Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:Make

150 that can be used to make a program automatically pick between ciphers, hashes and PRNGs at run-time.  That means your 
153 Not only did I strive to make a consistent and simple API to work with but I also attempted to make the library
174 API can make use of it without change. Similarly imagine a few years down the road when AES2
184 can make use of the cipher right away.
271 There are a few helper macros to make the coding process a bit easier. The first set are related to loading and storing
331 /* ... Make up the RSA key somehow ... */
377 /* make a 1024-bit RSA key with the system RNG */
404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode,
653 fact used for the purposes of encryption. My suggestion is just to use random 8/24 byte keys instead of trying to make a 8/24
997 /* make use of ciphertext... */
1259 /* ... make up random nonce and key ... */
1407 To make life simpler the following two functions are provided for memory bound OCB.
1903 There are three helper functions to make working with hashes easier. The first is a function to hash a buffer, and produce the digest in a single
2093 to use to authenticate the message. The \textit{key} parameter is the pointer to the array of chars that make up the key. The \textit{keylen} parameter is the
2115 There are two utility functions provided to make using HMACs easier to do. They accept the key and information about the
2170 /* we would make up our symmetric key in "key[]" here */
2247 \textit{outlen} can be smaller than the default MAC size (for instance AES would make a 16-byte tag). Part of the OMAC
2308 /* we would make up our symmetric key in "key[]" here */
2538 Helper functions are provided to make parsing memory buffers and files easier. The following functions are provided:
2581 bit followed by a 1 bit and enough zeros to make the message a multiple of the cipher block size. If the message is byte aligned, the padding takes on the form of
2582 a single 0x40 or 0xC0 byte followed by enough 0x00 bytes to make the message proper multiple.
2624 Helper functions are provided to make parsing memory buffers and files easier. The following functions are provided:
2876 key, and any hash that produces at least a 256--bit output. However, to make the implementation simpler
3012 /* make a 192-bit ECC key */
3043 /* make a 192-bit ECC key */
3244 The most often suggested value for $e$ is $65537$ since it is large enough to make such attacks impossible and also well
3255 For RSA routines a single \textit{rsa\_key} structure is used. To make a new RSA key call:
3271 Note: the \textit{rsa\_make\_key()} function allocates memory at run--time when you make the key. Make sure to call
3516 /* make an RSA-1024 key */
3633 CFLAGS="-DTFM_DESC -DMECC_FP" make
3652 CFLAGS="-DTFM_DESC -DMECC_FP -DFP_ENTRIES=8 -DFP_LUT=6" make
3727 There is a key structure called \textit{ecc\_key} used by the ECC functions. There is a function to make a key:
3948 The library will not warn you if you make this mistake, so it is important to check yourself before using the signatures.
3996 To make a DSA key you must call the following function
4055 function. Tests three and four ensure that the generator $g$ is not set to a trivial value which would make signature
4377 The function will make a copy of the list provided, and sort it by the TAG. Objects with identical TAGs are additionally sorted on their original placement in the
4378 array (to make the process deterministic).
4396 make multiple passes (as required) through the list to decode all the objects.
4597 intend to use the ISO C functions for working with wide--char arrays, you should make sure that wchar\_t has been defined previously.
4815 /* demo to show how to make session state material
4828 /* get users password and make up a salt ... */
4896 In the event that a composite did make it through it would most likely cause the the algorithm trying to use it to fail. For
4909 it returns an error that the value in \textit{result} is undefined. To make
4932 a cryptosystem make sure the first problem you solve is getting a fresh source of entropy.
4937 buffer is smaller than the output it will report an error. Therefore, make sure the size you pass is correct!
5031 each new release that will make the library even more flexible. Each of the classes of functions can be disabled during
5032 the build process to make a smaller library. This is particularly useful for shared libraries.
5047 \index{MAKE}\index{CC}\index{AR}
5048 \subsection{MAKE, CC and AR}
5049 The MAKE, CC and AR flags can all be overwritten. They default to \textit{make}, \textit{\$CC} and \textit{\$AR} respectively.
5050 Changing MAKE allows you to change what program will be invoked to handle sub--directories. For example, this
5053 MAKE=gmake gmake install
5059 CC=arm-gcc AR=arm-ar make
5070 CFLAGS="-g3" make IGNORE_SPEED=1
5093 make LIBPATH=/home/tom/project/lib INCPATH=/home/tom/project/include \
5140 CFLAGS="-DTFM_DESC -DUSE_TFM" EXTRALIBS=-ltfm make install \
5152 Building a static library is fairly trivial as it only requires one invocation of the GNU make command.
5155 CFLAGS="-DTFM_DESC" make install
5163 make install
5176 we define \textbf{TFM\_DESC} for compilation. This is so that the TFM descriptor symbol will be defined for the client application to make use of without
5181 LibTomCrypt can also be built as a shared library through the \textit{makefile.shared} make script. It is similar to use as the static script except
5185 CFLAGS="-DTFM_DESC" EXTRALIBS=-ltfm make -f makefile.shared install
5263 The simplest precaution is to make sure you process all data in power of two blocks and handle \textit{remainder} at the end. e.g. If you are
5338 EXTRALIBS="-lgmp -ltommath -ltfm" make -f makefile.shared install timing
5348 to be highly portable and easy to build out of the box on pretty much any platform. As such there are no assembler inlines throughout the code, I make no assumptions
5656 ones provided. Just make sure in your \textit{done()} function that you free the allocated memory.
5660 must make sure you do not overwrite the output before you are finished with the input.
5944 Initialize the PRNG and make it ready to accept entropy.
6339 you use a different mapping you have to make it fit.