Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:desired

459 For each cipher there is a function which will help find a desired key size.  It is specified as follows:
723 A good safety would be to check the return value of \textit{find\_cipher()} before accessing the desired function. In order
975 find_cipher("twofish"), /* index of desired cipher */
1187 Where \textit{eax} is the EAX state. The \textit{cipher} parameter is the index of the desired cipher in the descriptor table.
3130 tag that can be applied to the encoding. This is useful to identify which system encoded the message. If no variance is desired then
3134 \textit{modulus\_bitlen}. \textit{hash\_idx} is the index into the hash descriptor table of the hash desired. PKCS \#1 allows any hash to be
3265 Where \textit{wprng} is the index into the PRNG descriptor array. The \textit{size} parameter is the size in bytes of the RSA modulus desired.
3266 The \textit{e} parameter is the encryption exponent desired, typical values are 3, 17, 257 and 65537. Stick with 65537 since it is big enough to prevent
3412 hash the message being signed. The \textit{saltlen} parameter indicates the length of the desired salt, and should typically be small. A good
3736 The \textit{keysize} is the size of the modulus in bytes desired. Currently directly supported values are 12, 16, 20, 24, 28, 32, 48, and 65 bytes which
4786 The \textit{salt} is a fixed size 8--byte array which should be random for each user and session. The \textit{iteration\_count} is the delay desired
4810 The \textit{salt} is an array of size \textit{salt\_len}. It should be random for each user and session. The \textit{iteration\_count} is the delay desired
4940 typos can cause algorithms to fail to work as desired.
5428 @param keysize [in/out] The size of the key desired
5668 pointer to an integer which represents the desired
5894 @param outlen Length of data desired (octets)
6362 @param wprng The index of the PRNG desired