www.usr.com/support/gpl/USR9107_release.1.4.tar.gz
[bcm963xx.git] / userapps / opensource / sshd / libtomcrypt / crypt.out
1 \BOOKMARK [0][-]{chapter.1}{Introduction}{}\r
2 \BOOKMARK [1][-]{section.1.1}{What is the LibTomCrypt?}{chapter.1}\r
3 \BOOKMARK [2][-]{subsection.1.1.1}{What the library IS for?}{section.1.1}\r
4 \BOOKMARK [2][-]{subsection.1.1.2}{What the library IS NOT for?}{section.1.1}\r
5 \BOOKMARK [1][-]{section.1.2}{Why did I write it?}{chapter.1}\r
6 \BOOKMARK [2][-]{subsection.1.2.1}{Modular}{section.1.2}\r
7 \BOOKMARK [1][-]{section.1.3}{License}{chapter.1}\r
8 \BOOKMARK [1][-]{section.1.4}{Patent Disclosure}{chapter.1}\r
9 \BOOKMARK [1][-]{section.1.5}{Building the library}{chapter.1}\r
10 \BOOKMARK [1][-]{section.1.6}{Building against the library}{chapter.1}\r
11 \BOOKMARK [1][-]{section.1.7}{Thanks}{chapter.1}\r
12 \BOOKMARK [0][-]{chapter.2}{The Application Programming Interface \(API\)}{}\r
13 \BOOKMARK [1][-]{section.2.1}{Introduction}{chapter.2}\r
14 \BOOKMARK [1][-]{section.2.2}{Macros}{chapter.2}\r
15 \BOOKMARK [1][-]{section.2.3}{Functions with Variable Length Output}{chapter.2}\r
16 \BOOKMARK [1][-]{section.2.4}{Functions that need a PRNG}{chapter.2}\r
17 \BOOKMARK [1][-]{section.2.5}{Functions that use Arrays of Octets}{chapter.2}\r
18 \BOOKMARK [0][-]{chapter.3}{Symmetric Block Ciphers}{}\r
19 \BOOKMARK [1][-]{section.3.1}{Core Functions}{chapter.3}\r
20 \BOOKMARK [1][-]{section.3.2}{Key Sizes and Number of Rounds}{chapter.3}\r
21 \BOOKMARK [1][-]{section.3.3}{The Cipher Descriptors}{chapter.3}\r
22 \BOOKMARK [2][-]{subsection.3.3.1}{Notes}{section.3.3}\r
23 \BOOKMARK [1][-]{section.3.4}{Symmetric Modes of Operations}{chapter.3}\r
24 \BOOKMARK [2][-]{subsection.3.4.1}{Background}{section.3.4}\r
25 \BOOKMARK [2][-]{subsection.3.4.2}{Choice of Mode}{section.3.4}\r
26 \BOOKMARK [2][-]{subsection.3.4.3}{Implementation}{section.3.4}\r
27 \BOOKMARK [0][-]{chapter.4}{One-Way Cryptographic Hash Functions}{}\r
28 \BOOKMARK [1][-]{section.4.1}{Core Functions}{chapter.4}\r
29 \BOOKMARK [1][-]{section.4.2}{Hash Descriptors}{chapter.4}\r
30 \BOOKMARK [2][-]{subsection.4.2.1}{Notice}{section.4.2}\r
31 \BOOKMARK [1][-]{section.4.3}{Hash based Message Authenication Codes}{chapter.4}\r
32 \BOOKMARK [0][-]{chapter.5}{Pseudo-Random Number Generators}{}\r
33 \BOOKMARK [1][-]{section.5.1}{Core Functions}{chapter.5}\r
34 \BOOKMARK [2][-]{subsection.5.1.1}{Remarks}{section.5.1}\r
35 \BOOKMARK [2][-]{subsection.5.1.2}{Example}{section.5.1}\r
36 \BOOKMARK [1][-]{section.5.2}{PRNG Descriptors}{chapter.5}\r
37 \BOOKMARK [1][-]{section.5.3}{The Secure RNG}{chapter.5}\r
38 \BOOKMARK [2][-]{subsection.5.3.1}{The Secure PRNG Interface}{section.5.3}\r
39 \BOOKMARK [0][-]{chapter.6}{RSA Routines}{}\r
40 \BOOKMARK [1][-]{section.6.1}{Background}{chapter.6}\r
41 \BOOKMARK [1][-]{section.6.2}{Core Functions}{chapter.6}\r
42 \BOOKMARK [1][-]{section.6.3}{Packet Routines}{chapter.6}\r
43 \BOOKMARK [1][-]{section.6.4}{Remarks}{chapter.6}\r
44 \BOOKMARK [0][-]{chapter.7}{Diffie-Hellman Key Exchange}{}\r
45 \BOOKMARK [1][-]{section.7.1}{Background}{chapter.7}\r
46 \BOOKMARK [1][-]{section.7.2}{Core Functions}{chapter.7}\r
47 \BOOKMARK [2][-]{subsection.7.2.1}{Remarks on Usage}{section.7.2}\r
48 \BOOKMARK [2][-]{subsection.7.2.2}{Remarks on The Snippet}{section.7.2}\r
49 \BOOKMARK [1][-]{section.7.3}{Other Diffie-Hellman Functions}{chapter.7}\r
50 \BOOKMARK [1][-]{section.7.4}{DH Packet}{chapter.7}\r
51 \BOOKMARK [0][-]{chapter.8}{Elliptic Curve Cryptography}{}\r
52 \BOOKMARK [1][-]{section.8.1}{Background}{chapter.8}\r
53 \BOOKMARK [1][-]{section.8.2}{Core Functions}{chapter.8}\r
54 \BOOKMARK [1][-]{section.8.3}{ECC Packet}{chapter.8}\r
55 \BOOKMARK [1][-]{section.8.4}{ECC Keysizes}{chapter.8}\r
56 \BOOKMARK [0][-]{chapter.9}{Public Keyrings}{}\r
57 \BOOKMARK [1][-]{section.9.1}{Introduction}{chapter.9}\r
58 \BOOKMARK [1][-]{section.9.2}{The Keyring API}{chapter.9}\r
59 \BOOKMARK [0][-]{chapter.10}{GF\(2w\) Math Routines}{}\r
60 \BOOKMARK [0][-]{chapter.11}{Miscellaneous}{}\r
61 \BOOKMARK [1][-]{section.11.1}{Base64 Encoding and Decoding}{chapter.11}\r
62 \BOOKMARK [1][-]{section.11.2}{The Multiple Precision Integer Library \(MPI\)}{chapter.11}\r
63 \BOOKMARK [2][-]{subsection.11.2.1}{Binary Forms of ``mp\137int'' Variables}{section.11.2}\r
64 \BOOKMARK [2][-]{subsection.11.2.2}{Primality Testing}{section.11.2}\r
65 \BOOKMARK [0][-]{chapter.12}{Programming Guidelines}{}\r
66 \BOOKMARK [1][-]{section.12.1}{Secure Pseudo Random Number Generators}{chapter.12}\r
67 \BOOKMARK [1][-]{section.12.2}{Preventing Trivial Errors}{chapter.12}\r
68 \BOOKMARK [1][-]{section.12.3}{Registering Your Algorithms}{chapter.12}\r
69 \BOOKMARK [1][-]{section.12.4}{Key Sizes}{chapter.12}\r
70 \BOOKMARK [2][-]{subsection.12.4.1}{Symmetric Ciphers}{section.12.4}\r
71 \BOOKMARK [2][-]{subsection.12.4.2}{Assymetric Ciphers}{section.12.4}\r
72 \BOOKMARK [1][-]{section.12.5}{Thread Safety}{chapter.12}\r
73 \BOOKMARK [0][-]{chapter.13}{Configuring the Library}{}\r
74 \BOOKMARK [1][-]{section.13.1}{Introduction}{chapter.13}\r
75 \BOOKMARK [1][-]{section.13.2}{mycrypt\137cfg.h}{chapter.13}\r
76 \BOOKMARK [1][-]{section.13.3}{The Configure Script}{chapter.13}\r