Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:indirectly

692 the location in the array where the cipher was found.  For example, to indirectly setup Blowfish you can also use:
1855 You can use the table to indirectly call a hash function that is chosen at run-time. For example:
4944 before you try to use them. This includes any function which would use an algorithm indirectly through a descriptor table.