Sophie

Sophie

distrib > Mageia > 6 > x86_64 > by-pkgid > f835bee5b8b7ec08e20fae17cab51e63 > files > 344

lib64mbedtls-devel-2.7.3-1.mga6.x86_64.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.13"/>
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>mbed TLS v2.7.3: Encryption/decryption module</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td id="projectalign" style="padding-left: 0.5em;">
   <div id="projectname">mbed TLS v2.7.3
   </div>
  </td>
 </tr>
 </tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.13 -->
<script type="text/javascript" src="menudata.js"></script>
<script type="text/javascript" src="menu.js"></script>
<script type="text/javascript">
$(function() {
  initMenu('',false,false,'search.php','Search');
});
</script>
<div id="main-nav"></div>
</div><!-- top -->
<div class="header">
  <div class="headertitle">
<div class="title">Encryption/decryption module</div>  </div>
</div><!--header-->
<div class="contents">
<p>The Encryption/decryption module provides encryption/decryption functions. One can differentiate between symmetric and asymmetric algorithms; the symmetric ones are mostly used for message confidentiality and the asymmetric ones for key exchange and message integrity. Some symmetric algorithms provide different block cipher modes, mainly Electronic Code Book (ECB) which is used for short (64-bit) messages and Cipher Block Chaining (CBC) which provides the structure needed for longer messages. In addition the Cipher Feedback Mode (CFB-128) stream cipher mode, Counter mode (CTR) and Galois Counter Mode (GCM) are implemented for specific algorithms.</p>
<p>All symmetric encryption algorithms are accessible via the generic cipher layer (see <code><a class="el" href="cipher_8h.html#a009056b59d69abba5843ce78cd9aae1c" title="This function initializes and fills the cipher-context structure with the appropriate values...">mbedtls_cipher_setup()</a></code>).</p>
<p>The asymmetric encryptrion algorithms are accessible via the generic public key layer (see <code><a class="el" href="pk_8h.html#a999d1160bb30c03d0c4382c3a9b0aa89" title="Initialize a mbedtls_pk_context (as NONE) ">mbedtls_pk_init()</a></code>).</p>
<p>The following algorithms are provided:</p><ul>
<li>Symmetric:<ul>
<li>AES (see <code><a class="el" href="aes_8h.html#a0e59fdda18a145e702984268b9ab291a" title="This function performs an AES single-block encryption or decryption operation. ">mbedtls_aes_crypt_ecb()</a></code>, <code><a class="el" href="aes_8h.html#a321834eafbf0dacb36dac343bfd6b35d" title="This function performs an AES-CBC encryption or decryption operation on full blocks. ">mbedtls_aes_crypt_cbc()</a></code>, <code><a class="el" href="aes_8h.html#a944946adabbc344f2c6cf6e6f51a21e3" title="This function performs an AES-CFB128 encryption or decryption operation. ">mbedtls_aes_crypt_cfb128()</a></code> and <code><a class="el" href="aes_8h.html#a375c98cba4c5806d3a39c7d1e1e226da" title="This function performs an AES-CTR encryption or decryption operation. ">mbedtls_aes_crypt_ctr()</a></code>).</li>
<li>ARCFOUR (see <code><a class="el" href="arc4_8h.html#a51d378246f0c277a68352cdac782e8fb" title="ARC4 cipher function. ">mbedtls_arc4_crypt()</a></code>).</li>
<li>Blowfish / BF (see <code><a class="el" href="blowfish_8h.html#afe15cef6820aa39a999e7268bf6f4c29" title="Blowfish-ECB block encryption/decryption. ">mbedtls_blowfish_crypt_ecb()</a></code>, <code><a class="el" href="blowfish_8h.html#a24f95511214b38914090036938cbc045" title="Blowfish-CBC buffer encryption/decryption Length should be a multiple of the block size (8 bytes) ...">mbedtls_blowfish_crypt_cbc()</a></code>, <code><a class="el" href="blowfish_8h.html#af3996e5bb50864497b0c7349819ffd12" title="Blowfish CFB buffer encryption/decryption. ">mbedtls_blowfish_crypt_cfb64()</a></code> and <code><a class="el" href="blowfish_8h.html#a7d1688bf5fb906fdbad101e08bc8bf85" title="Blowfish-CTR buffer encryption/decryption. ">mbedtls_blowfish_crypt_ctr()</a></code>)</li>
<li>Camellia (see <code><a class="el" href="camellia_8h.html#a4399c4d56cd27ffb610abeb70d51f8f7" title="CAMELLIA-ECB block encryption/decryption. ">mbedtls_camellia_crypt_ecb()</a></code>, <code><a class="el" href="camellia_8h.html#a6121d988f0fa571adbb3eea80560c545" title="CAMELLIA-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes) ...">mbedtls_camellia_crypt_cbc()</a></code>, <code><a class="el" href="camellia_8h.html#afffb8f6eeac954fbdddb3c99ad0f87c6" title="CAMELLIA-CFB128 buffer encryption/decryption. ">mbedtls_camellia_crypt_cfb128()</a></code> and <code><a class="el" href="camellia_8h.html#ae90ed9ce4edf59d5219c64a0d2b3d23d" title="CAMELLIA-CTR buffer encryption/decryption. ">mbedtls_camellia_crypt_ctr()</a></code>).</li>
<li>DES/3DES (see <code><a class="el" href="des_8h.html#aa713501cc3e30c39a763b4568698f5c1" title="DES-ECB block encryption/decryption. ">mbedtls_des_crypt_ecb()</a></code>, <code><a class="el" href="des_8h.html#a95353a2f0d2e8d1377f43f71ca12a231" title="DES-CBC buffer encryption/decryption. ">mbedtls_des_crypt_cbc()</a></code>, <code><a class="el" href="des_8h.html#a933b8f629cc201e06f5e89396d065204" title="3DES-ECB block encryption/decryption ">mbedtls_des3_crypt_ecb()</a></code> and <code><a class="el" href="des_8h.html#a4f5bb9106306e11c906abfa46fc51b94" title="3DES-CBC buffer encryption/decryption ">mbedtls_des3_crypt_cbc()</a></code>).</li>
<li>GCM (AES-GCM and CAMELLIA-GCM) (see <code><a class="el" href="gcm_8h.html#ac3f60a663c6b01ef6d977ac06aac57df" title="This function initializes the specified GCM context, to make references valid, and prepares the conte...">mbedtls_gcm_init()</a></code>)</li>
<li>XTEA (see <code><a class="el" href="xtea_8h.html#a73a0ce1ac62aa079107736ef2aa4b21d" title="XTEA cipher function. ">mbedtls_xtea_crypt_ecb()</a></code>).</li>
</ul>
</li>
<li>Asymmetric:<ul>
<li>Diffie-Hellman-Merkle (see <code><a class="el" href="dhm_8h.html#a1fe799e776fd0f27eb4080248e547f3d" title="This function imports the public value G^Y of the peer. ">mbedtls_dhm_read_public()</a></code>, <code><a class="el" href="dhm_8h.html#af49bee438130355e24540f7565e7465f" title="This function creates its own private value X and exports G^X. ">mbedtls_dhm_make_public()</a></code> and <code><a class="el" href="dhm_8h.html#ac3985de01420d018ed91daec9e7d7969" title="This function derives and exports the shared secret (G^Y)^X mod P. ">mbedtls_dhm_calc_secret()</a></code>).</li>
<li>RSA (see <code><a class="el" href="rsa_8h.html#a9db0f76aff9a6ce179b6fbe329bf5569" title="This function performs an RSA public key operation. ">mbedtls_rsa_public()</a></code> and <code><a class="el" href="rsa_8h.html#a3e016741ddaa354916ade4d48e9a0965" title="This function performs an RSA private key operation. ">mbedtls_rsa_private()</a></code>).</li>
<li>Elliptic Curves over GF(p) (see <code><a class="el" href="ecp_8h.html#ae069f80bc2f9cf2215c34430a9ccd924" title="Initialize a point (as zero) ">mbedtls_ecp_point_init()</a></code>).</li>
<li>Elliptic Curve Digital Signature Algorithm (ECDSA) (see <code><a class="el" href="ecdsa_8h.html#aca644ee02921388fdc42eb06377f4b62" title="This function initializes an ECDSA context. ">mbedtls_ecdsa_init()</a></code>).</li>
<li>Elliptic Curve Diffie Hellman (ECDH) (see <code><a class="el" href="ecdh_8h.html#a97e787a12f7aae180ab9828303199dca" title="This function initializes an ECDH context. ">mbedtls_ecdh_init()</a></code>).</li>
</ul>
</li>
</ul>
<p>This module provides encryption/decryption which can be used to provide secrecy.</p>
<p>It also provides asymmetric key functions which can be used for confidentiality, integrity, authentication and non-repudiation. </p>
</div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated on Tue May 8 2018 21:08:42 for mbed TLS v2.7.3 by &#160;<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/>
</a> 1.8.13
</small></address>
</body>
</html>