<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.5"/> <title>PolarSSL v1.3.8: aes.h File Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td style="padding-left: 0.5em;"> <div id="projectname">PolarSSL v1.3.8 </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.5 --> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="modules.html"><span>Modules</span></a></li> <li><a href="annotated.html"><span>Data Structures</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>Globals</span></a></li> </ul> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_6a9bbd12bf4e19a18c45e270f8fae3fd.html">include</a></li><li class="navelem"><a class="el" href="dir_04272d44da4745cf8b8bfc767d6c6523.html">polarssl</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="summary"> <a href="#nested-classes">Data Structures</a> | <a href="#define-members">Macros</a> | <a href="#func-members">Functions</a> </div> <div class="headertitle"> <div class="title">aes.h File Reference</div> </div> </div><!--header--> <div class="contents"> <p>AES block cipher. <a href="#details">More...</a></p> <div class="textblock"><code>#include "<a class="el" href="config_8h_source.html">config.h</a>"</code><br/> <code>#include <string.h></code><br/> <code>#include <inttypes.h></code><br/> </div><div class="textblock"><div class="dynheader"> Include dependency graph for aes.h:</div> <div class="dyncontent"> <div class="center"><img src="aes_8h__incl.png" border="0" usemap="#aes_8h" alt=""/></div> <map name="aes_8h" id="aes_8h"> </map> </div> </div><div class="textblock"><div class="dynheader"> This graph shows which files directly or indirectly include this file:</div> <div class="dyncontent"> <div class="center"><img src="aes_8h__dep__incl.png" border="0" usemap="#aes_8hdep" alt=""/></div> <map name="aes_8hdep" id="aes_8hdep"> </map> </div> </div> <p><a href="aes_8h_source.html">Go to the source code of this file.</a></p> <table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a> Data Structures</h2></td></tr> <tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="structaes__context.html">aes_context</a></td></tr> <tr class="memdesc:"><td class="mdescLeft"> </td><td class="mdescRight">AES context structure. <a href="structaes__context.html#details">More...</a><br/></td></tr> <tr class="separator:"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a> Macros</h2></td></tr> <tr class="memitem:a91e721bca5c6db6402fc3a4781d69b10"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a91e721bca5c6db6402fc3a4781d69b10">AES_ENCRYPT</a>   1</td></tr> <tr class="separator:a91e721bca5c6db6402fc3a4781d69b10"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a8a3cf36dc3c8860519f33907bad182c9"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a8a3cf36dc3c8860519f33907bad182c9">AES_DECRYPT</a>   0</td></tr> <tr class="separator:a8a3cf36dc3c8860519f33907bad182c9"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ac9743adb9edbf81a73b5d522902163e4"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#ac9743adb9edbf81a73b5d522902163e4">POLARSSL_ERR_AES_INVALID_KEY_LENGTH</a>   -0x0020</td></tr> <tr class="memdesc:ac9743adb9edbf81a73b5d522902163e4"><td class="mdescLeft"> </td><td class="mdescRight">Invalid key length. <a href="#ac9743adb9edbf81a73b5d522902163e4">More...</a><br/></td></tr> <tr class="separator:ac9743adb9edbf81a73b5d522902163e4"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a3a36fba5d9dcc0a3c8cf190933c7af14"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a3a36fba5d9dcc0a3c8cf190933c7af14">POLARSSL_ERR_AES_INVALID_INPUT_LENGTH</a>   -0x0022</td></tr> <tr class="memdesc:a3a36fba5d9dcc0a3c8cf190933c7af14"><td class="mdescLeft"> </td><td class="mdescRight">Invalid data input length. <a href="#a3a36fba5d9dcc0a3c8cf190933c7af14">More...</a><br/></td></tr> <tr class="separator:a3a36fba5d9dcc0a3c8cf190933c7af14"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a> Functions</h2></td></tr> <tr class="memitem:afd6a37a98051a30f74418beb908d0ecd"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#afd6a37a98051a30f74418beb908d0ecd">aes_init</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx)</td></tr> <tr class="memdesc:afd6a37a98051a30f74418beb908d0ecd"><td class="mdescLeft"> </td><td class="mdescRight">Initialize AES context. <a href="#afd6a37a98051a30f74418beb908d0ecd">More...</a><br/></td></tr> <tr class="separator:afd6a37a98051a30f74418beb908d0ecd"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a9ae37ee8cfabac5da5df9a573c34850f"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a9ae37ee8cfabac5da5df9a573c34850f">aes_free</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx)</td></tr> <tr class="memdesc:a9ae37ee8cfabac5da5df9a573c34850f"><td class="mdescLeft"> </td><td class="mdescRight">Clear AES context. <a href="#a9ae37ee8cfabac5da5df9a573c34850f">More...</a><br/></td></tr> <tr class="separator:a9ae37ee8cfabac5da5df9a573c34850f"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a10f4e5fcaa4c08daf9c7a165a59c7969"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969">aes_setkey_enc</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, const unsigned char *key, unsigned int keysize)</td></tr> <tr class="memdesc:a10f4e5fcaa4c08daf9c7a165a59c7969"><td class="mdescLeft"> </td><td class="mdescRight">AES key schedule (encryption) <a href="#a10f4e5fcaa4c08daf9c7a165a59c7969">More...</a><br/></td></tr> <tr class="separator:a10f4e5fcaa4c08daf9c7a165a59c7969"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae57c42e15b27171ebe6ba075c8f7566d"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#ae57c42e15b27171ebe6ba075c8f7566d">aes_setkey_dec</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, const unsigned char *key, unsigned int keysize)</td></tr> <tr class="memdesc:ae57c42e15b27171ebe6ba075c8f7566d"><td class="mdescLeft"> </td><td class="mdescRight">AES key schedule (decryption) <a href="#ae57c42e15b27171ebe6ba075c8f7566d">More...</a><br/></td></tr> <tr class="separator:ae57c42e15b27171ebe6ba075c8f7566d"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a0c80313f1e98a573f0876366c35f0445"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a0c80313f1e98a573f0876366c35f0445">aes_crypt_ecb</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, const unsigned char input[16], unsigned char output[16])</td></tr> <tr class="memdesc:a0c80313f1e98a573f0876366c35f0445"><td class="mdescLeft"> </td><td class="mdescRight">AES-ECB block encryption/decryption. <a href="#a0c80313f1e98a573f0876366c35f0445">More...</a><br/></td></tr> <tr class="separator:a0c80313f1e98a573f0876366c35f0445"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a2eecec5f7c59c04c29dcbf476d8520a3"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a2eecec5f7c59c04c29dcbf476d8520a3">aes_crypt_cbc</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a2eecec5f7c59c04c29dcbf476d8520a3"><td class="mdescLeft"> </td><td class="mdescRight">AES-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes) <a href="#a2eecec5f7c59c04c29dcbf476d8520a3">More...</a><br/></td></tr> <tr class="separator:a2eecec5f7c59c04c29dcbf476d8520a3"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a46a76a5b0d2d5597a4144fb5949ddb67"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a46a76a5b0d2d5597a4144fb5949ddb67">aes_crypt_cfb128</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, size_t length, size_t *iv_off, unsigned char iv[16], const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a46a76a5b0d2d5597a4144fb5949ddb67"><td class="mdescLeft"> </td><td class="mdescRight">AES-CFB128 buffer encryption/decryption. <a href="#a46a76a5b0d2d5597a4144fb5949ddb67">More...</a><br/></td></tr> <tr class="separator:a46a76a5b0d2d5597a4144fb5949ddb67"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a9cef882e9c468c9238475c865f1f5843"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a9cef882e9c468c9238475c865f1f5843">aes_crypt_cfb8</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a9cef882e9c468c9238475c865f1f5843"><td class="mdescLeft"> </td><td class="mdescRight">AES-CFB8 buffer encryption/decryption. <a href="#a9cef882e9c468c9238475c865f1f5843">More...</a><br/></td></tr> <tr class="separator:a9cef882e9c468c9238475c865f1f5843"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a06439f86425ff375c77c7daef4d624f9"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a06439f86425ff375c77c7daef4d624f9">aes_crypt_ctr</a> (<a class="el" href="structaes__context.html">aes_context</a> *ctx, size_t length, size_t *nc_off, unsigned char nonce_counter[16], unsigned char stream_block[16], const unsigned char *input, unsigned char *output)</td></tr> <tr class="memdesc:a06439f86425ff375c77c7daef4d624f9"><td class="mdescLeft"> </td><td class="mdescRight">AES-CTR buffer encryption/decryption. <a href="#a06439f86425ff375c77c7daef4d624f9">More...</a><br/></td></tr> <tr class="separator:a06439f86425ff375c77c7daef4d624f9"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a3a4d8a79727330aa9bf8be633f9f1516"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="aes_8h.html#a3a4d8a79727330aa9bf8be633f9f1516">aes_self_test</a> (int verbose)</td></tr> <tr class="memdesc:a3a4d8a79727330aa9bf8be633f9f1516"><td class="mdescLeft"> </td><td class="mdescRight">Checkup routine. <a href="#a3a4d8a79727330aa9bf8be633f9f1516">More...</a><br/></td></tr> <tr class="separator:a3a4d8a79727330aa9bf8be633f9f1516"><td class="memSeparator" colspan="2"> </td></tr> </table> <a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2> <div class="textblock"><p>AES block cipher. </p> <p>Copyright (C) 2006-2014, Brainspark B.V.</p> <p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org></p> <p>All rights reserved.</p> <p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p> <p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p> <p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p> <p>Definition in file <a class="el" href="aes_8h_source.html">aes.h</a>.</p> </div><h2 class="groupheader">Macro Definition Documentation</h2> <a class="anchor" id="a8a3cf36dc3c8860519f33907bad182c9"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define AES_DECRYPT   0</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="aes_8h_source.html#l00047">47</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p> </div> </div> <a class="anchor" id="a91e721bca5c6db6402fc3a4781d69b10"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define AES_ENCRYPT   1</td> </tr> </table> </div><div class="memdoc"> <p>Definition at line <a class="el" href="aes_8h_source.html#l00046">46</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p> </div> </div> <a class="anchor" id="a3a36fba5d9dcc0a3c8cf190933c7af14"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_AES_INVALID_INPUT_LENGTH   -0x0022</td> </tr> </table> </div><div class="memdoc"> <p>Invalid data input length. </p> <p>Definition at line <a class="el" href="aes_8h_source.html#l00050">50</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p> </div> </div> <a class="anchor" id="ac9743adb9edbf81a73b5d522902163e4"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define POLARSSL_ERR_AES_INVALID_KEY_LENGTH   -0x0020</td> </tr> </table> </div><div class="memdoc"> <p>Invalid key length. </p> <p>Definition at line <a class="el" href="aes_8h_source.html#l00049">49</a> of file <a class="el" href="aes_8h_source.html">aes.h</a>.</p> </div> </div> <h2 class="groupheader">Function Documentation</h2> <a class="anchor" id="a2eecec5f7c59c04c29dcbf476d8520a3"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_crypt_cbc </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>length</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>iv</em>[16], </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context </td></tr> <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr> <tr><td class="paramname">length</td><td>length of the input data </td></tr> <tr><td class="paramname">iv</td><td>initialization vector (updated after use) </td></tr> <tr><td class="paramname">input</td><td>buffer holding the input data </td></tr> <tr><td class="paramname">output</td><td>buffer holding the output data</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_AES_INVALID_INPUT_LENGTH </dd></dl> </div> </div> <a class="anchor" id="a46a76a5b0d2d5597a4144fb5949ddb67"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_crypt_cfb128 </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>length</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t * </td> <td class="paramname"><em>iv_off</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>iv</em>[16], </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES-CFB128 buffer encryption/decryption. </p> <p>Note: Due to the nature of CFB you should use the same key schedule for both encryption and decryption. So a context initialized with <a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969" title="AES key schedule (encryption) ">aes_setkey_enc()</a> for both AES_ENCRYPT and AES_DECRYPT.</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context </td></tr> <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr> <tr><td class="paramname">length</td><td>length of the input data </td></tr> <tr><td class="paramname">iv_off</td><td>offset in IV (updated after use) </td></tr> <tr><td class="paramname">iv</td><td>initialization vector (updated after use) </td></tr> <tr><td class="paramname">input</td><td>buffer holding the input data </td></tr> <tr><td class="paramname">output</td><td>buffer holding the output data</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl> </div> </div> <a class="anchor" id="a9cef882e9c468c9238475c865f1f5843"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_crypt_cfb8 </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>length</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>iv</em>[16], </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES-CFB8 buffer encryption/decryption. </p> <p>Note: Due to the nature of CFB you should use the same key schedule for both encryption and decryption. So a context initialized with <a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969" title="AES key schedule (encryption) ">aes_setkey_enc()</a> for both AES_ENCRYPT and AES_DECRYPT.</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context </td></tr> <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr> <tr><td class="paramname">length</td><td>length of the input data </td></tr> <tr><td class="paramname">iv</td><td>initialization vector (updated after use) </td></tr> <tr><td class="paramname">input</td><td>buffer holding the input data </td></tr> <tr><td class="paramname">output</td><td>buffer holding the output data</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl> </div> </div> <a class="anchor" id="a06439f86425ff375c77c7daef4d624f9"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_crypt_ctr </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>length</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t * </td> <td class="paramname"><em>nc_off</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>nonce_counter</em>[16], </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>stream_block</em>[16], </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES-CTR buffer encryption/decryption. </p> <p>Warning: You have to keep the maximum use of your counter in mind!</p> <p>Note: Due to the nature of CTR you should use the same key schedule for both encryption and decryption. So a context initialized with <a class="el" href="aes_8h.html#a10f4e5fcaa4c08daf9c7a165a59c7969" title="AES key schedule (encryption) ">aes_setkey_enc()</a> for both AES_ENCRYPT and AES_DECRYPT.</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context </td></tr> <tr><td class="paramname">length</td><td>The length of the data </td></tr> <tr><td class="paramname">nc_off</td><td>The offset in the current stream_block (for resuming within current cipher stream). The offset pointer to should be 0 at the start of a stream. </td></tr> <tr><td class="paramname">nonce_counter</td><td>The 128-bit nonce and counter. </td></tr> <tr><td class="paramname">stream_block</td><td>The saved stream-block for resuming. Is overwritten by the function. </td></tr> <tr><td class="paramname">input</td><td>The input data stream </td></tr> <tr><td class="paramname">output</td><td>The output data stream</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl> </div> </div> <a class="anchor" id="a0c80313f1e98a573f0876366c35f0445"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_crypt_ecb </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char </td> <td class="paramname"><em>input</em>[16], </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>output</em>[16] </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES-ECB block encryption/decryption. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context </td></tr> <tr><td class="paramname">mode</td><td>AES_ENCRYPT or AES_DECRYPT </td></tr> <tr><td class="paramname">input</td><td>16-byte input block </td></tr> <tr><td class="paramname">output</td><td>16-byte output block</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl> </div> </div> <a class="anchor" id="a9ae37ee8cfabac5da5df9a573c34850f"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void aes_free </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Clear AES context. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context to be cleared </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="afd6a37a98051a30f74418beb908d0ecd"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void aes_init </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Initialize AES context. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context to be initialized </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a3a4d8a79727330aa9bf8be633f9f1516"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_self_test </td> <td>(</td> <td class="paramtype">int </td> <td class="paramname"><em>verbose</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Checkup routine. </p> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or 1 if the test failed </dd></dl> </div> </div> <a class="anchor" id="ae57c42e15b27171ebe6ba075c8f7566d"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_setkey_dec </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>key</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>keysize</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES key schedule (decryption) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context to be initialized </td></tr> <tr><td class="paramname">key</td><td>decryption key </td></tr> <tr><td class="paramname">keysize</td><td>must be 128, 192 or 256</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_AES_INVALID_KEY_LENGTH </dd></dl> </div> </div> <a class="anchor" id="a10f4e5fcaa4c08daf9c7a165a59c7969"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int aes_setkey_enc </td> <td>(</td> <td class="paramtype"><a class="el" href="structaes__context.html">aes_context</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>key</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned int </td> <td class="paramname"><em>keysize</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>AES key schedule (encryption) </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>AES context to be initialized </td></tr> <tr><td class="paramname">key</td><td>encryption key </td></tr> <tr><td class="paramname">keysize</td><td>must be 128, 192 or 256</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_AES_INVALID_KEY_LENGTH </dd></dl> </div> </div> </div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated on Thu Jul 31 2014 11:35:55 for PolarSSL v1.3.8 by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.5 </small></address> </body> </html>