Lines Matching refs:seckey
885 if (netpgp_getvar(netpgp, "need seckey")) {
913 if (!readsshkeys(netpgp, homedir, netpgp_getvar(netpgp, "need seckey"))) {
1270 pgp_sprint_keydata(netpgp->io, NULL, key, &cp, "signature ", &key->key.seckey.pubkey, 0);
1306 (void) fprintf(io->errs, "Cannot write seckey\n");
1401 pgp_seckey_t *seckey;
1426 for (i = 0, seckey = NULL ; !seckey && (i < attempts || attempts == INFINITE_ATTEMPTS) ; i++) {
1434 &keypair->key.seckey.pubkey, 0);
1442 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp);
1443 if (seckey == NULL) {
1450 seckey = &secring->keys[0].key.seckey;
1453 if (seckey == NULL) {
1459 if (seckey->pubkey.alg == PGP_PKA_DSA) {
1463 ret = pgp_sign_detached(io, f, out, seckey, hashalg,
1469 ret = pgp_sign_file(io, f, out, seckey, hashalg,
1475 pgp_forget(seckey, sizeof(*seckey));
1530 pgp_seckey_t *seckey;
1555 for (i = 0, seckey = NULL ; !seckey && (i < attempts || attempts == INFINITE_ATTEMPTS) ; i++) {
1563 &keypair->key.seckey.pubkey, 0);
1571 seckey = pgp_decrypt_seckey(keypair, netpgp->passfp);
1572 if (seckey == NULL) {
1579 seckey = &secring->keys[0].key.seckey;
1582 if (seckey == NULL) {
1589 if (seckey->pubkey.alg == PGP_PKA_DSA) {
1592 signedmem = pgp_sign_buf(io, mem, size, seckey,
1606 pgp_forget(seckey, sizeof(*seckey));