diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2015-03-18 14:05:51 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2015-03-18 14:05:51 +0100 |
commit | 3e8305176981a27ae7f5a8ac210e44119887e33d (patch) | |
tree | a7fa83b6cbaafa82fa0f7639c077704b9f867e67 /doc/cha-crypto.texi | |
parent | 29acbc323ccaf8882af1703c011c7ea4afde2ebb (diff) | |
download | gnutls-3e8305176981a27ae7f5a8ac210e44119887e33d.tar.gz |
document the cipher override API
Diffstat (limited to 'doc/cha-crypto.texi')
-rw-r--r-- | doc/cha-crypto.texi | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/doc/cha-crypto.texi b/doc/cha-crypto.texi index 9a7e640c22..ebe4331915 100644 --- a/doc/cha-crypto.texi +++ b/doc/cha-crypto.texi @@ -13,6 +13,7 @@ to the random number generation. For a low-level crypto API the usage of nettle * Public key algorithms:: * Hash and HMAC functions:: * Random number generation:: +* Overriding algorithms:: @end menu @node Symmetric algorithms @@ -68,3 +69,19 @@ function. It allows obtaining random data of various levels. @showenumdesc{gnutls_rnd_level_t,The random number levels.} @showfuncdesc{gnutls_rnd} + +@node Overriding algorithms +@section Overriding algorithms +@cindex overriding algorithms + +In systems which provide a hardware accelerated cipher implementation +that is not directly supported by GnuTLS, it is possible to utilize it. +There are functions which allow overriding the default cipher, digest and MAC +implementations. Those are described below. + +To override public key operations see @ref{Abstract private keys}. + +@showfuncdesc{gnutls_crypto_register_cipher} +@showfuncdesc{gnutls_crypto_register_aead_cipher} +@showfuncdesc{gnutls_crypto_register_mac} +@showfuncdesc{gnutls_crypto_register_digest} |