Sha256: ecca4a0cd8a4051b18d91800d64779e24ff0197cd282521f9f3c94a358dae63f

Contents?: true

Size: 1.37 KB

Versions: 2

Compression:

Stored size: 1.37 KB

Contents

.\" DO NOT MODIFY THIS FILE!  It was generated by gdoc.
.TH "gnutls_session_force_valid" 3 "3.1.11" "gnutls" "gnutls"
.SH NAME
gnutls_session_force_valid \- API function
.SH SYNOPSIS
.B #include <gnutls/gnutls.h>
.sp
.BI "void gnutls_session_force_valid(gnutls_session_t " session ");"
.SH ARGUMENTS
.IP "gnutls_session_t session" 12
is a \fBgnutls_session_t\fP structure.
.SH "DESCRIPTION"
Clears the invalid flag in a session. That means
that sessions were corrupt or invalid data were received 
can be re\-used. Use only when debugging or experimenting
with the TLS protocol. Should not be used in typical
applications.
.SH "REPORTING BUGS"
Report bugs to <bug-gnutls@gnu.org>.
.br
General guidelines for reporting bugs: http://www.gnu.org/gethelp/
.br
GnuTLS home page: http://www.gnu.org/software/gnutls/

.SH COPYRIGHT
Copyright \(co 2012 Free Software Foundation, Inc..
.br
Copying and distribution of this file, with or without modification,
are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
.SH "SEE ALSO"
The full documentation for
.B gnutls
is maintained as a Texinfo manual.  If the
.B info
and
.B gnutls
programs are properly installed at your site, the command
.IP
.B info gnutls
.PP
should give you access to the complete manual.
As an alternative you may obtain the manual from:
.IP
.B http://www.gnu.org/software/gnutls/manual/
.PP

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
glib2-2.0.2-x86-mingw32 vendor/local/share/man/man3/gnutls_session_force_valid.3
glib2-2.0.1-x86-mingw32 vendor/local/share/man/man3/gnutls_session_force_valid.3