1 \addvspace {10\p@ } 2 \addvspace {10\p@ } 3 \contentsline {figure}{\numberline {2.1}{\ignorespaces Load And Store Macros}}{9}{figure.2.1} 4 \contentsline {figure}{\numberline {2.2}{\ignorespaces Rotate Macros}}{9}{figure.2.2} 5 \addvspace {10\p@ } 6 \contentsline {figure}{\numberline {3.1}{\ignorespaces Built--In Software Ciphers}}{19}{figure.3.1} 7 \contentsline {figure}{\numberline {3.2}{\ignorespaces Twofish Build Options}}{21}{figure.3.2} 8 \addvspace {10\p@ } 9 \contentsline {figure}{\numberline {4.1}{\ignorespaces Built--In Software Hashes}}{57}{figure.4.1} 10 \addvspace {10\p@ } 11 \addvspace {10\p@ } 12 \contentsline {figure}{\numberline {6.1}{\ignorespaces List of Provided PRNGs}}{82}{figure.6.1} 13 \addvspace {10\p@ } 14 \addvspace {10\p@ } 15 \addvspace {10\p@ } 16 \contentsline {figure}{\numberline {9.1}{\ignorespaces DSA Key Sizes}}{119}{figure.9.1} 17 \addvspace {10\p@ } 18 \contentsline {figure}{\numberline {10.1}{\ignorespaces List of ASN.1 Supported Types}}{127}{figure.10.1} 19 \addvspace {10\p@ } 20 \addvspace {10\p@ } 21 \contentsline {figure}{\numberline {12.1}{\ignorespaces RSA/DH Key Strength}}{149}{figure.12.1} 22 \contentsline {figure}{\numberline {12.2}{\ignorespaces ECC Key Strength}}{149}{figure.12.2} 23 \addvspace {10\p@ } 24 \addvspace {10\p@ } 25