Contents
Short Descriptions
calulates a hash value using a specified algorithm. |
|
outputs a sequence of pseudorandom (non-cryptographic) bytes, using Knuth's lagged fibonacci generator. The stream is useful for testing, but should not be used to generate cryptographic keys or anything else that needs real randomness. |
|
password-based key derivation function that take as input a password or passphrase and typically strengthen it and protect against certain pre-computation attacks by using salting and expensive computation. |
|
converts private and public RSA keys from PKCS #1 format to sexp format. |
|
converts an s-expression to a different encoding. |