gnutls_cipher_set_iv
NAMESYNOPSIS
ARGUMENTS
DESCRIPTION
SINCE
REPORTING BUGS
COPYRIGHT
SEE ALSO
NAME
gnutls_cipher_set_iv − API function
SYNOPSIS
#include <gnutls/gnutls.h>
void gnutls_cipher_set_iv(gnutls_cipher_hd_t handle, void * iv, size_t ivlen);
ARGUMENTS
gnutls_cipher_hd_t handle
is a gnutls_cipher_hd_t structure.
void * iv |
the IV to set |
size_t ivlen
The length of the IV
DESCRIPTION
This function will set the IV to be used for the next encryption block.
SINCE
3.0.0
REPORTING BUGS
Report bugs to <bug-gnutls@gnu.org>. GnuTLS home page: http://www.gnu.org/software/gnutls/ General help using GNU software: http://www.gnu.org/gethelp/
COPYRIGHT
Copyright
© 2008 Free Software Foundation.
Copying and distribution of this file, with or without
modification, are permitted in any medium without royalty
provided the copyright notice and this notice are
preserved.
SEE ALSO
The full documentation for gnutls is maintained as a Texinfo manual. If the info and gnutls programs are properly installed at your site, the command
info gnutls
should give you access to the complete manual.
More Linux Commands
manpages/sox.1.html
sox(1) - Sound eXchange, the Swiss Army knife of audio manip
Introduction SoX reads and writes audio files in most popular formats and can optionally apply effects to them. It can combine multiple input sources, synthesis
manpages/add_wch.3ncurses.html
add_wch(3ncurses) - add a complex character and rendition to
add_wch.3ncurses - The add_wch, wadd_wch, mvadd_wch, and mvwadd_wch functions put the complex character wch into the given window at its current position, which
manpages/getmsg.2.html
getmsg(2) unimplemented system calls - Linux manual page....
These system calls are not implemented in the Linux kernel. RETURN VALUE These system calls always return -1 and set errno to ENOSYS. NOTES Note that ftime(3),
manpages/pam_cracklib.8.html
pam_cracklib(8) - PAM module to check the password against d
This module can be plugged into the password stack of a given application to provide some plug-in strength-checking for passwords. The action of this module is
manpages/XtWidgetToApplicationContext.3.html
XtWidgetToApplicationContext(3) - create, destroy, and obtai
The XtCreateApplicationContext function returns an application context, which is an opaque type. Every application must have at least one application context. T
manpages/ldap_first_message.3.html
ldap_first_message(3) - Stepping through messages in a resul
These routines are used to step through the messages in a result chain received from ldap_result(3). For search operations, the result chain can contain referra
manpages/xdrrec_eof.3.html
xdrrec_eof(3) - library routines for external data represent
These routines allow C programmers to describe arbitrary data structures in a machine-independent fashion. Data for remote procedure calls are transmitted using
manpages/gammal.3.html
gammal(3) - (logarithm of the) gamma function (Man Page)....
These functions are deprecated: instead, use either the tgamma(3) or the lgamma(3) functions, as appropriate. For the definition of the Gamma function, see tgam
manpages/gpgconf.1.html
gpgconf(1) - Modify .gnupg home directories - Linux man page
The gpgconf is a utility to automatically and reasonable safely query and modify configuration files in the .gnupg home directory. It is designed not to be invo
manpages/update_panels.3curses.html
update_panels(3curses) - panel stack extension for curses...
Panels are ncurses(3NCURSES) windows with the added feature of depth. Panel functions allow the use of stacked windows and ensure the proper portions of each wi
manpages/dupwin.3ncurses.html
dupwin(3ncurses) - create curses windows - Linux man page...
Calling newwin creates and returns a pointer to a new window with the given number of lines and columns. The upper left-hand corner of the window is at line beg
manpages/system.3.html
system(3) - execute a shell command - Linux manual page.....
The system() library function uses fork(2) to create a child process that executes the shell command specified in command using execl(3) as follows: execl(/bin/
