Movatterモバイル変換


[0]ホーム

URL:


man7.org > Linux >man-pages

Linux/UNIX system programming training


gnutls_privkey_generate(3) — Linux manual page

NAME |SYNOPSIS |ARGUMENTS |DESCRIPTION |RETURNS |SINCE |REPORTING BUGS |COPYRIGHT |SEE ALSO |COLOPHON

gnutls_privkey_generate(3)        gnutlsgnutls_privkey_generate(3)

NAME        top

       gnutls_privkey_generate - API function

SYNOPSIS        top

#include <gnutls/abstract.h>int gnutls_privkey_generate(gnutls_privkey_tpkey,gnutls_pk_algorithm_talgo, unsigned intbits, unsigned intflags);

ARGUMENTS        top

       gnutls_privkey_t pkey                   An initialized private key       gnutls_pk_algorithm_t algo                   is one of the algorithms ingnutls_pk_algorithm_t.       unsigned int bits                   the size of the parameters to generate       unsigned int flags                   Must be zero or flags fromgnutls_privkey_flags_t.

DESCRIPTION        top

       This function will generate a random private key. Note that this       function must be called on an initialized private key.       The flagGNUTLS_PRIVKEY_FLAG_PROVABLEinstructs the key generation       process to use algorithms like Shawe-Taylor (from FIPS PUB186-4)       which generate provable parameters out of a seed for RSA and DSA       keys. Seegnutls_privkey_generate2()for more information.       Note that when generating an elliptic curve key, the curve can be       substituted in the place of the bits parameter using theGNUTLS_CURVE_TO_BITS()macro. The input to the macro is any curve       fromgnutls_ecc_curve_t.       For DSA keys, if the subgroup size needs to be specified check theGNUTLS_SUBGROUP_TO_BITS()macro.       It is recommended to do not set the number ofbits directly, usegnutls_sec_param_to_pk_bits()instead .       See alsognutls_privkey_generate2().

RETURNS        top

       On success,GNUTLS_E_SUCCESS(0) is returned, otherwise a negative       error value.

SINCE        top

       3.3.0

REPORTING BUGS        top

       Report bugs to <bugs@gnutls.org>.       Home page:https://www.gnutls.org

COPYRIGHT        top

       Copyright © 2001-2023 Free Software Foundation, Inc., and others.       Copying and distribution of this file, with or without       modification, are permitted in any medium without royalty provided       the copyright notice and this notice are preserved.

SEE ALSO        top

       The full documentation forgnutlsis maintained as a Texinfo       manual.  If the /usr/share/doc/gnutls/ directory does not contain       the HTML form visithttps://www.gnutls.org/manual/

COLOPHON        top

       This page is part of theGnuTLS (GnuTLS Transport Layer Security       Library) project.  Information about the project can be found at       ⟨http://www.gnutls.org/⟩.  If you have a bug report for this       manual page, send it to bugs@gnutls.org.  This page was obtained       from the tarball fetched from       ⟨https://www.gnupg.org/ftp/gcrypt/gnutls/⟩ on 2025-08-11.  If you       discover any rendering problems in this HTML version of the page,       or you believe there is a better or more up-to-date source for the       page, or you have corrections or improvements to the information       in this COLOPHON (which isnot part of the original manual page),       send a mail to man-pages@man7.orggnutls                            3.8.10gnutls_privkey_generate(3)


HTML rendering created 2025-09-06 byMichael Kerrisk, author ofThe Linux Programming Interface.

For details of in-depthLinux/UNIX system programming training courses that I teach, lookhere.

Hosting byjambit GmbH.

Cover of TLPI


[8]ページ先頭

©2009-2025 Movatter.jp