| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| ssh2pgp.c | 277 pubkey = &key->key.seckey.pubkey; 343 /* convert an ssh (host) seckey to a pgp seckey */ 361 /*pgp_print_keydata(io, key, "sec", &key->key.seckey.pubkey, 0);*/ 365 (void) memcpy(&key->key.seckey.pubkey, pubkey, sizeof(*pubkey)); 366 key->key.seckey.s2k_usage = PGP_S2KU_ENCRYPTED_AND_HASHED; 367 key->key.seckey.alg = PGP_SA_CAST5; 368 key->key.seckey.s2k_specifier = PGP_S2KS_SALTED; 369 key->key.seckey.hash_alg = PGP_HASH_SHA1; 370 if (key->key.seckey.pubkey.alg == PGP_PKA_RSA) 438 pgp_key_t *seckey; local [all...] |
| openssl_crypto.c | 119 makeRSA(const pgp_rsa_pubkey_t *pubkey, const pgp_rsa_seckey_t *seckey) 128 if (seckey) { 129 d = BN_dup(seckey->d); 130 p = BN_dup(seckey->p); 131 q = BN_dup(seckey->q); 311 (void) fprintf(stderr,"makeECDSA: failed to set seckey for key\n"); 325 test_seckey(const pgp_seckey_t *seckey) 327 RSA *test = makeRSA(&seckey->pubkey.key.rsa, &seckey->key.rsa); 749 \param seckey RSA secret ke 903 pgp_seckey_t *seckey; local [all...] |
| signature.c | 791 * \param seckey 800 const pgp_seckey_t *seckey) 806 switch (seckey->pubkey.alg) { 810 if (seckey->key.rsa.d == NULL) { 817 if (seckey->key.dsa.x == NULL) { 824 if (seckey->key.ecdsa.x == NULL) { 833 seckey->pubkey.alg); 863 switch (seckey->pubkey.alg) { 867 if (!rsa_sign(&sig->hash, &key->key.rsa, &seckey->key.rsa, 876 if (!dsa_sign(&sig->hash, &key->key.dsa, &seckey->key.dsa [all...] |
| packet-parse.c | 1121 pgp_seckey_free(&c->u.seckey); 2420 if (!parse_pubkey_data(&pkt.u.seckey.pubkey, region, stream)) { 2425 pgp_print_pubkey(&pkt.u.seckey.pubkey); 2427 stream->reading_v3_secret = (pkt.u.seckey.pubkey.version != PGP_V4); 2432 pkt.u.seckey.s2k_usage = (pgp_s2k_usage_t)c; 2434 if (pkt.u.seckey.s2k_usage == PGP_S2KU_ENCRYPTED || 2435 pkt.u.seckey.s2k_usage == PGP_S2KU_ENCRYPTED_AND_HASHED) { 2439 pkt.u.seckey.alg = (pgp_symm_alg_t)c; 2443 pkt.u.seckey.s2k_specifier = (pgp_s2k_specifier_t)c; 2444 switch (pkt.u.seckey.s2k_specifier) 2482 pgp_packet_t seckey; local [all...] |
| keyring.c | 142 pgp_seckey_free(&keydata->key.seckey); 164 &keydata->key.seckey.pubkey; 194 &data->key.seckey : NULL; 212 &data->key.seckey : NULL; 226 pgp_seckey_t *seckey; member in struct:__anon990 276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) { 280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE); 281 *decrypt->seckey = content->seckey; [all...] |
| validate.h | 62 pgp_seckey_t seckey; member in struct:__anon1056
|
| crypto.c | 82 \param seckey 91 const pgp_seckey_t *seckey) 106 switch (seckey->pubkey.alg) { 114 &seckey->key.rsa, &seckey->pubkey.key.rsa); 154 &seckey->key.elgamal, &seckey->pubkey.key.elgamal); 301 *content->get_seckey.seckey = cbinfo->sshseckey; 516 parse->cbinfo.sshseckey = (sshkeys) ? &secring->keys[0].key.seckey : NULL; 588 parse->cbinfo.sshseckey = (sshkeys) ? &secring->keys[0].key.seckey : NULL [all...] |
| netpgp.c | 885 if (netpgp_getvar(netpgp, "need seckey")) { 913 if (!readsshkeys(netpgp, homedir, netpgp_getvar(netpgp, "need seckey"))) { 1270 pgp_sprint_keydata(netpgp->io, NULL, key, &cp, "signature ", &key->key.seckey.pubkey, 0); 1306 (void) fprintf(io->errs, "Cannot write seckey\n"); 1401 pgp_seckey_t *seckey; local 1426 for (i = 0, seckey = NULL ; !seckey && (i < attempts || attempts == INFINITE_ATTEMPTS) ; i++) { 1434 &keypair->key.seckey.pubkey, 0); 1442 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp); 1443 if (seckey == NULL) 1530 pgp_seckey_t *seckey; local [all...] |
| packet-print.c | 737 \param seckey 741 const pgp_seckey_t *seckey) 748 printf("S2K Usage: %d\n", seckey->s2k_usage); 749 if (seckey->s2k_usage != PGP_S2KU_NONE) { 750 printf("S2K Specifier: %d\n", seckey->s2k_specifier); 751 printf("Symmetric algorithm: %d (%s)\n", seckey->alg, 752 pgp_show_symm_alg(seckey->alg)); 753 printf("Hash algorithm: %d (%s)\n", seckey->hash_alg, 754 pgp_show_hash_alg((uint8_t)seckey->hash_alg)); 755 if (seckey->s2k_specifier != PGP_S2KS_SIMPLE) [all...] |
| packet.h | 832 const pgp_seckey_t *seckey; member in struct:__anon1040 840 const pgp_seckey_t **seckey; member in struct:__anon1041 883 pgp_seckey_t seckey; member in union:__anon1042 957 pgp_seckey_t seckey; member in union:__anon1044 989 pgp_keydata_key_t key; /* pubkey/seckey data */
|
| create.c | 576 if (!pgp_write_struct_seckey(&key->key.seckey, passphrase, 1285 \param seckey Secret Key to use 1293 const pgp_seckey_t *seckey, 1299 pgp_keyid(keyid, PGP_KEY_ID_SIZE, &seckey->pubkey, PGP_HASH_SHA1); /* XXX - hardcoded */ 1305 pgp_write_scalar(output, (unsigned)seckey->pubkey.alg, 1) &&
|
| validate.c | 272 key->seckey = content->seckey; 273 key->pubkey = key->seckey.pubkey;
|
| writer.c | 1347 \param seckey 1350 pgp_push_checksum_writer(pgp_output_t *output, pgp_seckey_t *seckey) 1364 if ((sum->hashed = seckey->checkhash) == NULL) { 1365 sum->hashed = seckey->checkhash = calloc(1, hashsize);
|
| misc.c | 140 pgp_add_to_secring(keyring, &content->seckey);
|
| reader.c | 2208 * sets the seckey in the content struct 2266 *content->get_seckey.seckey = secret;
|