Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:Just

198 the ciphers you just can't advertise that you are doing so.  
653 fact used for the purposes of encryption. My suggestion is just to use random 8/24 byte keys instead of trying to make a 8/24
731 than once it will just return the index of the first copy. To remove a cipher call:
1324 Both essentially just call eax\_init() followed by eax\_encrypt() (or eax\_decrypt() respectively) and eax\_done(). The parameters
1575 to only use 12--byte IVs. You can just increment it like a counter for each packet.
2831 Just like the ciphers and hashes, you must register your prng before you can use it. The two functions provided work exactly as those for the cipher registry functions.
4855 common e-mail, usenet and HTTP mediums. The format of an encoded stream is just a literal sequence of ASCII characters
4899 will not be able to sign or decrypt messages at all. Suppose $p$ was prime and $q$ was composite this is just a variation of
4931 entropy. This manual is not designed to be a text on cryptography. I would just like to highlight that when you design
5355 At the heart of this flexibility is the \textit{descriptor} system. A descriptor is essentially just a C \textit{struct} which describes the algorithm and provides pointers
5648 Some ciphers allow different number of rounds to be used. Usually you just use the default. The default round count is \textit{default\_rounds}.
5656 ones provided. Just make sure in your \textit{done()} function that you free the allocated memory.
5812 multiple packets just use the generic hmac_memory
6426 over how the ECC math will be implemented. Out of the box you only have three parameters per point to use $(x, y, z)$ however, these are just void pointers. They