Sha256: 9e1968d6393b0ddae05e6bd6811c5bc1624c8b3e78c17ab8c72ea50ba0556604

Contents?: true

Size: 1.51 KB

Versions: 3

Compression:

Stored size: 1.51 KB

Contents

.\" DO NOT MODIFY THIS FILE!  It was generated by gdoc.
.TH "gnutls_cipher_decrypt2" 3 "3.2.17" "gnutls" "gnutls"
.SH NAME
gnutls_cipher_decrypt2 \- API function
.SH SYNOPSIS
.B #include <gnutls/crypto.h>
.sp
.BI "int gnutls_cipher_decrypt2(gnutls_cipher_hd_t " handle ", const void * " ciphertext ", size_t " ciphertextlen ", void * " text ", size_t " textlen ");"
.SH ARGUMENTS
.IP "gnutls_cipher_hd_t handle" 12
is a \fBgnutls_cipher_hd_t\fP structure.
.IP "const void * ciphertext" 12
the data to encrypt
.IP "size_t ciphertextlen" 12
The length of data to encrypt
.IP "void * text" 12
the decrypted data
.IP "size_t textlen" 12
The available length for decrypted data
.SH "DESCRIPTION"
This function will decrypt the given data using the algorithm
specified by the context.

Note that in AEAD ciphers, this will not check the tag. You will
need to compare the tag sent with the value returned from \fBgnutls_cipher_tag()\fP.
.SH "RETURNS"
Zero or a negative error code on error.
.SH "SINCE"
2.12.0
.SH "REPORTING BUGS"
Report bugs to <bugs@gnutls.org>.
.br
Home page: http://www.gnutls.org

.SH COPYRIGHT
Copyright \(co 2001-2014 Free Software Foundation, Inc.
.br
Copying and distribution of this file, with or without modification,
are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
.SH "SEE ALSO"
The full documentation for
.B gnutls
is maintained as a Texinfo manual.
If the /usr/share/doc/gnutls/
directory does not contain the HTML form visit
.B
.IP http://www.gnutls.org/manual/
.PP

Version data entries

3 entries across 3 versions & 1 rubygems

Version Path
glib2-2.2.3-x86-mingw32 vendor/local/share/man/man3/gnutls_cipher_decrypt2.3
glib2-2.2.2-x86-mingw32 vendor/local/share/man/man3/gnutls_cipher_decrypt2.3
glib2-2.2.1-x86-mingw32 vendor/local/share/man/man3/gnutls_cipher_decrypt2.3