Sha256: a56bcb6b71eac88b2cbffc48c339412bbdaa5523e1d7e71e055206cc8bc7d885
Contents?: true
Size: 1.51 KB
Versions: 5
Compression:
Stored size: 1.51 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_crypto_cipher_register" 3 "2.4.2" "gnutls" "gnutls" .SH NAME gnutls_crypto_cipher_register \- register a cipher algorithm .SH SYNOPSIS .B #include <gnutls/gnutls.h> .sp .BI "int gnutls_crypto_cipher_register(gnutls_cipher_algorithm_t " algorithm ", int " priority ", gnutls_crypto_cipher_st* " s ");" .SH ARGUMENTS .IP "gnutls_cipher_algorithm_t algorithm" 12 is the gnutls algorithm identifier .IP "int priority" 12 is the priority of the algorithm .IP "gnutls_crypto_cipher_st* s" 12 is a structure holding new cipher's data .SH "DESCRIPTION" This function will register a cipher algorithm to be used by gnutls. Any algorithm registered will override the included algorithms and by convention kernel implemented algorithms have priority of 90. The algorithm with the lowest priority will be used by gnutls. This function should be called before \fBgnutls_global_init()\fP. .SH "RETURNS" \fBGNUTLS_E_SUCCESS\fP on success, otherwise an error. .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .SH COPYRIGHT Copyright \(co 2008 Free Software Foundation. .br Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual.
Version data entries
5 entries across 5 versions & 1 rubygems