Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:_key

360 Certain functions such as \textit{rsa\_make\_key()} require a Pseudo Random Number Generator (PRNG).  These functions do not setup 
366 \index{register\_prng()} \index{rsa\_make\_key()}
409 All ciphers store their scheduled keys in a single data type called \textit{symmetric\_key}. This allows all ciphers to
588 Where \textit{name} is the lower case ASCII version of the name. The fields \textit{min\_key\_length} and \textit{max\_key\_length}
1113 This will start the F8 mode state using \textit{key} as the secret key, \textit{IV} as the counter. It uses the \textit{salt\_key} as IV encryption key
1114 (\textit{m} in the RFC 3711). The salt\_key can be shorter than the secret key but it should not be longer.
3255 For RSA routines a single \textit{rsa\_key} structure is used. To make a new RSA key call:
3256 \index{rsa\_make\_key()}
3271 Note: the \textit{rsa\_make\_key()} function allocates memory at run--time when you make the key. Make sure to call
3272 \textit{rsa\_free()} (see below) when you are finished with the key. If \textit{rsa\_make\_key()} fails it will automatically
3302 \index{rsa\_encrypt\_key()}
3324 \index{rsa\_encrypt\_key\_ex()}
3341 The parameters are all the same as for rsa\_encrypt\_key() except for the addition of the \textit{padding} parameter. It must be set to
3347 \index{rsa\_decrypt\_key()}
3370 \index{rsa\_decrypt\_key\_ex()}
3596 import the key, strip off the additional data (it's the preferred hash) and fill in the rsa\_key structure as if it were a native RSAPublicKey. Note that
3727 There is a key structure called \textit{ecc\_key} used by the ECC functions. There is a function to make a key:
3728 \index{ecc\_make\_key()}
3745 \index{ecc\_make\_key\_ex()}
3758 To free the memory allocated by a ecc\_make\_key(), ecc\_make\_key\_ex(), ecc\_import(), or ecc\_import\_ex() call use the following function:
3783 This will import the ECC key from \textit{in}, and store it in the ecc\_key structure pointed to by \textit{key}. If the operation fails it will free
3846 The \textit{private\_key} is typically the local private key, and \textit{public\_key} is the key the remote party has shared.
3855 \index{ecc\_encrypt\_key()}
3876 \index{ecc\_decrypt\_key()}
4063 \index{dsa\_verify\_key()}
4113 \index{dsa\_encrypt\_key()}
4131 \index{dsa\_decrypt\_key()}
5641 The minimum key length is \textit{min\_key\_length} and is measured in octets. Similarly the maximum key length is \textit{max\_key\_length}. They can be equal
5655 Inside the \textit{symmetric\_key} union there is a \textit{void *data} which you can use to allocate data if you need a data structure that does not fit with the existing
5713 Note that calling lrw\_done() will only invoke the cipher\_descriptor[].done() function on the \textit{symmetric\_key} parameter of the LRW state. That means