Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:dependent

3024 It is possible to access the secure RNG through the PRNG interface, and in turn use it within dependent functions such
4271 verbatim to the dependent encoder. The list can contain other SEQUENCE or SET types which enables you to have nested SEQUENCE and SET definitions. In these cases
5346 The entire API was designed with plug and play in mind at the low level. That is you can swap out any cipher, hash, PRNG or bignum library and the dependent API will not
5357 development simple. In most dependent routines all an end developer has to do is register\_XXX() the descriptor and they are set.