All symmetric encryption algorithms are accessible via the generic cipher layer (see mbedtls_cipher_setup()).
The asymmetric encryptrion algorithms are accessible via the generic public key layer (see mbedtls_pk_init()).
The following algorithms are provided:
mbedtls_aes_crypt_ecb(), mbedtls_aes_crypt_cbc(), mbedtls_aes_crypt_cfb128() and mbedtls_aes_crypt_ctr()).mbedtls_arc4_crypt()).mbedtls_blowfish_crypt_ecb(), mbedtls_blowfish_crypt_cbc(), mbedtls_blowfish_crypt_cfb64() and mbedtls_blowfish_crypt_ctr())mbedtls_camellia_crypt_ecb(), mbedtls_camellia_crypt_cbc(), mbedtls_camellia_crypt_cfb128() and mbedtls_camellia_crypt_ctr()).mbedtls_des_crypt_ecb(), mbedtls_des_crypt_cbc(), mbedtls_des3_crypt_ecb() and mbedtls_des3_crypt_cbc()).mbedtls_gcm_init())mbedtls_xtea_crypt_ecb()).mbedtls_dhm_read_public(), mbedtls_dhm_make_public() and mbedtls_dhm_calc_secret()).mbedtls_rsa_public() and mbedtls_rsa_private()).mbedtls_ecp_point_init()).mbedtls_ecdsa_init()).mbedtls_ecdh_init()).This module provides encryption/decryption which can be used to provide secrecy.
It also provides asymmetric key functions which can be used for confidentiality, integrity, authentication and non-repudiation.
1.4.7