Loading doc/crypto/des_modes.pod +16 −11 Original line number Original line Diff line number Diff line Loading @@ -2,20 +2,13 @@ =head1 NAME =head1 NAME Modes of DES and other crypto algorithms of OpenSSL Modes of DES - The variants of DES and other crypto algorithms of OpenSSL =head1 DESCRIPTION =head1 DESCRIPTION Several crypto algorithms fo OpenSSL can be used in a number of modes. The Several crypto algorithms fo OpenSSL can be used in a number of modes. Those following text has been written in large parts by Eric Young in his original are used for using block ciphers in a way similar to stream ciphers, among documentation for SSLeay, the predecessor of OpenSSL. In turn, he attributed other things. it to: AS 2805.5.2 Australian Standard Electronic funds transfer - Requirements for interfaces, Part 5.2: Modes of operation for an n-bit block cipher algorithm Appendix A =head1 OVERVIEW =head1 OVERVIEW Loading Loading @@ -239,6 +232,18 @@ the same restrictions as for triple ecb mode. =back =back =head1 NOTES This text was been written in large parts by Eric Young in his original documentation for SSLeay, the predecessor of OpenSSL. In turn, he attributed it to: AS 2805.5.2 Australian Standard Electronic funds transfer - Requirements for interfaces, Part 5.2: Modes of operation for an n-bit block cipher algorithm Appendix A =head1 SEE ALSO =head1 SEE ALSO L<blowfish(3)|blowfish(3)>, L<des(3)|des(3)>, L<idea(3)|idea(3)>, L<blowfish(3)|blowfish(3)>, L<des(3)|des(3)>, L<idea(3)|idea(3)>, Loading Loading
doc/crypto/des_modes.pod +16 −11 Original line number Original line Diff line number Diff line Loading @@ -2,20 +2,13 @@ =head1 NAME =head1 NAME Modes of DES and other crypto algorithms of OpenSSL Modes of DES - The variants of DES and other crypto algorithms of OpenSSL =head1 DESCRIPTION =head1 DESCRIPTION Several crypto algorithms fo OpenSSL can be used in a number of modes. The Several crypto algorithms fo OpenSSL can be used in a number of modes. Those following text has been written in large parts by Eric Young in his original are used for using block ciphers in a way similar to stream ciphers, among documentation for SSLeay, the predecessor of OpenSSL. In turn, he attributed other things. it to: AS 2805.5.2 Australian Standard Electronic funds transfer - Requirements for interfaces, Part 5.2: Modes of operation for an n-bit block cipher algorithm Appendix A =head1 OVERVIEW =head1 OVERVIEW Loading Loading @@ -239,6 +232,18 @@ the same restrictions as for triple ecb mode. =back =back =head1 NOTES This text was been written in large parts by Eric Young in his original documentation for SSLeay, the predecessor of OpenSSL. In turn, he attributed it to: AS 2805.5.2 Australian Standard Electronic funds transfer - Requirements for interfaces, Part 5.2: Modes of operation for an n-bit block cipher algorithm Appendix A =head1 SEE ALSO =head1 SEE ALSO L<blowfish(3)|blowfish(3)>, L<des(3)|des(3)>, L<idea(3)|idea(3)>, L<blowfish(3)|blowfish(3)>, L<des(3)|des(3)>, L<idea(3)|idea(3)>, Loading