.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_openpgp_crt_get_subkey_usage" 3 "3.2.19" "gnutls" "gnutls" .SH NAME gnutls_openpgp_crt_get_subkey_usage \- API function .SH SYNOPSIS .B #include .sp .BI "int gnutls_openpgp_crt_get_subkey_usage(gnutls_openpgp_crt_t " key ", unsigned int " idx ", unsigned int * " key_usage ");" .SH ARGUMENTS .IP "gnutls_openpgp_crt_t key" 12 should contain a gnutls_openpgp_crt_t structure .IP "unsigned int idx" 12 the subkey index .IP "unsigned int * key_usage" 12 where the key usage bits will be stored .SH "DESCRIPTION" This function will return certificate's key usage, by checking the key algorithm. The key usage value will ORed values of \fBGNUTLS_KEY_DIGITAL_SIGNATURE\fP or \fBGNUTLS_KEY_KEY_ENCIPHERMENT\fP. A negative error code may be returned in case of parsing error. .SH "RETURNS" key usage value. .SH "SINCE" 2.4.0 .SH "REPORTING BUGS" Report bugs to . .br Home page: http://www.gnutls.org .SH COPYRIGHT Copyright \(co 2001-2014 Free Software Foundation, Inc. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the /usr/share/doc/gnutls/ directory does not contain the HTML form visit .B .IP http://www.gnutls.org/manual/ .PP