.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_crypto" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_crypto \- API function .SH SYNOPSIS .B #include .sp .BI "Shishi_crypto * shishi_crypto(Shishi * " handle ", Shishi_key * " key ", int " keyusage ", int32_t " etype ", const char * " iv ", size_t " ivlen ");" .SH ARGUMENTS .IP "Shishi * handle" 12 shishi handle as allocated by \fBshishi_init()\fP. .IP "Shishi_key * key" 12 key to encrypt with. .IP "int keyusage" 12 integer specifying what this key will encrypt/decrypt. .IP "int32_t etype" 12 integer specifying what cipher to use. .IP "const char * iv" 12 input array with initialization vector .IP "size_t ivlen" 12 size of input array with initialization vector. .SH "DESCRIPTION" Initialize a crypto context. This store a key, keyusage, encryption type and initialization vector in a "context", and the caller can then use this context to perform encryption via \fBshishi_crypto_encrypt()\fP and decryption via \fBshishi_crypto_encrypt()\fP without supplying all those details again. The functions also takes care of propagating the IV between calls. When the application no longer need to use the context, it should deallocate resources associated with it by calling \fBshishi_crypto_close()\fP. .SH "RETURN VALUE" Return a newly allocated crypto context. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.