head 1.2; access; symbols RPM_4_2:1.1.1.1 RPM_4_1_1:1.1.1.1 RPM_4_1:1.1.1.1 RPM_4_0_5:1.1.1.1 RPM_4_0_4:1.1.1.1 RPM:1.1.1; locks; strict; comment @# @; 1.2 date 2003.08.24.12.57.34; author rse; state dead; branches; next 1.1; 1.1 date 2001.09.18.19.24.37; author rse; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2001.09.18.19.24.37; author rse; state Exp; branches; next ; desc @@ 1.2 log @Resolve: RPM 4.2 -> RPM 4.2.1 @ text @
Copyright © 1997, 1998, 1999, 2000, 2001 Virtual Unlimited, B.V.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts.
For the specifics of this license, see file 'COPYING.DOC', included in this distribution.
BeeCrypt is an open source cryptography library that contains highly optimized C and assembler implementations of many well-known algorithms including Blowfish, MD5, SHA-1, SHA-256, Diffie-Hellman, and ElGamal.
The goal of the library is to offer a wide range of low-level cryptographic primitives.
BeeCrypt is licensed under the GNU Lesser Public General License (LGPL),
which means it can be used for free in both open and closed source commercial
products.
This is the first attempt to write a manual for the BeeCrypt Cryptography Library. Eventually this will become a full-blown manual, with all the jingles and bells.