Sha256: 5f4a9d94e49f96fc18768276a5f6435333655b82f8d738c88b061eab0f140555
Contents?: true
Size: 1.46 KB
Versions: 7
Compression:
Stored size: 1.46 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_mac_list" 3 "3.1.4" "gnutls" "gnutls" .SH NAME gnutls_mac_list \- API function .SH SYNOPSIS .B #include <gnutls/gnutls.h> .sp .BI "const gnutls_mac_algorithm_t * gnutls_mac_list( " void ");" .SH ARGUMENTS .IP " void" 12 .SH "DESCRIPTION" Get a list of hash algorithms for use as MACs. Note that not necessarily all MACs are supported in TLS cipher suites. For example, MD2 is not supported as a cipher suite, but is supported for other purposes (e.g., X.509 signature verification or similar). This function is not thread safe. .SH "RETURNS" Return a (0)\-terminated list of \fBgnutls_mac_algorithm_t\fP integers indicating the available MACs. .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .br General guidelines for reporting bugs: http://www.gnu.org/gethelp/ .br GnuTLS home page: http://www.gnu.org/software/gnutls/ .SH COPYRIGHT Copyright \(co 2012 Free Software Foundation, Inc.. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual. As an alternative you may obtain the manual from: .IP .B http://www.gnu.org/software/gnutls/manual/ .PP
Version data entries
7 entries across 7 versions & 1 rubygems