Sha256: 384e34295b7b614adc854ea24cb0ebd259b38d1d304f02112008901821d57e43
Contents?: true
Size: 1.26 KB
Versions: 5
Compression:
Stored size: 1.26 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_ia_generate_challenge" 3 "2.4.2" "gnutls" "gnutls" .SH NAME gnutls_ia_generate_challenge \- API function .SH SYNOPSIS .B #include <gnutls/extra.h> .sp .BI "int gnutls_ia_generate_challenge(gnutls_session_t " session ", size_t " buffer_size ", char * " buffer ");" .SH ARGUMENTS .IP "gnutls_session_t session" 12 is a \fBgnutls_session_t\fP structure. .IP "size_t buffer_size" 12 size of output buffer. .IP "char * buffer" 12 pre-allocated buffer to contain \fIbuffer_size\fP bytes of output. .SH "DESCRIPTION" Generate an application challenge that the client cannot control or predict, based on the TLS/IA inner secret. .SH "RETURN VALUE" Returns 0 on success, or an negative error code. .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .SH COPYRIGHT Copyright \(co 2008 Free Software Foundation. .br Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual.
Version data entries
5 entries across 5 versions & 1 rubygems