Blame doc/functions/gnutls_session_key_update
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@deftypefun {int} {gnutls_session_key_update} (gnutls_session_t @var{session}, unsigned @var{flags})
|
|
Packit Service |
4684c1 |
@var{session}: is a @code{gnutls_session_t} type.
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@var{flags}: zero of @code{GNUTLS_KU_PEER}
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
This function will update/refresh the session keys when the
|
|
Packit Service |
4684c1 |
TLS protocol is 1.3 or better. The peer is notified of the
|
|
Packit Service |
4684c1 |
update by sending a message, so this function should be
|
|
Packit Service |
4684c1 |
treated similarly to @code{gnutls_record_send()} --i.e., it may
|
|
Packit Service |
4684c1 |
return @code{GNUTLS_E_AGAIN} or @code{GNUTLS_E_INTERRUPTED} .
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
When this flag @code{GNUTLS_KU_PEER} is specified, this function
|
|
Packit Service |
4684c1 |
in addition to updating the local keys, will ask the peer to
|
|
Packit Service |
4684c1 |
refresh its keys too.
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
If the negotiated version is not TLS 1.3 or better this
|
|
Packit Service |
4684c1 |
function will return @code{GNUTLS_E_INVALID_REQUEST} .
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@strong{Returns:} @code{GNUTLS_E_SUCCESS} on success, otherwise a negative error code.
|
|
Packit Service |
4684c1 |
|
|
Packit Service |
4684c1 |
@strong{Since:} 3.6.3
|
|
Packit Service |
4684c1 |
@end deftypefun
|