Vely logo Empower C
install  tutorials  examples
documentation  license  about

12.1.0 released on Sep 19, 2022

decrypt-data



PURPOSE:


Decrypt data.

SYNTAX:


decrypt-data <data> to [ define ] <result> password <password> \
    [ input-length <input length> ] \
    [ salt <salt> ] \
    [ output-length [ define ] <output length> ] \
    [ binary ]


DESCRIPTION:


decrypt-data will decrypt data <data> which must have been encrypted with encrypt-data, or other software using the same algorithms as specified. If "input-length" clause is not used, the data to decrypt is considered to be a string, i.e. null-terminated, otherwise, if specified, then exactly that many bytes are decrypted. Password used for decryption is <password> (in "password" clause) and it must match the password used in encrypt-data. If "salt" clause is used, then string <salt> must match salt used in encryption. "output-length" clause lets you obtain the number of bytes in decrypted data in <output length>, which can be created with optional "define". The result of decryption is in <result> (in "to" clause) and can be created with optional "define".

If data was encrypted with "binary" clause, you must decrypt it with the same, and if it was without such clause in encrypt-data, then you must not use it in decrypt-data either. The reason for this is obvious - binary mode of encryption is encrypted data in its shortest form, and character mode (without "binary") is the same data converted to a hexadecimal string - thus decryption must first convert such data back to binary before decrypting.

EXAMPLES:


See encrypt-data.

SEE ALSO:


Encryption ( decrypt-data   encrypt-data   hash-string   random-string  )  SEE ALL (documentation)



Copyright (c) 2022 DaSoftver LLC. Vely is a trademark of Dasoftver LLC. The software and information herein are provided "AS IS" and without any warranties or guarantees of any kind. Icons copyright PaweĊ‚ Kuna licensed under MIT. This web page is licensed under CC-BY-SA-4.0.