The modules described in this chapter implement various algorithms of a cryptographic nature. They are available at the discretion of the installation.
確定! 回上一頁