Previous: General public-key related Functions, Up: Public Key cryptography [Contents][Index]
This section documents the alternative interface to asymmetric cryptography (ac) that is not based on S-expressions, but on native C data structures. As opposed to the pk interface described in the former chapter, this one follows an open/use/close paradigm like other building blocks of the library.
This interface has a few known problems; most noteworthy an inherent tendency to leak memory. It might not be available in forthcoming versions of Libgcrypt.
• Available asymmetric algorithms: | List of algorithms supported by the library. | |
• Working with sets of data: | How to work with sets of data. | |
• Working with IO objects: | How to work with IO objects. | |
• Working with handles: | How to use handles. | |
• Working with keys: | How to work with keys. | |
• Using cryptographic functions: | How to perform cryptographic operations. | |
• Handle-independent functions: | General functions independent of handles. |