Sha256: a148115804a07ec330510cc4734639cd8cdf3729361b8cd96a6edc8adc57ee39
Contents?: true
Size: 1.55 KB
Versions: 4
Compression:
Stored size: 1.55 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_rehandshake" 3 "2.4.2" "gnutls" "gnutls" .SH NAME gnutls_rehandshake \- renegotiate security parameters .SH SYNOPSIS .B #include <gnutls/gnutls.h> .sp .BI "int gnutls_rehandshake(gnutls_session_t " session ");" .SH ARGUMENTS .IP "gnutls_session_t session" 12 is a \fBgnutls_session_t\fP structure. .SH "DESCRIPTION" This function will renegotiate security parameters with the client. This should only be called in case of a server. This message informs the peer that we want to renegotiate parameters (perform a handshake). If this function succeeds (returns 0), you must call the \fBgnutls_handshake()\fP function in order to negotiate the new parameters. If the client does not wish to renegotiate parameters he will should with an alert message, thus the return code will be \fBGNUTLS_E_WARNING_ALERT_RECEIVED\fP and the alert will be \fBGNUTLS_A_NO_RENEGOTIATION\fP. A client may also choose to ignore this message. .SH "RETURNS" \fBGNUTLS_E_SUCCESS\fP on success, otherwise an error. .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .SH COPYRIGHT Copyright \(co 2008 Free Software Foundation. .br Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual.
Version data entries
4 entries across 4 versions & 1 rubygems