Sha256: e6dea8ffe6cdc980dd5147faf31e500ee9e458b0fe04a42900d48b71eabe3d93
Contents?: true
Size: 1.54 KB
Versions: 5
Compression:
Stored size: 1.54 KB
Contents
.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_ia_extract_inner_secret" 3 "2.4.2" "gnutls" "gnutls" .SH NAME gnutls_ia_extract_inner_secret \- API function .SH SYNOPSIS .B #include <gnutls/extra.h> .sp .BI "void gnutls_ia_extract_inner_secret(gnutls_session_t " session ", char * " buffer ");" .SH ARGUMENTS .IP "gnutls_session_t session" 12 is a \fBgnutls_session_t\fP structure. .IP "char * buffer" 12 pre-allocated buffer to hold 48 bytes of inner secret. .SH "DESCRIPTION" Copy the 48 bytes large inner secret into the specified buffer This function is typically used after the TLS/IA handshake has concluded. The TLS/IA inner secret can be used as input to a PRF to derive session keys. Do not use the inner secret directly as a session key, because for a resumed session that does not include an application phase, the inner secret will be identical to the inner secret in the original session. It is important to include, for example, the client and server randomness when deriving a sesssion key from the inner secret. .SH "REPORTING BUGS" Report bugs to <bug-gnutls@gnu.org>. .SH COPYRIGHT Copyright \(co 2008 Free Software Foundation. .br Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual.
Version data entries
5 entries across 5 versions & 1 rubygems