Contents
Short Descriptions
calculates a hash value using a specified algorithm | |
outputs a sequence of pseudorandom (non-cryptographic) bytes, using Knuth's lagged fibonacci generator. The stream is useful for testing, but should not be used to generate cryptographic keys or anything else that needs real randomness | |
is a password-based key derivation function that takes a password or a passphrase as input and returns a strengthened password, which is protected against pre-computation attacks by using salting and other expensive computations. | |
converts private and public RSA keys from PKCS #1 format to sexp format | |
converts an s-expression to a different encoding |