.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_crypto_encrypt" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_crypto_encrypt \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_crypto_encrypt(Shishi_crypto * " ctx ", const char * " in ", size_t " inlen ", char ** " out ", size_t * " outlen ");" .SH ARGUMENTS .IP "Shishi_crypto * ctx" 12 crypto context as returned by \fBshishi_crypto()\fP. .IP "const char * in" 12 input array with data to encrypt. .IP "size_t inlen" 12 size of input array with data to encrypt. .IP "char ** out" 12 output array with newly allocated encrypted data. .IP "size_t * outlen" 12 output variable with size of newly allocated output array. .SH "DESCRIPTION" Encrypt data, using information (e.g., key and initialization vector) from context. The IV is updated inside the context after this call. When the application no longer need to use the context, it should deallocate resources associated with it by calling \fBshishi_crypto_close()\fP. .SH "RETURN VALUE" Returns \fBSHISHI_OK\fP iff successful. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.