Sha256: cd8a4e7400b4151f91645d0d14129afa25630df4474099b74978679c9bb451a4
Contents?: true
Size: 1.53 KB
Versions: 2
Compression:
Stored size: 1.53 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_x509_trust_list_remove_trust_mem" 3 "3.1.11" "gnutls" "gnutls" .SH NAME gnutls_x509_trust_list_remove_trust_mem \- API function .SH SYNOPSIS .B #include <gnutls/x509.h> .sp .BI "int gnutls_x509_trust_list_remove_trust_mem(gnutls_x509_trust_list_t " list ", const gnutls_datum_t * " cas ", gnutls_x509_crt_fmt_t " type ");" .SH ARGUMENTS .IP "gnutls_x509_trust_list_t list" 12 The structure of the list .IP "const gnutls_datum_t * cas" 12 A buffer containing a list of CAs (optional) .IP "gnutls_x509_crt_fmt_t type" 12 The format of the certificates .SH "DESCRIPTION" This function will add the given certificate authorities to the trusted list. .SH "RETURNS" The number of added elements is returned. .SH "SINCE" 3.1.10 .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .br General guidelines for reporting bugs: http://www.gnu.org/gethelp/ .br GnuTLS home page: http://www.gnu.org/software/gnutls/ .SH COPYRIGHT Copyright \(co 2012 Free Software Foundation, Inc.. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual. As an alternative you may obtain the manual from: .IP .B http://www.gnu.org/software/gnutls/manual/ .PP
Version data entries
2 entries across 2 versions & 1 rubygems