3 .\" Mark R V Murray. All rights reserved.
5 .\" All rights reserved.
7 .\" Redistribution and use in source and binary forms, with or without
8 .\" modification, are permitted provided that the following conditions
10 .\" 1. Redistributions of source code must retain the above copyright
11 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in the
14 .\" documentation and/or other materials provided with the distribution.
16 .\" THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY EXPRESS OR
17 .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 .\" IN NO EVENT SHALL THE DEVELOPERS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 .Nm rijndael_makeKey ,
34 .Nm rijndael_cipherInit ,
35 .Nm rijndael_blockEncrypt ,
36 .Nm rijndael_padEncrypt ,
37 .Nm rijndael_blockDecrypt ,
38 .Nm rijndael_padDecrypt
45 .Fa "keyInstance *key"
46 .Fa "u_int8_t direction"
48 .Fa "char *keyMaterial"
51 .Fo rijndael_cipherInit
52 .Fa "cipherInstance *cipher"
57 .Fo rijndael_blockEncrypt
58 .Fa "cipherInstance *cipher"
59 .Fa "keyInstance *key"
62 .Fa "u_int8_t *outBuffer"
65 .Fo rijndael_padEncrypt
66 .Fa "cipherInstance *cipher"
67 .Fa "keyInstance *key"
70 .Fa "u_int8_t *outBuffer"
73 .Fo rijndael_blockDecrypt
74 .Fa "cipherInstance *cipher"
75 .Fa "keyInstance *key"
78 .Fa "u_int8_t *outBuffer"
81 .Fo rijndael_padDecrypt
82 .Fa "cipherInstance *cipher"
83 .Fa "keyInstance *key"
86 .Fa "u_int8_t *outBuffer"
91 function is used to set up the key schedule in
99 specifies the intended use of the key.
100 The length of the key (in bits) is given in
102 and must be 128, 192 or 256.
103 The actual key is supplied in the buffer pointed to by
105 This material may be raw binary data,
106 or an ASCII string containing a hexadecimal rendition
107 of the raw binary data,
108 dependent on a compile-time option in the
111 .Dv BINARY_KEY_MATERIAL .
129 if the key materials are not a hexadecimal string
130 (and binary keys are not set),