.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_authenticator_add_cksum" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_authenticator_add_cksum \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_authenticator_add_cksum(Shishi * " handle ", Shishi_asn1 " authenticator ", Shishi_key * " key ", int " keyusage ", char * " data ", size_t " datalen ");" .SH ARGUMENTS .IP "Shishi * handle" 12 shishi handle as allocated by \fBshishi_init()\fP. .IP "Shishi_asn1 authenticator" 12 authenticator as allocated by \fBshishi_authenticator()\fP. .IP "Shishi_key * key" 12 key to to use for encryption. .IP "int keyusage" 12 cryptographic key usage value to use in encryption. .IP "char * data" 12 input array with data to calculate checksum on. .IP "size_t datalen" 12 size of input array with data to calculate checksum on. .SH "DESCRIPTION" Calculate checksum for data and store it in the authenticator. .SH "RETURN VALUE" Returns SHISHI_OK iff successful. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.