Sha256: 876caca166880fefb6dce659f440d0a3299e9b72b2e222eb891e1fb64fbebb40

Contents?: true

Size: 1.58 KB

Versions: 2

Compression:

Stored size: 1.58 KB

Contents

.\" DO NOT MODIFY THIS FILE!  It was generated by gdoc.
.TH "gnutls_x509_trust_list_remove_trust_file" 3 "3.1.11" "gnutls" "gnutls"
.SH NAME
gnutls_x509_trust_list_remove_trust_file \- API function
.SH SYNOPSIS
.B #include <gnutls/x509.h>
.sp
.BI "int gnutls_x509_trust_list_remove_trust_file(gnutls_x509_trust_list_t " list ", const char* " ca_file ", gnutls_x509_crt_fmt_t " type ");"
.SH ARGUMENTS
.IP "gnutls_x509_trust_list_t list" 12
The structure of the list
.IP "const char* ca_file" 12
A file containing a list of CAs
.IP "gnutls_x509_crt_fmt_t type" 12
The format of the certificates
.SH "DESCRIPTION"
This function will add the given certificate authorities
to the trusted list. pkcs11 URLs are also accepted, instead
of files, by this function.
.SH "RETURNS"
The number of added elements is returned.
.SH "SINCE"
3.1.10
.SH "REPORTING BUGS"
Report bugs to <bug-gnutls@gnu.org>.
.br
General guidelines for reporting bugs: http://www.gnu.org/gethelp/
.br
GnuTLS home page: http://www.gnu.org/software/gnutls/

.SH COPYRIGHT
Copyright \(co 2012 Free Software Foundation, Inc..
.br
Copying and distribution of this file, with or without modification,
are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
.SH "SEE ALSO"
The full documentation for
.B gnutls
is maintained as a Texinfo manual.  If the
.B info
and
.B gnutls
programs are properly installed at your site, the command
.IP
.B info gnutls
.PP
should give you access to the complete manual.
As an alternative you may obtain the manual from:
.IP
.B http://www.gnu.org/software/gnutls/manual/
.PP

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
glib2-2.0.2-x86-mingw32 vendor/local/share/man/man3/gnutls_x509_trust_list_remove_trust_file.3
glib2-2.0.1-x86-mingw32 vendor/local/share/man/man3/gnutls_x509_trust_list_remove_trust_file.3