Sha256: 88975172847099c74ff8431a67b73c038d828b906b77bfc0ea56bda006b3e2e6
Contents?: true
Size: 1.21 KB
Versions: 4
Compression:
Stored size: 1.21 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_mac_list" 3 "2.4.2" "gnutls" "gnutls" .SH NAME gnutls_mac_list \- Get a list of supported MAC algorithms .SH SYNOPSIS .B #include <gnutls/gnutls.h> .sp .BI "const gnutls_mac_algorithm_t * gnutls_mac_list( " void ");" .SH ARGUMENTS .IP " void" 12 .SH "DESCRIPTION" Get a list of hash algorithms for use as MACs. Note that not necessarily all MACs are supported in TLS cipher suites. For example, MD2 is not supported as a cipher suite, but is supported for other purposes (e.g., X.509 signature verification or similar). .SH "RETURNS" Return a zero\-terminated list of \fBgnutls_mac_algorithm_t\fP integers indicating the available MACs. .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .SH COPYRIGHT Copyright \(co 2008 Free Software Foundation. .br Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual.
Version data entries
4 entries across 4 versions & 1 rubygems