[ << ] | [ < ] | [ Up ] | [ > ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
7.10.1 Symmetric cryptography
The available functions to access symmetric crypto algorithms operations are shown below. The supported algorithms are the algorithms required by the TLS protocol. They are listed in Table 3.1.
- gnutls_cipher_init
- gnutls_cipher_encrypt2
- gnutls_cipher_decrypt2
- gnutls_cipher_set_iv
- gnutls_cipher_deinit
In order to support authenticated encryption with associated data (AEAD) algorithms the following functions are provided to set the associated data and retrieve the authentication tag.
This document was generated on January 4, 2012 using texi2html 5.0.