21:40 +0000 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:d7da3b1e1540 |
---|---|
1 \BOOKMARK [0][-]{chapter.1}{Introduction}{} | |
2 \BOOKMARK [1][-]{section.1.1}{What is the LibTomCrypt?}{chapter.1} | |
3 \BOOKMARK [2][-]{subsection.1.1.1}{What the library IS for?}{section.1.1} | |
4 \BOOKMARK [2][-]{subsection.1.1.2}{What the library IS NOT for?}{section.1.1} | |
5 \BOOKMARK [1][-]{section.1.2}{Why did I write it?}{chapter.1} | |
6 \BOOKMARK [2][-]{subsection.1.2.1}{Modular}{section.1.2} | |
7 \BOOKMARK [1][-]{section.1.3}{License}{chapter.1} | |
8 \BOOKMARK [1][-]{section.1.4}{Patent Disclosure}{chapter.1} | |
9 \BOOKMARK [1][-]{section.1.5}{Building the library}{chapter.1} | |
10 \BOOKMARK [1][-]{section.1.6}{Building against the library}{chapter.1} | |
11 \BOOKMARK [1][-]{section.1.7}{Thanks}{chapter.1} | |
12 \BOOKMARK [0][-]{chapter.2}{The Application Programming Interface \(API\)}{} | |
13 \BOOKMARK [1][-]{section.2.1}{Introduction}{chapter.2} | |
14 \BOOKMARK [1][-]{section.2.2}{Macros}{chapter.2} | |
15 \BOOKMARK [1][-]{section.2.3}{Functions with Variable Length Output}{chapter.2} | |
16 \BOOKMARK [1][-]{section.2.4}{Functions that need a PRNG}{chapter.2} | |
17 \BOOKMARK [1][-]{section.2.5}{Functions that use Arrays of Octets}{chapter.2} | |
18 \BOOKMARK [0][-]{chapter.3}{Symmetric Block Ciphers}{} | |
19 \BOOKMARK [1][-]{section.3.1}{Core Functions}{chapter.3} | |
20 \BOOKMARK [1][-]{section.3.2}{Key Sizes and Number of Rounds}{chapter.3} | |
21 \BOOKMARK [1][-]{section.3.3}{The Cipher Descriptors}{chapter.3} | |
22 \BOOKMARK [2][-]{subsection.3.3.1}{Notes}{section.3.3} | |
23 \BOOKMARK [1][-]{section.3.4}{Symmetric Modes of Operations}{chapter.3} | |
24 \BOOKMARK [2][-]{subsection.3.4.1}{Background}{section.3.4} | |
25 \BOOKMARK [2][-]{subsection.3.4.2}{Choice of Mode}{section.3.4} | |
26 \BOOKMARK [2][-]{subsection.3.4.3}{Implementation}{section.3.4} | |
27 \BOOKMARK [1][-]{section.3.5}{Encrypt and Authenticate Modes}{chapter.3} | |
28 \BOOKMARK [2][-]{subsection.3.5.1}{EAX Mode}{section.3.5} | |
29 \BOOKMARK [2][-]{subsection.3.5.2}{OCB Mode}{section.3.5} | |
30 \BOOKMARK [0][-]{chapter.4}{One-Way Cryptographic Hash Functions}{} | |
31 \BOOKMARK [1][-]{section.4.1}{Core Functions}{chapter.4} | |
32 \BOOKMARK [1][-]{section.4.2}{Hash Descriptors}{chapter.4} | |
33 \BOOKMARK [2][-]{subsection.4.2.1}{Notice}{section.4.2} | |
34 \BOOKMARK [0][-]{chapter.5}{Message Authentication Codes}{} | |
35 \BOOKMARK [1][-]{section.5.1}{HMAC Protocol}{chapter.5} | |
36 \BOOKMARK [1][-]{section.5.2}{OMAC Support}{chapter.5} | |
37 \BOOKMARK [1][-]{section.5.3}{PMAC Support}{chapter.5} | |
38 \BOOKMARK [0][-]{chapter.6}{Pseudo-Random Number Generators}{} | |
39 \BOOKMARK [1][-]{section.6.1}{Core Functions}{chapter.6} | |
40 \BOOKMARK [2][-]{subsection.6.1.1}{Remarks}{section.6.1} | |
41 \BOOKMARK [2][-]{subsection.6.1.2}{Example}{section.6.1} | |
42 \BOOKMARK [1][-]{section.6.2}{PRNG Descriptors}{chapter.6} | |
43 \BOOKMARK [1][-]{section.6.3}{The Secure RNG}{chapter.6} | |
44 \BOOKMARK [2][-]{subsection.6.3.1}{The Secure PRNG Interface}{section.6.3} | |
45 \BOOKMARK [0][-]{chapter.7}{RSA Routines}{} | |
46 \BOOKMARK [1][-]{section.7.1}{Background}{chapter.7} | |
47 \BOOKMARK [1][-]{section.7.2}{Core Functions}{chapter.7} | |
48 \BOOKMARK [1][-]{section.7.3}{Packet Routines}{chapter.7} | |
49 \BOOKMARK [1][-]{section.7.4}{Remarks}{chapter.7} | |
50 \BOOKMARK [0][-]{chapter.8}{Diffie-Hellman Key Exchange}{} | |
51 \BOOKMARK [1][-]{section.8.1}{Background}{chapter.8} | |
52 \BOOKMARK [1][-]{section.8.2}{Core Functions}{chapter.8} | |
53 \BOOKMARK [2][-]{subsection.8.2.1}{Remarks on Usage}{section.8.2} | |
54 \BOOKMARK [2][-]{subsection.8.2.2}{Remarks on The Snippet}{section.8.2} | |
55 \BOOKMARK [1][-]{section.8.3}{Other Diffie-Hellman Functions}{chapter.8} | |
56 \BOOKMARK [1][-]{section.8.4}{DH Packet}{chapter.8} | |
57 \BOOKMARK [0][-]{chapter.9}{Elliptic Curve Cryptography}{} | |
58 \BOOKMARK [1][-]{section.9.1}{Background}{chapter.9} | |
59 \BOOKMARK [1][-]{section.9.2}{Core Functions}{chapter.9} | |
60 \BOOKMARK [1][-]{section.9.3}{ECC Packet}{chapter.9} | |
61 \BOOKMARK [1][-]{section.9.4}{ECC Keysizes}{chapter.9} | |
62 \BOOKMARK [0][-]{chapter.10}{Digital Signature Algorithm}{} | |
63 \BOOKMARK [1][-]{section.10.1}{Introduction}{chapter.10} | |
64 \BOOKMARK [1][-]{section.10.2}{Key Generation}{chapter.10} | |
65 \BOOKMARK [1][-]{section.10.3}{Key Verification}{chapter.10} | |
66 \BOOKMARK [1][-]{section.10.4}{Signatures}{chapter.10} | |
67 \BOOKMARK [1][-]{section.10.5}{Import and Export}{chapter.10} | |
68 \BOOKMARK [0][-]{chapter.11}{Public Keyrings}{} | |
69 \BOOKMARK [1][-]{section.11.1}{Introduction}{chapter.11} | |
70 \BOOKMARK [1][-]{section.11.2}{The Keyring API}{chapter.11} | |
71 \BOOKMARK [0][-]{chapter.12}{GF\(2w\) Math Routines}{} | |
72 \BOOKMARK [0][-]{chapter.13}{Miscellaneous}{} | |
73 \BOOKMARK [1][-]{section.13.1}{Base64 Encoding and Decoding}{chapter.13} | |
74 \BOOKMARK [1][-]{section.13.2}{The Multiple Precision Integer Library \(MPI\)}{chapter.13} | |
75 \BOOKMARK [2][-]{subsection.13.2.1}{Binary Forms of ``mp\137int'' Variables}{section.13.2} | |
76 \BOOKMARK [2][-]{subsection.13.2.2}{Primality Testing}{section.13.2} | |
77 \BOOKMARK [0][-]{chapter.14}{Programming Guidelines}{} | |
78 \BOOKMARK [1][-]{section.14.1}{Secure Pseudo Random Number Generators}{chapter.14} | |
79 \BOOKMARK [1][-]{section.14.2}{Preventing Trivial Errors}{chapter.14} | |
80 \BOOKMARK [1][-]{section.14.3}{Registering Your Algorithms}{chapter.14} | |
81 \BOOKMARK [1][-]{section.14.4}{Key Sizes}{chapter.14} | |
82 \BOOKMARK [2][-]{subsection.14.4.1}{Symmetric Ciphers}{section.14.4} | |
83 \BOOKMARK [2][-]{subsection.14.4.2}{Assymetric Ciphers}{section.14.4} | |
84 \BOOKMARK [1][-]{section.14.5}{Thread Safety}{chapter.14} | |
85 \BOOKMARK [0][-]{chapter.15}{Configuring the Library}{} | |
86 \BOOKMARK [1][-]{section.15.1}{Introduction}{chapter.15} | |
87 \BOOKMARK [1][-]{section.15.2}{mycrypt\137cfg.h}{chapter.15} | |
88 \BOOKMARK [1][-]{section.15.3}{The Configure Script}{chapter.15} |