Sponsored Content
Special Forums Cybersecurity Attacking Potential of sh-scripts Post 302509544 by disaster on Thursday 31st of March 2011 03:55:21 AM
Old 03-31-2011
Ok thank you, you helped my quite a bit Smilie
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Potential new user of Unix

Hi all, Complete and utter virgin Unix person here (I don't even have the OS yet) As I'm doing a "looking into it" kinda thing before I move from MS I hope my questions are not inappropriate. 1. Should I get some kind off anti virus software. I know Unix is pretty good for not getting them... (2 Replies)
Discussion started by: dhula
2 Replies

2. AIX

how to handle potential file contention

I need to change how a posting procedure currently works in order to improve load balancing but I am hitting a potential file contention problem that I was wondering if someone here could assist me with... In a directory called FilePool I would have a bunch of files that are constantly coming in... (3 Replies)
Discussion started by: philplasma
3 Replies

3. HP-UX

Potential file system contention on directory

We have an 8-processor Itanium system running HP-UX 11.23 connected to shared SAN discs. We have an application that creates files (about 10) in a specific directory. When the application terminates, these files are removed (unlink) and a few others are updated. The directory contains... (8 Replies)
Discussion started by: FDesrochers
8 Replies
gnutls_x509_crt_get_verify_algorithm(3) 			      gnutls				   gnutls_x509_crt_get_verify_algorithm(3)

NAME
gnutls_x509_crt_get_verify_algorithm - get hash algorithm used to verify signature. SYNOPSIS
#include <gnutls/x509.h> int gnutls_x509_crt_get_verify_algorithm(gnutls_x509_crt_t crt, const gnutls_datum_t * signature, gnutls_digest_algorithm_t * hash); ARGUMENTS
gnutls_x509_crt_t crt Holds the certificate const gnutls_datum_t * signature contains the signature gnutls_digest_algorithm_t * hash The result of the call with the hash algorithm used for signature DESCRIPTION
This function will read the certifcate and the signed data to determine the hash algorithm used to generate the signature. RETURNS
the 0 if the hash algorithm is found. A negative value is returned on error. SINCE
2.8.0 REPORTING BUGS
Report bugs to <bug-gnutls@gnu.org>. GnuTLS home page: http://www.gnu.org/software/gnutls/ General help using GNU software: http://www.gnu.org/gethelp/ COPYRIGHT
Copyright (C) 2008 Free Software Foundation. Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. SEE ALSO
The full documentation for gnutls is maintained as a Texinfo manual. If the info and gnutls programs are properly installed at your site, the command info gnutls should give you access to the complete manual. gnutls 2.8.6 gnutls_x509_crt_get_verify_algorithm(3)
All times are GMT -4. The time now is 05:22 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy