Lines Matching refs:While
167 are essentially structures with pointers to functions. While you can still call particular functions
1034 security problems of ECB mode while not increasing the storage requirements. It is used much like any other chaining mode except with two key differences.
1053 While LRW was specified to be used only with AES, LibTomCrypt will allow any 128--bit block cipher to be specified as indexed by \textit{cipher}. The
1216 Note: both of these functions allow you to send the data in any granularity but the order is important. While
1328 the tag it computed while decrypting the message. If the tags match then it stores a $1$ in \textit{res}, otherwise it stores a $0$.
1840 in bytes, while \textit{blocksize} is the size of blocks the hash expects to the compression function. Technically, this detail is not important
1887 while (fgets(buffer, sizeof(buffer), stdin) != NULL)
2020 data. While it is in the hash system you still have to tell the CHC code which cipher to use. This is accomplished
2871 to work with most cipher and hash combos based on which you have chosen to build into the library.} while
3663 LibTomCrypt uses a unique format for ECC public and private keys. While ANSI X9.63 partially specifies key formats, it does it in a less than ideally simple manner. \
5078 shared. The \textbf{LIBNAME\_S} variable is the static name while doing shared builds. Ideally they should have the same prefix but don't have to.
5711 While both encrypt and decrypt accelerators are not required it is suggested as it makes lrw\_setiv() more efficient.
5965 The library also makes use of the math descriptors to access math functions. While bignum math libraries usually differ in implementation