NAME | SYNOPSIS | ARGUMENTS | DESCRIPTION | RETURNS | DEPRECATED | REPORTING BUGS | COPYRIGHT | SEE ALSO | COLOPHON |
gnutls_openpgp_privkey_sign_hash(3)gnutlsgnutls_openpgp_privkey_sign_hash(3)
gnutls_openpgp_privkey_sign_hash - API function
#include <gnutls/compat.h> int gnutls_openpgp_privkey_sign_hash(gnutls_openpgp_privkey_t key, const gnutls_datum_t * hash, gnutls_datum_t * signature);
gnutls_openpgp_privkey_t key Holds the key const gnutls_datum_t * hash holds the data to be signed gnutls_datum_t * signature will contain newly allocated signature
This function will sign the given hash using the private key. You should use gnutls_openpgp_privkey_set_preferred_key_id() before calling this function to set the subkey to use.
On success, GNUTLS_E_SUCCESS (0) is returned, otherwise a negative error value.
Use gnutls_privkey_sign_hash() instead.
Report bugs to <bugs@gnutls.org>. Home page: http://www.gnutls.org
Copyright © 2001-2017 Free Software Foundation, Inc., and others. Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved.
The full documentation for gnutls is maintained as a Texinfo manual. If the /usr/share/doc/gnutls/ directory does not contain the HTML form visit http://www.gnutls.org/manual/
This page is part of the GnuTLS (GnuTLS Transport Layer Security
Library) project. Information about the project can be found at
⟨http://www.gnutls.org/⟩. If you have a bug report for this manual
page, send it to bugs@gnutls.org.. This page was obtained from the
tarball gnutls-3.5.9.tar.xz fetched from
⟨http://www.gnutls.org/download.html⟩ on 2017-07-05. If you discover
any rendering problems in this HTML version of the page, or you
believe there is a better or more up-to-date source for the page, or
you have corrections or improvements to the information in this
COLOPHON (which is not part of the original manual page), send a mail
to man-pages@man7.org
gnutls 3.5.9gnutls_openpgp_privkey_sign_hash(3)