All symmetric encryption algorithms are accessible via the generic cipher layer (see mbedtls_cipher_setup()
).
The asymmetric encryptrion algorithms are accessible via the generic public key layer (see mbedtls_pk_init()
).
The following algorithms are provided:
mbedtls_aes_crypt_ecb()
, mbedtls_aes_crypt_cbc()
, mbedtls_aes_crypt_cfb128()
and mbedtls_aes_crypt_ctr()
).mbedtls_arc4_crypt()
).mbedtls_blowfish_crypt_ecb()
, mbedtls_blowfish_crypt_cbc()
, mbedtls_blowfish_crypt_cfb64()
and mbedtls_blowfish_crypt_ctr()
)mbedtls_camellia_crypt_ecb()
, mbedtls_camellia_crypt_cbc()
, mbedtls_camellia_crypt_cfb128()
and mbedtls_camellia_crypt_ctr()
).mbedtls_des_crypt_ecb()
, mbedtls_des_crypt_cbc()
, mbedtls_des3_crypt_ecb()
and mbedtls_des3_crypt_cbc()
).mbedtls_gcm_init()
)mbedtls_xtea_crypt_ecb()
).mbedtls_dhm_read_public()
, mbedtls_dhm_make_public()
and mbedtls_dhm_calc_secret()
).mbedtls_rsa_public()
and mbedtls_rsa_private()
).mbedtls_ecp_point_init()
).mbedtls_ecdsa_init()
).mbedtls_ecdh_init()
).This module provides encryption/decryption which can be used to provide secrecy.
It also provides asymmetric key functions which can be used for confidentiality, integrity, authentication and non-repudiation.