.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_crypto_decrypt" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_crypto_decrypt \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_crypto_decrypt(Shishi_crypto * " ctx ", const char * " in ", size_t " inlen ", char ** " out ", size_t * " outlen ");" .SH ARGUMENTS .IP "Shishi_crypto * ctx" 12 crypto context as returned by \fBshishi_crypto()\fP. .IP "const char * in" 12 input array with data to decrypt. .IP "size_t inlen" 12 size of input array with data to decrypt. .IP "char ** out" 12 output array with newly allocated decrypted data. .IP "size_t * outlen" 12 output variable with size of newly allocated output array. .SH "DESCRIPTION" Decrypt data, using information (e.g., key and initialization vector) from context. The IV is updated inside the context after this call. When the application no longer need to use the context, it should deallocate resources associated with it by calling \fBshishi_crypto_close()\fP. .SH "RETURN VALUE" Returns \fBSHISHI_OK\fP iff successful. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.