summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2003-01-21 09:06:13 +0000
committerWerner Koch <wk@gnupg.org>2003-01-21 09:06:13 +0000
commit7ee3cf4b0c8641e415328d53ca889fe908f29873 (patch)
tree451fe2236b25b1ab73968cdb6d888645c9866951 /doc
parent9653a79b2b33be997fa7a1fa7abc94149d449513 (diff)
downloadlibgcrypt-7ee3cf4b0c8641e415328d53ca889fe908f29873.tar.gz
* gcrypt.texi (Hash Functions): Add CRC.
Diffstat (limited to 'doc')
-rw-r--r--doc/ChangeLog4
-rw-r--r--doc/gcrypt.texi15
2 files changed, 18 insertions, 1 deletions
diff --git a/doc/ChangeLog b/doc/ChangeLog
index 75e9776d..f8834ce2 100644
--- a/doc/ChangeLog
+++ b/doc/ChangeLog
@@ -1,3 +1,7 @@
+2003-01-20 Simon Josefsson <jas@extundo.com>
+
+ * gcrypt.texi (Hash Functions): Add CRC.
+
2003-01-19 Werner Koch <wk@gnupg.org>
* gcrypt.texi: Most functions are now documented. Still need to
diff --git a/doc/gcrypt.texi b/doc/gcrypt.texi
index 24049d2c..8ce737ff 100644
--- a/doc/gcrypt.texi
+++ b/doc/gcrypt.texi
@@ -599,7 +599,8 @@ consistent to use interface to hash functions. Hashing is buffered and
several hash algorithms can be updated at once. It is possible to
calculate a MAC using the same routines.
-For convenience reasons, we plan to integrate simple CRC algorithms too
+For convenience reasons, a few cyclic redudance check value operations
+are also supported.
To use most of these function it is necessary to create a context; this
is done using:
@@ -656,6 +657,18 @@ This is reserved for SHA-2 with 384 bits. It yields a message digest of
This is reserved for SHA-2 with 512 bits. It yields a message digest of
64 bytes. Note that there is no implementation yet available.
+@item GCRY_MD_CRC32
+This is the ISO 3309 and ITU-T V.42 cyclic redundancy check. It
+yields an output of 4 bytes.
+
+@item GCRY_MD_CRC32_RFC1510
+This is the above cyclic redundancy check function, as modified by RFC
+1510. It yields an output of 4 bytes.
+
+@item GCRY_MD_CRC24_RFC2440
+This is the OpenPGP cyclic redundancy check function. It yields an
+output of 3 bytes.
+
@end table
@c end table of hash algorithms