blob: b04505b54f44273b4c9abda0573368bb7795b6ac (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc.
.TH "gnutls_privkey_decrypt_data2" 3 "3.7.9" "gnutls" "gnutls"
.SH NAME
gnutls_privkey_decrypt_data2 \- API function
.SH SYNOPSIS
.B #include <gnutls/abstract.h>
.sp
.BI "int gnutls_privkey_decrypt_data2(gnutls_privkey_t " key ", unsigned int " flags ", const gnutls_datum_t * " ciphertext ", unsigned char * " plaintext ", size_t " plaintext_size ");"
.SH ARGUMENTS
.IP "gnutls_privkey_t key" 12
Holds the key
.IP "unsigned int flags" 12
zero for now
.IP "const gnutls_datum_t * ciphertext" 12
holds the data to be decrypted
.IP "unsigned char * plaintext" 12
a preallocated buffer that will be filled with the plaintext
.IP "size_t plaintext_size" 12
in/out size of the plaintext
.SH "DESCRIPTION"
This function will decrypt the given data using the algorithm
supported by the private key. Unlike with \fBgnutls_privkey_decrypt_data()\fP
this function operates in constant time and constant memory access.
.SH "RETURNS"
On success, \fBGNUTLS_E_SUCCESS\fP (0) is returned, otherwise a
negative error value.
.SH "SINCE"
3.6.5
.SH "REPORTING BUGS"
Report bugs to <bugs@gnutls.org>.
.br
Home page: https://www.gnutls.org
.SH COPYRIGHT
Copyright \(co 2001- Free Software Foundation, Inc., and others.
.br
Copying and distribution of this file, with or without modification,
are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
.SH "SEE ALSO"
The full documentation for
.B gnutls
is maintained as a Texinfo manual.
If the /usr/share/doc/gnutls/
directory does not contain the HTML form visit
.B
.IP https://www.gnutls.org/manual/
.PP
|