Sophie

Sophie

distrib > Mageia > 4 > x86_64 > by-pkgid > 9e72f3e7ecf68cce016a7c5c59e863d3 > files > 75

lib64polarssl-devel-1.3.8-1.mga4.x86_64.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.5"/>
<title>PolarSSL v1.3.8: aes.h File Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td style="padding-left: 0.5em;">
   <div id="projectname">PolarSSL v1.3.8
   </div>
  </td>
 </tr>
 </tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.5 -->
  <div id="navrow1" class="tabs">
    <ul class="tablist">
      <li><a href="index.html"><span>Main&#160;Page</span></a></li>
      <li><a href="modules.html"><span>Modules</span></a></li>
      <li><a href="annotated.html"><span>Data&#160;Structures</span></a></li>
      <li class="current"><a href="files.html"><span>Files</span></a></li>
    </ul>
  </div>
  <div id="navrow2" class="tabs2">
    <ul class="tablist">
      <li><a href="files.html"><span>File&#160;List</span></a></li>
      <li><a href="globals.html"><span>Globals</span></a></li>
    </ul>
  </div>
<div id="nav-path" class="navpath">
  <ul>
<li class="navelem"><a class="el" href="dir_6a9bbd12bf4e19a18c45e270f8fae3fd.html">include</a></li><li class="navelem"><a class="el" href="dir_04272d44da4745cf8b8bfc767d6c6523.html">polarssl</a></li>  </ul>
</div>
</div><!-- top -->
<div class="header">
  <div class="summary">
<a href="#nested-classes">Data Structures</a> &#124;
<a href="#define-members">Macros</a> &#124;
<a href="#func-members">Functions</a>  </div>
  <div class="headertitle">
<div class="title">aes.h File Reference</div>  </div>
</div><!--header-->
<div class="contents">

<p>AES block cipher.  
<a href="#details">More...</a></p>
<div class="textblock"><code>#include &quot;<a class="el" href="config_8h_source.html">config.h</a>&quot;</code><br/>
<code>#include &lt;string.h&gt;</code><br/>
<code>#include &lt;inttypes.h&gt;</code><br/>
</div><div class="textblock"><div class="dynheader">
Include dependency graph for aes.h:</div>
<div class="dyncontent">
<div class="center"><img src="aes_8h__incl.png" border="0" usemap="#aes_8h" alt=""/></div>
<map name="aes_8h" id="aes_8h">
</map>
</div>
</div><div class="textblock"><div class="dynheader">
This graph shows which files directly or indirectly include this file:</div>
<div class="dyncontent">
<div class="center"><img src="aes_8h__dep__incl.png" border="0" usemap="#aes_8hdep" alt=""/></div>
<map name="aes_8hdep" id="aes_8hdep">
</map>
</div>
</div>
<p><a href="aes_8h_source.html">Go to the source code of this file.</a></p>
<table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a>
Data Structures</h2></td></tr>
<tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct &#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="structaes__context.html">aes_context</a></td></tr>
<tr class="memdesc:"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES context structure.  <a href="structaes__context.html#details">More...</a><br/></td></tr>
<tr class="separator:"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a>
Macros</h2></td></tr>
<tr class="memitem:a91e721bca5c6db6402fc3a4781d69b10"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a91e721bca5c6db6402fc3a4781d69b10">AES_ENCRYPT</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:a91e721bca5c6db6402fc3a4781d69b10"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a8a3cf36dc3c8860519f33907bad182c9"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a8a3cf36dc3c8860519f33907bad182c9">AES_DECRYPT</a>&#160;&#160;&#160;0</td></tr>
<tr class="separator:a8a3cf36dc3c8860519f33907bad182c9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ac9743adb9edbf81a73b5d522902163e4"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#ac9743adb9edbf81a73b5d522902163e4">POLARSSL_ERR_AES_INVALID_KEY_LENGTH</a>&#160;&#160;&#160;-0x0020</td></tr>
<tr class="memdesc:ac9743adb9edbf81a73b5d522902163e4"><td class="mdescLeft">&#160;</td><td class="mdescRight">Invalid key length.  <a href="#ac9743adb9edbf81a73b5d522902163e4">More...</a><br/></td></tr>
<tr class="separator:ac9743adb9edbf81a73b5d522902163e4"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3a36fba5d9dcc0a3c8cf190933c7af14"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a3a36fba5d9dcc0a3c8cf190933c7af14">POLARSSL_ERR_AES_INVALID_INPUT_LENGTH</a>&#160;&#160;&#160;-0x0022</td></tr>
<tr class="memdesc:a3a36fba5d9dcc0a3c8cf190933c7af14"><td class="mdescLeft">&#160;</td><td class="mdescRight">Invalid data input length.  <a href="#a3a36fba5d9dcc0a3c8cf190933c7af14">More...</a><br/></td></tr>
<tr class="separator:a3a36fba5d9dcc0a3c8cf190933c7af14"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a>
Functions</h2></td></tr>
<tr class="memitem:afd6a37a98051a30f74418beb908d0ecd"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#afd6a37a98051a30f74418beb908d0ecd">aes_init</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx)</td></tr>
<tr class="memdesc:afd6a37a98051a30f74418beb908d0ecd"><td class="mdescLeft">&#160;</td><td class="mdescRight">Initialize AES context.  <a href="#afd6a37a98051a30f74418beb908d0ecd">More...</a><br/></td></tr>
<tr class="separator:afd6a37a98051a30f74418beb908d0ecd"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a9ae37ee8cfabac5da5df9a573c34850f"><td class="memItemLeft" align="right" valign="top">void&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a9ae37ee8cfabac5da5df9a573c34850f">aes_free</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx)</td></tr>
<tr class="memdesc:a9ae37ee8cfabac5da5df9a573c34850f"><td class="mdescLeft">&#160;</td><td class="mdescRight">Clear AES context.  <a href="#a9ae37ee8cfabac5da5df9a573c34850f">More...</a><br/></td></tr>
<tr class="separator:a9ae37ee8cfabac5da5df9a573c34850f"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a10f4e5fcaa4c08daf9c7a165a59c7969"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969">aes_setkey_enc</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, const unsigned char *key, unsigned int keysize)</td></tr>
<tr class="memdesc:a10f4e5fcaa4c08daf9c7a165a59c7969"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES key schedule (encryption)  <a href="#a10f4e5fcaa4c08daf9c7a165a59c7969">More...</a><br/></td></tr>
<tr class="separator:a10f4e5fcaa4c08daf9c7a165a59c7969"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae57c42e15b27171ebe6ba075c8f7566d"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#ae57c42e15b27171ebe6ba075c8f7566d">aes_setkey_dec</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, const unsigned char *key, unsigned int keysize)</td></tr>
<tr class="memdesc:ae57c42e15b27171ebe6ba075c8f7566d"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES key schedule (decryption)  <a href="#ae57c42e15b27171ebe6ba075c8f7566d">More...</a><br/></td></tr>
<tr class="separator:ae57c42e15b27171ebe6ba075c8f7566d"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a0c80313f1e98a573f0876366c35f0445"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a0c80313f1e98a573f0876366c35f0445">aes_crypt_ecb</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, const unsigned char input[16], unsigned char output[16])</td></tr>
<tr class="memdesc:a0c80313f1e98a573f0876366c35f0445"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES-ECB block encryption/decryption.  <a href="#a0c80313f1e98a573f0876366c35f0445">More...</a><br/></td></tr>
<tr class="separator:a0c80313f1e98a573f0876366c35f0445"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a2eecec5f7c59c04c29dcbf476d8520a3"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a2eecec5f7c59c04c29dcbf476d8520a3">aes_crypt_cbc</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a2eecec5f7c59c04c29dcbf476d8520a3"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes)  <a href="#a2eecec5f7c59c04c29dcbf476d8520a3">More...</a><br/></td></tr>
<tr class="separator:a2eecec5f7c59c04c29dcbf476d8520a3"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a46a76a5b0d2d5597a4144fb5949ddb67"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a46a76a5b0d2d5597a4144fb5949ddb67">aes_crypt_cfb128</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, size_t length, size_t *iv_off, unsigned char iv[16], const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a46a76a5b0d2d5597a4144fb5949ddb67"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES-CFB128 buffer encryption/decryption.  <a href="#a46a76a5b0d2d5597a4144fb5949ddb67">More...</a><br/></td></tr>
<tr class="separator:a46a76a5b0d2d5597a4144fb5949ddb67"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a9cef882e9c468c9238475c865f1f5843"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a9cef882e9c468c9238475c865f1f5843">aes_crypt_cfb8</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a9cef882e9c468c9238475c865f1f5843"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES-CFB8 buffer encryption/decryption.  <a href="#a9cef882e9c468c9238475c865f1f5843">More...</a><br/></td></tr>
<tr class="separator:a9cef882e9c468c9238475c865f1f5843"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a06439f86425ff375c77c7daef4d624f9"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a06439f86425ff375c77c7daef4d624f9">aes_crypt_ctr</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, size_t length, size_t *nc_off, unsigned char nonce_counter[16], unsigned char stream_block[16], const unsigned char *input, unsigned char *output)</td></tr>
<tr class="memdesc:a06439f86425ff375c77c7daef4d624f9"><td class="mdescLeft">&#160;</td><td class="mdescRight">AES-CTR buffer encryption/decryption.  <a href="#a06439f86425ff375c77c7daef4d624f9">More...</a><br/></td></tr>
<tr class="separator:a06439f86425ff375c77c7daef4d624f9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a3a4d8a79727330aa9bf8be633f9f1516"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a3a4d8a79727330aa9bf8be633f9f1516">aes_self_test</a> (int verbose)</td></tr>
<tr class="memdesc:a3a4d8a79727330aa9bf8be633f9f1516"><td class="mdescLeft">&#160;</td><td class="mdescRight">Checkup routine.  <a href="#a3a4d8a79727330aa9bf8be633f9f1516">More...</a><br/></td></tr>
<tr class="separator:a3a4d8a79727330aa9bf8be633f9f1516"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table>
<a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2>
<div class="textblock"><p>AES block cipher. </p>
<p>Copyright (C) 2006-2014, Brainspark B.V.</p>
<p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker &lt;polarssl_maintainer at polarssl.org&gt;</p>
<p>All rights reserved.</p>
<p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p>
<p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p>
<p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p>

<p>Definition in file <a class="el" href="aes_8h_source.html">aes.h</a>.</p>
</div><h2 class="groupheader">Macro Definition Documentation</h2>
<a class="anchor" id="a8a3cf36dc3c8860519f33907bad182c9"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define AES_DECRYPT&#160;&#160;&#160;0</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="aes_8h_source.html#l00047">47</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p>

</div>
</div>
<a class="anchor" id="a91e721bca5c6db6402fc3a4781d69b10"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define AES_ENCRYPT&#160;&#160;&#160;1</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Definition at line <a class="el" href="aes_8h_source.html#l00046">46</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p>

</div>
</div>
<a class="anchor" id="a3a36fba5d9dcc0a3c8cf190933c7af14"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_AES_INVALID_INPUT_LENGTH&#160;&#160;&#160;-0x0022</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Invalid data input length. </p>

<p>Definition at line <a class="el" href="aes_8h_source.html#l00050">50</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p>

</div>
</div>
<a class="anchor" id="ac9743adb9edbf81a73b5d522902163e4"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define POLARSSL_ERR_AES_INVALID_KEY_LENGTH&#160;&#160;&#160;-0x0020</td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Invalid key length. </p>

<p>Definition at line <a class="el" href="aes_8h_source.html#l00049">49</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p>

</div>
</div>
<h2 class="groupheader">Function Documentation</h2>
<a class="anchor" id="a2eecec5f7c59c04c29dcbf476d8520a3"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_crypt_cbc </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>length</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>iv</em>[16], </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context </td></tr>
    <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr>
    <tr><td class="paramname">length</td><td>length of the input data </td></tr>
    <tr><td class="paramname">iv</td><td>initialization vector (updated after use) </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the input data </td></tr>
    <tr><td class="paramname">output</td><td>buffer holding the output data</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_AES_INVALID_INPUT_LENGTH </dd></dl>

</div>
</div>
<a class="anchor" id="a46a76a5b0d2d5597a4144fb5949ddb67"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_crypt_cfb128 </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>length</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t *&#160;</td>
          <td class="paramname"><em>iv_off</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>iv</em>[16], </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES-CFB128 buffer encryption/decryption. </p>
<p>Note: Due to the nature of CFB you should use the same key schedule for both encryption and decryption. So a context initialized with <a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969" title="AES key schedule (encryption) ">aes_setkey_enc()</a> for both AES_ENCRYPT and AES_DECRYPT.</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context </td></tr>
    <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr>
    <tr><td class="paramname">length</td><td>length of the input data </td></tr>
    <tr><td class="paramname">iv_off</td><td>offset in IV (updated after use) </td></tr>
    <tr><td class="paramname">iv</td><td>initialization vector (updated after use) </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the input data </td></tr>
    <tr><td class="paramname">output</td><td>buffer holding the output data</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl>

</div>
</div>
<a class="anchor" id="a9cef882e9c468c9238475c865f1f5843"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_crypt_cfb8 </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>length</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>iv</em>[16], </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES-CFB8 buffer encryption/decryption. </p>
<p>Note: Due to the nature of CFB you should use the same key schedule for both encryption and decryption. So a context initialized with <a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969" title="AES key schedule (encryption) ">aes_setkey_enc()</a> for both AES_ENCRYPT and AES_DECRYPT.</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context </td></tr>
    <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr>
    <tr><td class="paramname">length</td><td>length of the input data </td></tr>
    <tr><td class="paramname">iv</td><td>initialization vector (updated after use) </td></tr>
    <tr><td class="paramname">input</td><td>buffer holding the input data </td></tr>
    <tr><td class="paramname">output</td><td>buffer holding the output data</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl>

</div>
</div>
<a class="anchor" id="a06439f86425ff375c77c7daef4d624f9"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_crypt_ctr </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>length</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t *&#160;</td>
          <td class="paramname"><em>nc_off</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>nonce_counter</em>[16], </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>stream_block</em>[16], </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES-CTR buffer encryption/decryption. </p>
<p>Warning: You have to keep the maximum use of your counter in mind!</p>
<p>Note: Due to the nature of CTR you should use the same key schedule for both encryption and decryption. So a context initialized with <a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969" title="AES key schedule (encryption) ">aes_setkey_enc()</a> for both AES_ENCRYPT and AES_DECRYPT.</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context </td></tr>
    <tr><td class="paramname">length</td><td>The length of the data </td></tr>
    <tr><td class="paramname">nc_off</td><td>The offset in the current stream_block (for resuming within current cipher stream). The offset pointer to should be 0 at the start of a stream. </td></tr>
    <tr><td class="paramname">nonce_counter</td><td>The 128-bit nonce and counter. </td></tr>
    <tr><td class="paramname">stream_block</td><td>The saved stream-block for resuming. Is overwritten by the function. </td></tr>
    <tr><td class="paramname">input</td><td>The input data stream </td></tr>
    <tr><td class="paramname">output</td><td>The output data stream</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl>

</div>
</div>
<a class="anchor" id="a0c80313f1e98a573f0876366c35f0445"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_crypt_ecb </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char&#160;</td>
          <td class="paramname"><em>input</em>[16], </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char&#160;</td>
          <td class="paramname"><em>output</em>[16]&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES-ECB block encryption/decryption. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context </td></tr>
    <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr>
    <tr><td class="paramname">input</td><td>16-byte input block </td></tr>
    <tr><td class="paramname">output</td><td>16-byte output block</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl>

</div>
</div>
<a class="anchor" id="a9ae37ee8cfabac5da5df9a573c34850f"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void aes_free </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Clear AES context. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context to be cleared </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="afd6a37a98051a30f74418beb908d0ecd"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">void aes_init </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Initialize AES context. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context to be initialized </td></tr>
  </table>
  </dd>
</dl>

</div>
</div>
<a class="anchor" id="a3a4d8a79727330aa9bf8be633f9f1516"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_self_test </td>
          <td>(</td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>verbose</em></td><td>)</td>
          <td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>Checkup routine. </p>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or 1 if the test failed </dd></dl>

</div>
</div>
<a class="anchor" id="ae57c42e15b27171ebe6ba075c8f7566d"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_setkey_dec </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>key</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>keysize</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES key schedule (decryption) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context to be initialized </td></tr>
    <tr><td class="paramname">key</td><td>decryption key </td></tr>
    <tr><td class="paramname">keysize</td><td>must be 128, 192 or 256</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_AES_INVALID_KEY_LENGTH </dd></dl>

</div>
</div>
<a class="anchor" id="a10f4e5fcaa4c08daf9c7a165a59c7969"></a>
<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int aes_setkey_enc </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> *&#160;</td>
          <td class="paramname"><em>ctx</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>key</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned int&#160;</td>
          <td class="paramname"><em>keysize</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>AES key schedule (encryption) </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">ctx</td><td>AES context to be initialized </td></tr>
    <tr><td class="paramname">key</td><td>encryption key </td></tr>
    <tr><td class="paramname">keysize</td><td>must be 128, 192 or 256</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_AES_INVALID_KEY_LENGTH </dd></dl>

</div>
</div>
</div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated on Thu Jul 31 2014 11:35:55 for PolarSSL v1.3.8 by &#160;<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/>
</a> 1.8.5
</small></address>
</body>
</html>