Lines Matching defs:also

126 also performs extensive parameter error checking to prevent any number of run-time exploits or errors.
148 on an x86 with zero problems. The consistent API also means that if you learn how to use Blowfish with the library you
153 Not only did I strive to make a consistent and simple API to work with but I also attempted to make the library
158 On top of making the build simple and the API approachable I've also attempted for a reasonably high level of
165 The LibTomCrypt package has also been written to be very modular. The block ciphers, one--way hashes,
267 The header file \textit{tomcrypt.h} also includes \textit{stdio.h}, \textit{string.h}, \textit{stdlib.h}, \textit{time.h} and \textit{ctype.h}.
410 have the same prototype and store their keys as naturally as possible. This also removes the need for dynamic memory
493 setup function must also call the respective cipher done function when finished.
639 For AES, (also known as Rijndael) there are four descriptors which complicate issues a little. The descriptors
692 the location in the array where the cipher was found. For example, to indirectly setup Blowfish you can also use:
818 Like the CFB mode the output width in CFB mode is the same as the width of the block cipher. OFB mode will also
886 increment then encrypt is also supported. By OR'ing \textbf{LTC\_CTR\_RFC3686} with the CTR \textit{mode} value, ctr\_start() will increment
1209 \textit{ct}. Note: \textit{ct} and \textit{pt} may be the same region in memory. This function will also send the ciphertext
1210 through the OMAC function. The function \textit{eax\_decrypt} decrypts \textit{ct}, and stores it in \textit{pt}. This also allows
1217 the eax\_init() function allows you to add initial header data to the stream you can also add header data during the
1298 You can also perform an entire EAX state on a block of memory in a single function call with the
1383 you can pass them here. This will also encrypt the \textit{ptlen} bytes in \textit{pt} and store them in \textit{ct}. It will also
1542 Galois counter mode is an IEEE proposal for authenticated encryption (also it is a planned NIST standard). Like EAX and OCB mode, it can be used in a streaming capacity
1543 however, unlike EAX it cannot accept \textit{additional authentication data} (meta--data) after plaintext has been processed. This mode also only works with
1849 In addition, there is also find\_hash\_oid() which finds a hash by the ASN.1 OBJECT IDENTIFIER string.
2028 A cipher has to be registered with CHC (and also in the cipher descriptor tables with
2252 Similar to the HMAC code the file and memory functions are also provided. To OMAC a buffer of memory in one shot use the
2386 Similar to the OMAC code the file and memory functions are also provided. To PMAC a buffer of memory in one shot use the
2500 by using a cipher in CBC mode. It also uses a single key which it expands into the requisite three keys for the MAC function. A XCBC--MAC state is
2576 The F9--MAC is yet another CBC--MAC variant proposed for the 3GPP standard. Originally specified to be used with the KASUMI block cipher, it can also be used
2759 and call ready() you can now read from it. You can also keep adding new entropy to it. The new entropy will not be used
2852 \hline SOBER-128 & sober128\_desc & Stream Cipher (also very fast PRNG) \\
2887 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by
2914 key it from the output of Fortuna (or Yarrow), and use it to encrypt messages. It is also ideal for
2975 clock drift method that is also somewhat popular but gives bits of lower entropy. The \textit{callback} parameter is a pointer to a function that returns void. It is
3244 The most often suggested value for $e$ is $65537$ since it is large enough to make such attacks impossible and also well
3251 the hash of documents only but also to pad the inputs with data to remove such structure.
3392 Similar to RSA key encryption RSA is also used to \textit{digitally sign} message digests (hashes). To facilitate this
3595 As of v1.06 this function can also import OpenSSL DER formatted public RSA keys. They are essentially encapsulated RSAPublicKeys. LibTomCrypt will
3613 As of v1.15 three new curves from the SECG standards are also included they are the secp112r1, secp128r1, and secp160r1 curves. These curves were added to
3903 There are also functions to sign and verify messages. They use the ANSI X9.62 EC-DSA algorithm to generate and verify signatures in the
4772 people trying to brute force guess the password. The higher the iteration counter the longer the delay. This algorithm also requires a hash
4785 Where \textit{password} is the user's password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
4809 Where \textit{password} is the users password. Since the algorithm allows binary passwords you must also specify the length in \textit{password\_len}.
5181 LibTomCrypt can also be built as a shared library through the \textit{makefile.shared} make script. It is similar to use as the static script except
5192 The file \textit{tomcrypt\_cfg.h} is what lets you control various high level macros which control the behaviour of the library. Build options are also
5213 There are also options you can specify from the \textit{tomcrypt\_custom.h} header file.
5267 If you do plan on using the \textit{LTC\_FAST} mode you have to also define a \textit{LTC\_FAST\_TYPE} macro which resolves to an optimal sized
5293 defined will also greatly slow down the cipher. When this macro is not defined Twofish will pre-compute the
5303 It also increases the initialization time and is not suitable when you are going to use a key a few times only.
5347 require updating. This has the nice benefit that one can add ciphers (etc.) not have to re--write portions of the API. For the most part, LibTomCrypt has also been written
5353 the optimized code without re--writing. This also paves the way for hardware drivers that can access hardware accelerated cryptographic devices.
5965 The library also makes use of the math descriptors to access math functions. While bignum math libraries usually differ in implementation
6406 than an \textit{unsigned long} that is also acceptable as the \textit{bits\_per\_digit} parameter will specify this.