[
Top
]
[
Contents
]
[
Index
]
[
?
]
Table of Contents
1. Introduction
1.1 Getting Started
1.2 Features
1.3 Overview
2. Preparation
2.1 Header
2.2 Building sources
2.3 Building sources using Automake
2.4 Initializing the library
2.5 Multi-Threading
2.6 How to enable the FIPS mode
3. Generalities
3.1 Controlling the library
3.2 Modules
3.3 Error Handling
3.3.1 Error Values
3.3.2 Error Sources
3.3.3 Error Codes
3.3.4 Error Strings
4. Handler Functions
4.1 Progress handler
4.2 Allocation handler
4.3 Error handler
4.4 Logging handler
5. Symmetric cryptography
5.1 Available ciphers
5.2 Cipher modules
5.3 Available cipher modes
5.4 Working with cipher handles
5.5 General cipher functions
6. Public Key cryptography
6.1 Available algorithms
6.2 Used S-expressions
6.2.1 RSA key parameters
6.2.2 DSA key parameters
6.2.3 ECC key parameters
6.3 Public key modules
6.4 Cryptographic Functions
6.5 General public-key related Functions
6.6 Alternative Public Key Interface
6.6.1 Available asymmetric algorithms
6.6.2 Working with sets of data
6.6.3 Working with IO objects
6.6.4 Working with handles
6.6.5 Working with keys
6.6.6 Using cryptographic functions
6.6.7 Handle-independent functions
7. Hashing
7.1 Available hash algorithms
7.2 Hash algorithm modules
7.3 Working with hash algorithms
8. Random Numbers
8.1 Quality of random numbers
8.2 Retrieving random numbers
9. S-expressions
9.1 Data types for S-expressions
9.2 Working with S-expressions
10. MPI library
10.1 Data types
10.2 Basic functions
10.3 MPI formats
10.4 Calculations
10.5 Comparisons
10.6 Bit manipulations
10.7 Miscellaneous
11. Prime numbers
11.1 Generation
11.2 Checking
12. Utilities
12.1 Memory allocation
13. Architecture
13.1 Public-Key Architecture
13.2 Symmetric Encryption Subsystem Architecture
13.3 Hashing and MACing Subsystem Architecture
13.4 Multi-Precision-Integer Subsystem Architecture
13.5 Prime-Number-Generator Subsystem Architecture
13.6 Random-Number Subsystem Architecture
13.6.1 Description of the CSPRNG
13.6.2 Description of the FIPS X9.31 PRNG
A. Description of the Self-Tests
A.1 Power-Up Tests
A.1.1 Symmetric Cipher Algorithm Power-Up Tests
A.1.2 Hash Algorithm Power-Up Tests
A.1.3 MAC Algorithm Power-Up Tests
A.1.4 Random Number Power-Up Test
A.1.5 Public Key Algorithm Power-Up Tests
A.1.6 Integrity Power-Up Tests
A.1.7 Critical Functions Power-Up Tests
A.2 Conditional Tests
A.2.1 Key-Pair Generation Tests
A.2.2 Software Load Tests
A.2.3 Manual Key Entry Tests
A.2.4 Continuous RNG Tests
A.3 Application Requested Tests
A.3.1 Symmetric Cipher Algorithm Tests
A.3.2 Hash Algorithm Tests
A.3.3 MAC Algorithm Tests
B. Description of the FIPS Mode
B.1 Restrictions in FIPS Mode
B.2 FIPS Finite State Machine
B.3 FIPS Miscellaneous Information
GNU Lesser General Public License
GNU General Public License
List of Figures and Tables
Concept Index
Function and Data Index
[
Top
]
[
Contents
]
[
Index
]
[
?
]
This document was generated by
root
on
February, 17 2010
using
texi2html 1.78
.