.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_authenticator_set_subkey" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_authenticator_set_subkey \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_authenticator_set_subkey(Shishi * " handle ", Shishi_asn1 " authenticator ", int32_t " subkeytype ", const char * " subkey ", size_t " subkeylen ");" .SH ARGUMENTS .IP "Shishi * handle" 12 shishi handle as allocated by \fBshishi_init()\fP. .IP "Shishi_asn1 authenticator" 12 authenticator as allocated by \fBshishi_authenticator()\fP. .IP "int32_t subkeytype" 12 input subkey type to store in authenticator. .IP "const char * subkey" 12 input subkey data to store in authenticator. .IP "size_t subkeylen" 12 size of input subkey data to store in authenticator. .SH "DESCRIPTION" Store subkey value in authenticator. A subkey is usually created by calling \fBshishi_key_random()\fP using the default encryption type of the key from the ticket that is being used. To save time, you may want to use \fBshishi_authenticator_add_subkey()\fP instead, which calculates the subkey and calls this function in one step. .SH "RETURN VALUE" Returns SHISHI_OK iff successful. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.