The Linux Kernel Module Programming Guide: Crypto

Advisories

Discover Cryptography News

The Linux Kernel Module Programming Guide: Crypto

2.Motherboard

To handle cryptography, the Linux kernel has its own API enabling common methods of encryption, decryption and your favourite hash functions! Learn about the use of hash functions and symmetric key encryption in the Linux kernel in the Linux Kernel Module Programming Guide.

At the dawn of the internet, everybody trusted everybody completely…but that did not work out so well. When this guide was originally written, it was a more innocent era in which almost nobody actually gave a damn about crypto - least of all kernel developers. That is certainly no longer the case now. To handle crypto stuff, the kernel has its own API enabling common methods of encryption, decryption and your favourite hash functions.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.