Sha256: 8da57b6ce48cb4ff7a5fbac5530dc2ff59f4ce2b6f913d05aa43da6d21d270b8
Contents?: true
Size: 1.59 KB
Versions: 7
Compression:
Stored size: 1.59 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_sec_param_to_pk_bits" 3 "3.1.4" "gnutls" "gnutls" .SH NAME gnutls_sec_param_to_pk_bits \- API function .SH SYNOPSIS .B #include <gnutls/gnutls.h> .sp .BI "unsigned int gnutls_sec_param_to_pk_bits(gnutls_pk_algorithm_t " algo ", gnutls_sec_param_t " param ");" .SH ARGUMENTS .IP "gnutls_pk_algorithm_t algo" 12 is a public key algorithm .IP "gnutls_sec_param_t param" 12 is a security parameter .SH "DESCRIPTION" When generating private and public key pairs a difficult question is which size of "bits" the modulus will be in RSA and the group size in DSA. The easy answer is 1024, which is also wrong. This function will convert a human understandable security parameter to an appropriate size for the specific algorithm. .SH "RETURNS" The number of bits, or (0). .SH "SINCE" 2.12.0 .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .br General guidelines for reporting bugs: http://www.gnu.org/gethelp/ .br GnuTLS home page: http://www.gnu.org/software/gnutls/ .SH COPYRIGHT Copyright \(co 2012 Free Software Foundation, Inc.. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual. As an alternative you may obtain the manual from: .IP .B http://www.gnu.org/software/gnutls/manual/ .PP
Version data entries
7 entries across 7 versions & 1 rubygems