.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "gnutls_openpgp_crt_get_subkey_usage" 3 "2.4.2" "gnutls" "gnutls" .SH NAME gnutls_openpgp_crt_get_subkey_usage \- returns the key's usage .SH SYNOPSIS .B #include .sp .BI "int gnutls_openpgp_crt_get_subkey_usage(gnutls_openpgp_crt_t " key ", unsigned int " idx ", unsigned int * " key_usage ");" .SH ARGUMENTS .IP "gnutls_openpgp_crt_t key" 12 should contain a gnutls_openpgp_crt_t structure .IP "unsigned int idx" 12 the subkey index .IP "unsigned int * key_usage" 12 where the key usage bits will be stored .SH "DESCRIPTION" This function will return certificate's key usage, by checking the key algorithm. The key usage value will ORed values of \fBGNUTLS_KEY_DIGITAL_SIGNATURE\fP or \fBGNUTLS_KEY_KEY_ENCIPHERMENT\fP. A negative value may be returned in case of parsing error. .SH "RETURNS" key usage value. .SH "SINCE" 2.4.0 .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2008 Free Software Foundation. .br Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. .SH "SEE ALSO" The full documentation for .B gnutls is maintained as a Texinfo manual. If the .B info and .B gnutls programs are properly installed at your site, the command .IP .B info gnutls .PP should give you access to the complete manual.