Home | History | Annotate | Download | only in libtomcrypt

Lines Matching defs:Digest

1765 are buffered.  The data can be passed in any sized chunks as long as the order of the bytes are the same the message digest (hash output) will be the same.  For example, 
1771 Will produce the same message digest as the single call:
1772 \index{Message Digest}
1777 To finally get the message digest (the hash) call:
1823 unsigned long hashsize; /* digest output size in bytes */
1839 The \textit{name} member is the name of the hash function (all lowercase). The \textit{hashsize} member is the size of the digest output
1844 digest. The \textit{test} member tests the hash against the specified test vectors.
1900 Note the usage of \textbf{MAXBLOCKSIZE}. In LibTomCrypt, no symmetric block, key or hash digest is larger than \textbf{MAXBLOCKSIZE} in
1903 There are three helper functions to make working with hashes easier. The first is a function to hash a buffer, and produce the digest in a single
1916 digest is stored in \textit{out}, and the \textit{outlen} parameter is updated to hold the message digest size.
1929 when it is called. The message digest is stored in \textit{out}, and the \textit{outlen} parameter is updated to hold the message digest size.
1941 when it is called. The message digest is stored in \textit{out}, and the \textit{outlen} parameter is updated to hold the message digest size.
1990 \hline \textbf{Name} & \textbf{Descriptor Name} & \textbf{Size of Message Digest (bytes)} \\
2112 produced (depending on which hash was picked). If \textit{outlen} is less than the size of the message digest (and ultimately
3408 This will PSS encode the message digest pointed to by \textit{in} of length \textit{inlen} octets. Next, the PSS encoded hash will be RSA
3414 the RSA modulus (in octets), and \textit{hLen} is the length of the message digest produced by the chosen hash.
3435 This will PKCS encode the message digest pointed to by \textit{in} of length \textit{inlen} octets. Next, the PKCS encoded hash will be RSA
3457 and the extracted hash is compared against the message digest pointed to by \textit{msghash} of length \textit{msghashlen} octets.
3481 and the extracted hash is compared against the message digest pointed to by \textit{msghash} of length \textit{msghashlen} octets.
3850 ECC--DH Encryption is performed by producing a random key, hashing it, and XOR'ing the digest against the plaintext. It is not strictly ANSI X9.63 compliant
3852 encrypts a short string (no longer than the message digest) using this technique:
3907 To sign a message digest (hash) use the following function:
3920 This function will EC--DSA sign the message digest stored in the array pointed to by \textit{in} of length \textit{inlen} octets. The signature
3935 This function will verify the EC-DSA signature in the array pointed to by \textit{sig} of length \textit{siglen} octets, against the message digest
5769 /** Size of digest in octets */
5797 /** Produce the digest and store it
5799 @param out [out] The destination of the digest
5831 \subsection{Digest Size}
5849 The done function terminates the hash and returns the message digest.