.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_n_fold" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_n_fold \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_n_fold(Shishi * " handle ", const char * " in ", size_t " inlen ", char * " out ", size_t " outlen ");" .SH ARGUMENTS .IP "Shishi * handle" 12 shishi handle as allocated by \fBshishi_init()\fP. .IP "const char * in" 12 input array with data to decrypt. .IP "size_t inlen" 12 size of input array with data to decrypt ("M"). .IP "char * out" 12 output array with decrypted data. .IP "size_t outlen" 12 size of output array ("N"). .SH "DESCRIPTION" Fold data into a fixed length output array, with the intent to give each input bit approximately equal weight in determining the value of each output bit. The algorithm is from "A Better Key Schedule For DES\-like Ciphers" by Uri Blumenthal and Steven M. Bellovin, http://www.research.att.com/~smb/papers/ides.pdf, although the sample vectors provided by the paper are incorrect. .SH "RETURN VALUE" Returns \fBSHISHI_OK\fP iff successful. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.