v0.048
Karel Miko
6 years ago
6 | 6 | - DSA: generate_key($p, $q, $g), generate_key(\$dsa_params_der), generate_key($dsa_params_file) |
7 | 7 | - XS croaks should report the "real caller" (Crypt::Mac::*, Crypt::Mode::*, ...) |
8 | 8 | - maybe: add CCM interface for new-add-add-done mode |
9 | - maybe: switch yarrow > fortuna for Crypt::PK::* | |
10 | 9 | - maybe: add encode_b32/decode_b32 |
11 | 10 | |
12 | 0.047_005 2017/04/25 | |
11 | 0.048 2017/05/31 | |
13 | 12 | - NEW: Crypt::Digest::SHA3_224 |
14 | 13 | - NEW: Crypt::Digest::SHA3_256 |
15 | 14 | - NEW: Crypt::Digest::SHA3_384 |
337 | 337 | |
338 | 338 | =head2 increment_octets_le |
339 | 339 | |
340 | I<Since: CryptX-0.048> | |
341 | ||
340 | 342 | $octects = increment_octets_le($octets); |
341 | 343 | |
344 | Take input C<$octets> as a little-endian big number and return an increment. | |
345 | ||
342 | 346 | =head2 increment_octets_be |
343 | 347 | |
348 | I<Since: CryptX-0.048> | |
349 | ||
344 | 350 | $octects = increment_octets_be($octets); |
345 | 351 | |
352 | Take input C<$octets> as a big-endian big number and return an increment. | |
353 | ||
346 | 354 | =head1 SEE ALSO |
347 | 355 | |
348 | 356 | =over |