summaryrefslogtreecommitdiff
path: root/security/libtomcrypt
diff options
context:
space:
mode:
authorrodent <rodent>2013-04-07 20:49:31 +0000
committerrodent <rodent>2013-04-07 20:49:31 +0000
commitda9d557ccd4313490cdcaabf97f4bce19df13498 (patch)
tree79de035a23bbb285c8713b492fa4fa499634f7f8 /security/libtomcrypt
parentc0be38a4f5e5d44fa50008152988b43e17259963 (diff)
downloadpkgsrc-da9d557ccd4313490cdcaabf97f4bce19df13498.tar.gz
Edited DESCR in the case of:
File too long (should be no more than 24 lines). Line too long (should be no more than 80 characters). Trailing empty lines. Trailing white-space. Trucated the long files as best as possible while preserving the most info contained in them.
Diffstat (limited to 'security/libtomcrypt')
-rw-r--r--security/libtomcrypt/DESCR64
1 files changed, 9 insertions, 55 deletions
diff --git a/security/libtomcrypt/DESCR b/security/libtomcrypt/DESCR
index 1ca5401493f..139c7a02ff3 100644
--- a/security/libtomcrypt/DESCR
+++ b/security/libtomcrypt/DESCR
@@ -1,12 +1,11 @@
-LibTomCrypt is a fairly comprehensive, modular and portable
-cryptographic toolkit that provides developers with a vast array of
-well known published block ciphers, one-way hash functions, chaining
-modes, pseudo-random number generators, public key cryptography and a
-plethora of other routines. LibTomCrypt has been designed from the
-ground up to be very simple to use. It has a modular and standard API
-that allows new ciphers, hashes and PRNGs to be added or removed
-without change to the overall end application. It features easy to
-use functions and a complete user manual which has many source snippet
+LibTomCrypt is a fairly comprehensive, modular and portable cryptographic
+toolkit that provides developers with a vast array of well known published block
+ciphers, one-way hash functions, chaining modes, pseudo-random number
+generators, public key cryptography and a plethora of other routines.
+LibTomCrypt has been designed from the ground up to be very simple to use. It
+has a modular and standard API that allows new ciphers, hashes and PRNGs to be
+added or removed without change to the overall end application. It features easy
+to use functions and a complete user manual which has many source snippet
examples.
* Block Ciphers
@@ -27,49 +26,4 @@ examples.
* Khazad
* KASUMI
* SEED
-* Chaining Modes
- * ECB
- * CBC
- * OFB
- * CFB
- * CTR
- * IEEE LRW mode
- * F8 Chaining Mode
-* One-Way Hash Functions
- * MD2
- * MD4
- * MD5
- * SHA-1
- * SHA-224/256/384/512
- * TIGER-192
- * RIPE-MD 128/160/256/320
- * WHIRLPOOL
-* Message Authentication
- * FIPS-198 HMAC (supports all hashes)
- * CMAC, also known as OMAC1 (supports all ciphers)
- * PMAC Authentication
- * F9-MAC
- * Pelican MAC
-* Message Encrypt+Authenticate Modes
- * EAX Mode
- * OCB Mode
- * CCM Mode (NIST spec)
- * GCM Mode (IEEE spec)
-* Pseudo-Random Number Generators
- * Yarrow (based algorithm)
- * RC4
- * Support for /dev/random, /dev/urandom and the Win32 CSP RNG
- * Fortuna
- * SOBER-128
-* Public Key Algorithms
- * RSA (using PKCS #1 v1.5 and v2.1)
- * ECC (EC-DSA X9.62 signatures, X9.63 EC-DH)
- o With fast Fixed Point ECC support as well
- o X9.63 import/export of public keys
- * DSA (Users make their own groups)
- * The math routines are pluggable which means you can use your own
- math provider if you want.
-* Other standards
- * PKCS #1 (v1.5 and v2.1 padding)
- * PKCS #5
- * ASN.1 DER
+...and more!