Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:sized

411 allocation, and allows you to allocate a fixed sized buffer for storing scheduled keys.  All ciphers must provide six visible 
1171 sized message block to send to the recipient as ciphertext. This makes the EAX mode especially suited for streaming modes
1765 are buffered. The data can be passed in any sized chunks as long as the order of the bytes are the same the message digest (hash output) will be the same. For example,
2102 number of octets to process. Like the hash process routines you can send the data in arbitrarily sized chunks. When you
3136 sized input message. \textit{prng\_idx} and \textit{prng} are the random number generator arguments required to randomize the padding process.
4891 In essence a table of machine-word sized residues are kept of a candidate modulo a set of primes. When the candidate
5267 If you do plan on using the \textit{LTC\_FAST} mode you have to also define a \textit{LTC\_FAST\_TYPE} macro which resolves to an optimal sized
5667 Occasionally, a function will want to find a suitable key size to use since the input is oddly sized. The keysize() function is for this case. It accepts a
6026 @return The bits_per_digit sized n'th digit of a