Home | History | Annotate | Download | only in libtomcrypt

Lines Matching defs:Application

151 application can support all ciphers/hashes/prngs/bignum without changing the source code.
222 \chapter{The Application Programming Interface (API)}
353 \textit{x} so that the calling application will know how many bytes were used.
546 keys (mainly for test vectors anyways). Ideally, your application should be making at least 256 bit keys. This is not
2739 flash memory, etc). The next time your application starts up you can detect the state, feed it to the
2976 used when the slower ANSI C RNG must be used so the calling application can still work. This is useful since the ANSI C RNG has a throughput of roughly three
4928 access source of entropy for any application on a UNIX (and the like) or Windows computer.
4930 However, when the end user is not on one of these platforms, the application developer must address the issue of finding
5034 application. This is because
5039 build, or run time for the application. LibTomCrypt comes with three math descriptors that provide a standard interface to math
5176 we define \textbf{TFM\_DESC} for compilation. This is so that the TFM descriptor symbol will be defined for the client application to make use of without