Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:XXX

412 functions which are (given that XXX is the name of the cipher) the following:
421 The XXX\_setup() routine will setup the cipher to be used with a given number of rounds and a given key length (in bytes).
428 practices you should always call the respective XXX\_done() function. This allows for quicker porting to applications with
849 you want is XXX there is a structure called \textit{symmetric\_XXX} that will contain the information required to
858 symmetric_XXX *XXX);
879 parameters \textit{key}, \textit{keylen} and \textit{num\_rounds} are the same as in the XXX\_setup() function call. The final parameter
906 Where \textit{XXX} is one of $\lbrace ecb, cbc, ctr, cfb, ofb \rbrace$.
925 symmetric_XXX *XXX);
929 symmetric_XXX *XXX);
932 The XXX\_getiv() functions will read the IV out of the chaining mode and store it into \textit{IV} along with the length of the IV
933 stored in \textit{len}. The XXX\_setiv will initialize the chaining mode state as if the original IV were the new IV specified. The length
936 The XXX\_setiv() functions are handy if you wish to change the IV without re--keying the cipher.
949 int XXX_done(symmetric_XXX *XXX);
1752 XXX (where XXX is the name) call:
1784 enough for the hash in question. Often hashes are used to get keys for symmetric ciphers so the \textit{XXX\_done()} functions