Next: Error Handling, Previous: Protocols and Engines, Up: Table of Contents
The crypto backends support a variety of algorithms used in public key cryptography. The following sections list the identifiers used to denote such an algorithm.