[ < ] | [ > ] | [ << ] | [ Up ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
6.6 Alternative Public Key Interface
This section documents the alternative interface to asymmetric cryptography (ac) that is not based on S-expressions, but on native C data structures. As opposed to the pk interface described in the former chapter, this one follows an open/use/close paradigm like other building blocks of the library.
This interface has a few known problems; most noteworthy an inherent tendency to leak memory. It might not be available in forthcoming versions Libgcrypt.
6.6.1 Available asymmetric algorithms | List of algorithms supported by the library. | |
6.6.2 Working with sets of data | How to work with sets of data. | |
6.6.3 Working with IO objects | How to work with IO objects. | |
6.6.4 Working with handles | How to use handles. | |
6.6.5 Working with keys | How to work with keys. | |
6.6.6 Using cryptographic functions | How to perform cryptographic operations. | |
6.6.7 Handle-independent functions | General functions independent of handles. |