diff -r 000000000000 -r 2c201484c85f crypto/weakcrypto/docs/Crypto_index.dox
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/crypto/weakcrypto/docs/Crypto_index.dox Wed Jul 08 11:25:26 2009 +0100
@@ -0,0 +1,118 @@
+/**
+@page mainpage_cryptography Cryptography
+
+The Cryptography component comprises:
+
+
+
+
+- Cryptographic Hash Functions
+- @ref mainpage_pbe
+ - @ref secure_stream_encryption
+- Random Number Generator (RNG)
+- Symmetric Cryptography
+- Asymmetric Cryptography
+
+Important Note: \n
+Security/crypto
is a new replacement library, the previous RSA-based version being Security/cryptalg
.
+Note that the Security/cryptalg
module is still available from GT, but configurability defaults now enable
+the new component in all builds.
+
+See @ref mainpage_cryptalg "Cryptalg documentation".
+
+
+API Name | Broad Purpose | Intended Users |
+
+ Random |
+ Generation of cryptographically strong random numbers
+ [PRNG]. |
+ Used internally by certman and crypto. External users include networking/tls (SSL and WTLS support)
+ and app-engines/cntmodel (generating a unique machine id). |
+
+
+ Hash |
+ MD2, MD5, SHA (SHA1) and HMAC implementations. |
+ Used internally by appinst, certman and crypto.
+ networking/tls uses a pseudo-random function (PRF) based on HMAC. Both MD5 and SHA-1 are used in TLS. |
+
+
+ Cryptography |
+
+
+ Symmetric ciphers: DES, 3DES, RC2, RC4, AES. |
+ Asymmetric ciphers: RSA, DSA, DH. Only the public operations. |
+
+ |
+
+
+ Used by Networking (TLS/IPSec ). |
+ Used by \c certman for WTLS and x509 certificate support and by appinst for SIS file signature
+ verification. \n Used by Networking (TLS/IPSec ). |
+
+ |
+
+
+ PKCS5 |
+ Key Derivation Support |
+ Allows the derivation of deterministic arbitrary length byte streams from an input string. The output byte stream
+ is generated using multiple iterations of a CSHA-1 message digest and is suitable for use as a cryptographic symmetric
+ key |
+
+
+ %PBE |
+ Password Based Encryption. Efficient password based encryption and decryption of multiple elements |
+ This is useful if one wants random access to an encrypted source consisting of multiple, independent, elements;
+ for example a database or a store |
+
+
+
+*/
+