|
18 | 18 | * specific algorithms.
|
19 | 19 | *
|
20 | 20 | * All symmetric encryption algorithms are accessible via the generic cipher layer
|
21 |
| - * (see \c cipher_init_ctx()). |
| 21 | + * (see \c mbedtls_cipher_setup()). |
22 | 22 | *
|
23 | 23 | * The asymmetric encryptrion algorithms are accessible via the generic public
|
24 |
| - * key layer (see \c pk_init()). |
| 24 | + * key layer (see \c mbedtls_pk_init()). |
25 | 25 | *
|
26 | 26 | * The following algorithms are provided:
|
27 | 27 | * - Symmetric:
|
28 |
| - * - AES (see \c aes_crypt_ecb(), \c aes_crypt_cbc(), \c aes_crypt_cfb128() and |
29 |
| - * \c aes_crypt_ctr()). |
30 |
| - * - ARCFOUR (see \c arc4_crypt()). |
31 |
| - * - Blowfish / BF (see \c blowfish_crypt_ecb(), \c blowfish_crypt_cbc(), |
32 |
| - * \c blowfish_crypt_cfb64() and \c blowfish_crypt_ctr()) |
33 |
| - * - Camellia (see \c camellia_crypt_ecb(), \c camellia_crypt_cbc(), |
34 |
| - * \c camellia_crypt_cfb128() and \c camellia_crypt_ctr()). |
35 |
| - * - DES/3DES (see \c des_crypt_ecb(), \c des_crypt_cbc(), \c des3_crypt_ecb() |
36 |
| - * and \c des3_crypt_cbc()). |
37 |
| - * - GCM (AES-GCM and CAMELLIA-GCM) (see \c gcm_init()) |
38 |
| - * - XTEA (see \c xtea_crypt_ecb()). |
| 28 | + * - AES (see \c mbedtls_aes_crypt_ecb(), \c mbedtls_aes_crypt_cbc(), \c mbedtls_aes_crypt_cfb128() and |
| 29 | + * \c mbedtls_aes_crypt_ctr()). |
| 30 | + * - ARCFOUR (see \c mbedtls_arc4_crypt()). |
| 31 | + * - Blowfish / BF (see \c mbedtls_blowfish_crypt_ecb(), \c mbedtls_blowfish_crypt_cbc(), |
| 32 | + * \c mbedtls_blowfish_crypt_cfb64() and \c mbedtls_blowfish_crypt_ctr()) |
| 33 | + * - Camellia (see \c mbedtls_camellia_crypt_ecb(), \c mbedtls_camellia_crypt_cbc(), |
| 34 | + * \c mbedtls_camellia_crypt_cfb128() and \c mbedtls_camellia_crypt_ctr()). |
| 35 | + * - DES/3DES (see \c mbedtls_des_crypt_ecb(), \c mbedtls_des_crypt_cbc(), \c mbedtls_des3_crypt_ecb() |
| 36 | + * and \c mbedtls_des3_crypt_cbc()). |
| 37 | + * - GCM (AES-GCM and CAMELLIA-GCM) (see \c mbedtls_gcm_init()) |
| 38 | + * - XTEA (see \c mbedtls_xtea_crypt_ecb()). |
39 | 39 | * - Asymmetric:
|
40 |
| - * - Diffie-Hellman-Merkle (see \c dhm_read_public(), \c dhm_make_public() |
41 |
| - * and \c dhm_calc_secret()). |
42 |
| - * - RSA (see \c rsa_public() and \c rsa_private()). |
43 |
| - * - Elliptic Curves over GF(p) (see \c ecp_point_init()). |
44 |
| - * - Elliptic Curve Digital Signature Algorithm (ECDSA) (see \c ecdsa_init()). |
45 |
| - * - Elliptic Curve Diffie Hellman (ECDH) (see \c ecdh_init()). |
| 40 | + * - Diffie-Hellman-Merkle (see \c mbedtls_dhm_read_public(), \c mbedtls_dhm_make_public() |
| 41 | + * and \c mbedtls_dhm_calc_secret()). |
| 42 | + * - RSA (see \c mbedtls_rsa_public() and \c mbedtls_rsa_private()). |
| 43 | + * - Elliptic Curves over GF(p) (see \c mbedtls_ecp_point_init()). |
| 44 | + * - Elliptic Curve Digital Signature Algorithm (ECDSA) (see \c mbedtls_ecdsa_init()). |
| 45 | + * - Elliptic Curve Diffie Hellman (ECDH) (see \c mbedtls_ecdh_init()). |
46 | 46 | *
|
47 | 47 | * This module provides encryption/decryption which can be used to provide
|
48 | 48 | * secrecy.
|
|
0 commit comments