Blame doc/functions/gnutls_x509_crl_privkey_sign

Packit Service 4684c1
Packit Service 4684c1
Packit Service 4684c1
Packit Service 4684c1
Packit Service 4684c1
@deftypefun {int} {gnutls_x509_crl_privkey_sign} (gnutls_x509_crl_t @var{crl}, gnutls_x509_crt_t @var{issuer}, gnutls_privkey_t @var{issuer_key}, gnutls_digest_algorithm_t @var{dig}, unsigned int @var{flags})
Packit Service 4684c1
@var{crl}: should contain a gnutls_x509_crl_t type
Packit Service 4684c1
Packit Service 4684c1
@var{issuer}: is the certificate of the certificate issuer
Packit Service 4684c1
Packit Service 4684c1
@var{issuer_key}: holds the issuer's private key
Packit Service 4684c1
Packit Service 4684c1
@var{dig}: The message digest to use. GNUTLS_DIG_SHA256 is the safe choice unless you know what you're doing.
Packit Service 4684c1
Packit Service 4684c1
@var{flags}: must be 0
Packit Service 4684c1
Packit Service 4684c1
This function will sign the CRL with the issuer's private key, and
Packit Service 4684c1
will copy the issuer's information into the CRL.
Packit Service 4684c1
Packit Service 4684c1
This must be the last step in a certificate CRL since all
Packit Service 4684c1
the previously set parameters are now signed.
Packit Service 4684c1
Packit Service 4684c1
A known limitation of this function is, that a newly-signed CRL will not
Packit Service 4684c1
be fully functional (e.g., for signature verification), until it
Packit Service 4684c1
is exported an re-imported.
Packit Service 4684c1
Packit Service 4684c1
After GnuTLS 3.6.1 the value of  @code{dig} may be @code{GNUTLS_DIG_UNKNOWN} ,
Packit Service 4684c1
and in that case, a suitable but reasonable for the key algorithm will be selected.
Packit Service 4684c1
Packit Service 4684c1
@strong{Returns:} On success, @code{GNUTLS_E_SUCCESS}  (0) is returned, otherwise a
Packit Service 4684c1
negative error value.
Packit Service 4684c1
Packit Service 4684c1
Since 2.12.0
Packit Service 4684c1
@end deftypefun