.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_cipher_decrypt" 3 "3.3.8" "gnutls" "gnutls" .SH NAME gnutls_cipher_decrypt \- API function .SH SYNOPSIS .B #include .sp .BI "int gnutls_cipher_decrypt(gnutls_cipher_hd_t " handle ", void * " ciphertext ", size_t " ciphertextlen ");" .SH ARGUMENTS .IP "gnutls_cipher_hd_t handle" 12 is a \fBgnutls_cipher_hd_t\fP structure. .IP "void * ciphertext" 12 the data to encrypt .IP "size_t ciphertextlen" 12 The length of data to encrypt .SH "DESCRIPTION" This function will decrypt the given data using the algorithm specified by the context. Note that in AEAD ciphers, this will not check the tag. You will need to compare the tag sent with the value returned from \fBgnutls_cipher_tag()\fP. .SH "RETURNS" Zero or a negative error code on error. .SH "SINCE" 2.10.0 .SH "REPORTING BUGS" Report bugs to . .br Home page: http://www.gnutls.org .SH COPYRIGHT Copyright \(co 2001-2014 Free Software Foundation, Inc.. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the /usr/share/doc/gnutls/ directory does not contain the HTML form visit .B .IP http://www.gnutls.org/manual/ .PP