Just run the sketch after loading the libraries.
sudo make install cd examples_Rpi make
What to do after changes to the library
sudo make clean sudo make install cd examples_Rpi make clean make
What to do after changes to a sketch
cd examples_Rpi make <sketch> or make clean make
How to start a sketch
cd examples_Rpi sudo ./<sketch>
This is a derived work from Brian Gladman's AES implementation for byte-oriented processors, here's the licence terms:
Copyright (c) 1998-2008, Brian Gladman, Worcester, UK. All rights reserved.
The redistribution and use of this software (with or without changes) is allowed without the payment of fees or royalties provided that:
source code distributions include the above copyright notice, this list of conditions and the following disclaimer;
binary distributions include the above copyright notice, this list of conditions and the following disclaimer in their documentation;
the name of the copyright holder is not used to endorse products built using this software without specific written permission.
This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose.
This is an AES implementation that uses only 8-bit byte operations on the cipher state (there are options to use 32-bit types if available).
The combination of mix columns and byte substitution used here is based on that developed by Karl Malbrain. His contribution is acknowledged. */
/* This version derived by Mark Tillotson 2012-01-23, tidied up, slimmed down and tailored to 8-bit microcontroller abilities and Arduino datatypes.
The s-box and inverse s-box were retained as tables (0.5kB PROGMEM) but all the other transformations are coded to save table space. Many efficiency improvments to the routines mix_sub_columns() and inv_mix_sub_columns() (mainly common sub-expression elimination).
Only the routines with precalculated subkey schedule are retained (together with set_key() - this does however mean each AES object takes 240 bytes of RAM, alas)
The CBC routines side-effect the iv argument (so that successive calls work together correctly).
All the encryption and decryption routines work with plain == cipher for in-place encryption, note.