• Home
  • Raw
  • Download

Lines Matching refs:_done

428 practices you should always call the respective XXX\_done() function.  This allows for quicker port…
498 …setup()} \index{blowfish\_ecb\_encrypt()} \index{blowfish\_ecb\_decrypt()} \index{blowfish\_done()}
947 \index{ecb\_done()} \index{cbc\_done()}\index{cfb\_done()}\index{ofb\_done()} \index{ctr\_done()}
1091 \index{lrw\_done()}
1145 …sion only. If you want to change the session IV you will have to call f8\_done() and then start a…
1150 \index{f8\_done()}
1229 \index{eax\_done()}
1324 …init() followed by eax\_encrypt() (or eax\_decrypt() respectively) and eax\_done(). The parameters
1372 \index{ocb\_done\_encrypt()}
1391 \index{ocb\_done\_decrypt()}
1608 \index{gcm\_done()}
1784 …ion. Often hashes are used to get keys for symmetric ciphers so the \textit{XXX\_done()} functions
2104 \index{hmac\_done()}
2240 \index{omac\_done()}
2265 rules as omac\_done.
2279 the same rules as omac\_done.
2377 \index{pmac\_done()}
2399 rules as pmac\_done().
2413 the same rules as pmac\_done().
2445 \index{pelican\_done()}
2528 \index{xcbc\_done()}
2549 …pher\_descriptor table. It will store the MAC in \textit{out} with the same rules as xcbc\_done().
2562 …pher\_descriptor table. It will store the MAC in \textit{out} with the same rules as xcbc\_done().
2613 \index{f9\_done()}
2635 …cipher\_descriptor table. It will store the MAC in \textit{out} with the same rules as f9\_done().
2648 …cipher\_descriptor table. It will store the MAC in \textit{out} with the same rules as f9\_done().
5713 Note that calling lrw\_done() will only invoke the cipher\_descriptor[].done() function on the \tex…