Sha256: 0675cf6c1128fa15b4651f6b033c68f7004e38f46a022e6cdb0c2b3d7be63921
Contents?: true
Size: 1.59 KB
Versions: 7
Compression:
Stored size: 1.59 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_cipher_encrypt2" 3 "3.1.4" "gnutls" "gnutls" .SH NAME gnutls_cipher_encrypt2 \- API function .SH SYNOPSIS .B #include <gnutls/crypto.h> .sp .BI "int gnutls_cipher_encrypt2(gnutls_cipher_hd_t " handle ", const void * " text ", size_t " textlen ", void * " ciphertext ", size_t " ciphertextlen ");" .SH ARGUMENTS .IP "gnutls_cipher_hd_t handle" 12 is a \fBgnutls_cipher_hd_t\fP structure. .IP "const void * text" 12 the data to encrypt .IP "size_t textlen" 12 The length of data to encrypt .IP "void * ciphertext" 12 the encrypted data .IP "size_t ciphertextlen" 12 The available length for encrypted data .SH "DESCRIPTION" This function will encrypt the given data using the algorithm specified by the context. .SH "RETURNS" Zero or a negative error code on error. .SH "SINCE" 2.12.0 .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .br General guidelines for reporting bugs: http://www.gnu.org/gethelp/ .br GnuTLS home page: http://www.gnu.org/software/gnutls/ .SH COPYRIGHT Copyright \(co 2012 Free Software Foundation, Inc.. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual. As an alternative you may obtain the manual from: .IP .B http://www.gnu.org/software/gnutls/manual/ .PP
Version data entries
7 entries across 7 versions & 1 rubygems