1 .\" DO NOT MODIFY THIS FILE! It was generated by gdoc.
2 .TH "gnutls_pk_bits_to_sec_param" 3 "2.12.6.1" "gnutls" "gnutls"
4 gnutls_pk_bits_to_sec_param \- API function
6 .B #include <gnutls/gnutls.h>
8 .BI "gnutls_sec_param_t gnutls_pk_bits_to_sec_param(gnutls_pk_algorithm_t " algo ", unsigned int " bits ");"
10 .IP "gnutls_pk_algorithm_t algo" 12
11 is a public key algorithm
12 .IP "unsigned int bits" 12
15 This is the inverse of \fBgnutls_sec_param_to_pk_bits()\fP. Given an algorithm
16 and the number of bits, it will return the security parameter. This is
19 The security parameter.
21 Report bugs to <bug-gnutls@gnu.org>.
22 GnuTLS home page: http://www.gnu.org/software/gnutls/
23 General help using GNU software: http://www.gnu.org/gethelp/
25 Copyright \(co 2008 Free Software Foundation.
27 Copying and distribution of this file, with or without modification,
28 are permitted in any medium without royalty provided the copyright
29 notice and this notice are preserved.
31 The full documentation for
33 is maintained as a Texinfo manual. If the
37 programs are properly installed at your site, the command
41 should give you access to the complete manual.