Lines Matching refs:Allows
168 directly (\textit{e.g. sha256\_process()}) this descriptor interface allows the developer to customize their
405 or use one of the provided chaining modes. All of the ciphers are written as ECB interfaces since it allows the rest of
409 All ciphers store their scheduled keys in a single data type called \textit{symmetric\_key}. This allows all ciphers to
411 allocation, and allows you to allocate a fixed sized buffer for storing scheduled keys. All ciphers must provide six visible
428 practices you should always call the respective XXX\_done() function. This allows for quicker porting to applications with
553 The number of rounds of most ciphers is not an option you can change. Only RC5 allows you to change the number of
776 This mode is very weak since it allows people to swap blocks and perform replay attacks if the same key is used more
827 \item Allows random access to the plaintext.
828 \item Allows the encryption of block sizes that are not equal to the size of the block cipher.
831 accomplish this by buffering the data required to complete a block. This allows you to encrypt or decrypt any size
1210 through the OMAC function. The function \textit{eax\_decrypt} decrypts \textit{ct}, and stores it in \textit{pt}. This also allows
1217 the eax\_init() function allows you to add initial header data to the stream you can also add header data during the
1918 The next helper function allows for the hashing of a file based on a file name.
2016 particular this allows a cryptosystem to be designed using very few moving parts.
2760 in the PRNG until ready() is called again. This allows the PRNG to be used and re-seeded at the same time. No real error
2903 Every other time call to the add\_entropy() function sets the cipher's IV variable. The IV mechanism allows you to
3134 \textit{modulus\_bitlen}. \textit{hash\_idx} is the index into the hash descriptor table of the hash desired. PKCS \#1 allows any hash to be
3191 \textit{msghashlen}. PSS allows a variable length random salt (it can be zero length) to be introduced in the signature process.
3296 Note: the output of this function is zero--padded as per PKCS \#1 specification. This allows this routine to work with PKCS \#1 padding functions properly.
3743 As of v1.16, the library supports an extended key generation routine which allows the user to specify their own curve. It is specified as follows:
3825 The following function allows the importing of an ANSI x9.63 section 4.3.6 format public ECC key using user specified domain parameters:
4662 The ASN.1 \textit{flexi} decoder allows the developer to decode arbitrary ASN.1 DER packets (provided they use data types LibTomCrypt supports) without first knowing
4785 Where \textit{password} is the user's password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
4794 Algorithm Two is the recommended algorithm for this task. It allows variable length salts, and can produce outputs larger than the
4809 Where \textit{password} is the users password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
4859 Often, it is desirable to line wrap the output to fit nicely in an e-mail or usenet posting. The decoder allows you to
5050 Changing MAKE allows you to change what program will be invoked to handle sub--directories. For example, this
5066 When \textbf{IGNORE\_SPEED} has been defined the default optimization flags for CFLAGS will be disabled which allows the developer to specify new
5351 That works well for most cases but there are times where performance is of the essence. This API allows optimized routines to be dropped in--place of the existing
5691 This function (and the way it's called) differs from the other two since ctr\_encrypt() allows any size input plaintext. The accelerator will only be