Sha256: f5ecc3644f0d2d5496f21ff2cc92bef2b2198874e985f7d24bc26dede01c0eac

Contents?: true

Size: 1.41 KB

Versions: 4

Compression:

Stored size: 1.41 KB

Contents

.\" DO NOT MODIFY THIS FILE!  It was generated by gdoc.
.TH "gnutls_openpgp_crt_get_subkey_usage" 3 "2.4.2" "gnutls" "gnutls"
.SH NAME
gnutls_openpgp_crt_get_subkey_usage \- returns the key's usage
.SH SYNOPSIS
.B #include <gnutls/openpgp.h>
.sp
.BI "int gnutls_openpgp_crt_get_subkey_usage(gnutls_openpgp_crt_t " key ", unsigned int " idx ", unsigned int * " key_usage ");"
.SH ARGUMENTS
.IP "gnutls_openpgp_crt_t key" 12
should contain a gnutls_openpgp_crt_t structure
.IP "unsigned int idx" 12
the subkey index
.IP "unsigned int * key_usage" 12
where the key usage bits will be stored
.SH "DESCRIPTION"
This function will return certificate's key usage, by checking the
key algorithm.  The key usage value will ORed values of
\fBGNUTLS_KEY_DIGITAL_SIGNATURE\fP or \fBGNUTLS_KEY_KEY_ENCIPHERMENT\fP.

A negative value may be returned in case of parsing error.
.SH "RETURNS"
key usage value.
.SH "SINCE"
2.4.0
.SH "REPORTING BUGS"
Report bugs to <bug-gnutls@gnu.org>.
.SH COPYRIGHT
Copyright \(co 2008 Free Software Foundation.
.br
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
preserved on all copies.
.SH "SEE ALSO"
The full documentation for
.B gnutls
is maintained as a Texinfo manual.  If the
.B info
and
.B gnutls
programs are properly installed at your site, the command
.IP
.B info gnutls
.PP
should give you access to the complete manual.

Version data entries

4 entries across 4 versions & 1 rubygems

Version Path
glib2-1.1.8-x86-mingw32 vendor/local/share/man/man3/gnutls_openpgp_crt_get_subkey_usage.3
glib2-1.1.7-x86-mingw32 vendor/local/share/man/man3/gnutls_openpgp_crt_get_subkey_usage.3
glib2-1.1.6-x86-mingw32 vendor/local/share/man/man3/gnutls_openpgp_crt_get_subkey_usage.3
glib2-1.1.5-x86-mingw32 vendor/local/share/man/man3/gnutls_openpgp_crt_get_subkey_usage.3