HomeSort by: relevance | last modified time | path
    Searched defs:seckey (Results 1 - 14 of 14) sorted by relevancy

  /src/crypto/external/bsd/netpgp/dist/src/lib/
validate.h 62 pgp_seckey_t seckey; member in struct:__anon1056
validate.h 62 pgp_seckey_t seckey; member in struct:__anon1056
ssh2pgp.c 277 pubkey = &key->key.seckey.pubkey;
343 /* convert an ssh (host) seckey to a pgp seckey */
361 /*pgp_print_keydata(io, key, "sec", &key->key.seckey.pubkey, 0);*/
365 (void) memcpy(&key->key.seckey.pubkey, pubkey, sizeof(*pubkey));
366 key->key.seckey.s2k_usage = PGP_S2KU_ENCRYPTED_AND_HASHED;
367 key->key.seckey.alg = PGP_SA_CAST5;
368 key->key.seckey.s2k_specifier = PGP_S2KS_SALTED;
369 key->key.seckey.hash_alg = PGP_HASH_SHA1;
370 if (key->key.seckey.pubkey.alg == PGP_PKA_RSA)
438 pgp_key_t *seckey; local
    [all...]
ssh2pgp.c 277 pubkey = &key->key.seckey.pubkey;
343 /* convert an ssh (host) seckey to a pgp seckey */
361 /*pgp_print_keydata(io, key, "sec", &key->key.seckey.pubkey, 0);*/
365 (void) memcpy(&key->key.seckey.pubkey, pubkey, sizeof(*pubkey));
366 key->key.seckey.s2k_usage = PGP_S2KU_ENCRYPTED_AND_HASHED;
367 key->key.seckey.alg = PGP_SA_CAST5;
368 key->key.seckey.s2k_specifier = PGP_S2KS_SALTED;
369 key->key.seckey.hash_alg = PGP_HASH_SHA1;
370 if (key->key.seckey.pubkey.alg == PGP_PKA_RSA)
438 pgp_key_t *seckey; local
    [all...]
keyring.c 142 pgp_seckey_free(&keydata->key.seckey);
164 &keydata->key.seckey.pubkey;
194 &data->key.seckey : NULL;
212 &data->key.seckey : NULL;
226 pgp_seckey_t *seckey; member in struct:__anon990
276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) {
280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE);
281 *decrypt->seckey = content->seckey;
    [all...]
openssl_crypto.c 119 makeRSA(const pgp_rsa_pubkey_t *pubkey, const pgp_rsa_seckey_t *seckey)
128 if (seckey) {
129 d = BN_dup(seckey->d);
130 p = BN_dup(seckey->p);
131 q = BN_dup(seckey->q);
311 (void) fprintf(stderr,"makeECDSA: failed to set seckey for key\n");
325 test_seckey(const pgp_seckey_t *seckey)
327 RSA *test = makeRSA(&seckey->pubkey.key.rsa, &seckey->key.rsa);
749 \param seckey RSA secret ke
903 pgp_seckey_t *seckey; local
    [all...]
keyring.c 142 pgp_seckey_free(&keydata->key.seckey);
164 &keydata->key.seckey.pubkey;
194 &data->key.seckey : NULL;
212 &data->key.seckey : NULL;
226 pgp_seckey_t *seckey; member in struct:__anon990
276 if ((decrypt->seckey = calloc(1, sizeof(*decrypt->seckey))) == NULL) {
280 decrypt->seckey->checkhash = calloc(1, PGP_CHECKHASH_SIZE);
281 *decrypt->seckey = content->seckey;
    [all...]
openssl_crypto.c 119 makeRSA(const pgp_rsa_pubkey_t *pubkey, const pgp_rsa_seckey_t *seckey)
128 if (seckey) {
129 d = BN_dup(seckey->d);
130 p = BN_dup(seckey->p);
131 q = BN_dup(seckey->q);
311 (void) fprintf(stderr,"makeECDSA: failed to set seckey for key\n");
325 test_seckey(const pgp_seckey_t *seckey)
327 RSA *test = makeRSA(&seckey->pubkey.key.rsa, &seckey->key.rsa);
749 \param seckey RSA secret ke
903 pgp_seckey_t *seckey; local
    [all...]
netpgp.c 885 if (netpgp_getvar(netpgp, "need seckey")) {
913 if (!readsshkeys(netpgp, homedir, netpgp_getvar(netpgp, "need seckey"))) {
1270 pgp_sprint_keydata(netpgp->io, NULL, key, &cp, "signature ", &key->key.seckey.pubkey, 0);
1306 (void) fprintf(io->errs, "Cannot write seckey\n");
1401 pgp_seckey_t *seckey; local
1426 for (i = 0, seckey = NULL ; !seckey && (i < attempts || attempts == INFINITE_ATTEMPTS) ; i++) {
1434 &keypair->key.seckey.pubkey, 0);
1442 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp);
1443 if (seckey == NULL)
1530 pgp_seckey_t *seckey; local
    [all...]
packet-parse.c 1121 pgp_seckey_free(&c->u.seckey);
2420 if (!parse_pubkey_data(&pkt.u.seckey.pubkey, region, stream)) {
2425 pgp_print_pubkey(&pkt.u.seckey.pubkey);
2427 stream->reading_v3_secret = (pkt.u.seckey.pubkey.version != PGP_V4);
2432 pkt.u.seckey.s2k_usage = (pgp_s2k_usage_t)c;
2434 if (pkt.u.seckey.s2k_usage == PGP_S2KU_ENCRYPTED ||
2435 pkt.u.seckey.s2k_usage == PGP_S2KU_ENCRYPTED_AND_HASHED) {
2439 pkt.u.seckey.alg = (pgp_symm_alg_t)c;
2443 pkt.u.seckey.s2k_specifier = (pgp_s2k_specifier_t)c;
2444 switch (pkt.u.seckey.s2k_specifier)
2482 pgp_packet_t seckey; local
    [all...]
netpgp.c 885 if (netpgp_getvar(netpgp, "need seckey")) {
913 if (!readsshkeys(netpgp, homedir, netpgp_getvar(netpgp, "need seckey"))) {
1270 pgp_sprint_keydata(netpgp->io, NULL, key, &cp, "signature ", &key->key.seckey.pubkey, 0);
1306 (void) fprintf(io->errs, "Cannot write seckey\n");
1401 pgp_seckey_t *seckey; local
1426 for (i = 0, seckey = NULL ; !seckey && (i < attempts || attempts == INFINITE_ATTEMPTS) ; i++) {
1434 &keypair->key.seckey.pubkey, 0);
1442 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp);
1443 if (seckey == NULL)
1530 pgp_seckey_t *seckey; local
    [all...]
packet-parse.c 1121 pgp_seckey_free(&c->u.seckey);
2420 if (!parse_pubkey_data(&pkt.u.seckey.pubkey, region, stream)) {
2425 pgp_print_pubkey(&pkt.u.seckey.pubkey);
2427 stream->reading_v3_secret = (pkt.u.seckey.pubkey.version != PGP_V4);
2432 pkt.u.seckey.s2k_usage = (pgp_s2k_usage_t)c;
2434 if (pkt.u.seckey.s2k_usage == PGP_S2KU_ENCRYPTED ||
2435 pkt.u.seckey.s2k_usage == PGP_S2KU_ENCRYPTED_AND_HASHED) {
2439 pkt.u.seckey.alg = (pgp_symm_alg_t)c;
2443 pkt.u.seckey.s2k_specifier = (pgp_s2k_specifier_t)c;
2444 switch (pkt.u.seckey.s2k_specifier)
2482 pgp_packet_t seckey; local
    [all...]
packet.h 832 const pgp_seckey_t *seckey; member in struct:__anon1040
840 const pgp_seckey_t **seckey; member in struct:__anon1041
883 pgp_seckey_t seckey; member in union:__anon1042
957 pgp_seckey_t seckey; member in union:__anon1044
989 pgp_keydata_key_t key; /* pubkey/seckey data */
packet.h 832 const pgp_seckey_t *seckey; member in struct:__anon1040
840 const pgp_seckey_t **seckey; member in struct:__anon1041
883 pgp_seckey_t seckey; member in union:__anon1042
957 pgp_seckey_t seckey; member in union:__anon1044
989 pgp_keydata_key_t key; /* pubkey/seckey data */

Completed in 63 milliseconds