diff options
-rw-r--r-- | aes.h | 14 |
1 files changed, 7 insertions, 7 deletions
@@ -48,18 +48,18 @@ struct AES_ctx { #endif }; -void AES_init_ctx(struct AES_ctx *ctx,const uint8_t* key); +void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key); #if defined(CBC) && (CBC == 1) -void AES_init_ctx_iv(struct AES_ctx *ctx,const uint8_t* key,const uint8_t* iv); -void AES_ctx_set_iv(struct AES_ctx *ctx,const uint8_t* iv); +void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv); +void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv); #endif #if defined(ECB) && (ECB == 1) // buffer size is exactly AES_BLOCKLEN bytes; // you need only AES_init_ctx as Iv is not used in ECB // NB: ECB s considered insecure -void AES_ECB_encrypt(struct AES_ctx *ctx, const uint8_t* buf); -void AES_ECB_decrypt(struct AES_ctx *ctx, const uint8_t* buf); +void AES_ECB_encrypt(struct AES_ctx* ctx, const uint8_t* buf); +void AES_ECB_decrypt(struct AES_ctx* ctx, const uint8_t* buf); #endif // #if defined(ECB) && (ECB == !) @@ -69,8 +69,8 @@ void AES_ECB_decrypt(struct AES_ctx *ctx, const uint8_t* buf); // We suggest https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 if you need one // you need to set iv in ctx via AES_init_ctx_iv or AES_ctx_set_iv // NB: no IV should ever be reused with the same key -void AES_CBC_encrypt_buffer(struct AES_ctx *ctx, uint8_t* buf, uint32_t length); -void AES_CBC_decrypt_buffer(struct AES_ctx *ctx, uint8_t* buf, uint32_t length); +void AES_CBC_encrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, uint32_t length); +void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, uint32_t length); #endif // #if defined(CBC) && (CBC == 1) |