Lines Matching refs:secring
349 pgp_keyring_t *secring;
407 if ((secring = calloc(1, sizeof(*secring))) == NULL) {
412 if (!pgp_ssh2_readkeys(netpgp->io, pubring, secring, NULL, filename, hashtype)) {
414 free(secring);
418 netpgp->secring = secring;
887 netpgp->secring = readkeyring(netpgp, "secring");
888 if (netpgp->secring == NULL) {
891 /* now, if we don't have a valid user, use the first in secring */
895 if (get_first_ring(netpgp->secring, id, sizeof(id), 0)) {
958 if (netpgp->secring != NULL) {
959 pgp_keyring_free(netpgp->secring);
1213 ringname = "secring";
1289 (void) snprintf(ringfile = filename, sizeof(filename), "%s/secring.gpg", dir);
1294 (void) fprintf(io->errs, "can't append secring '%s'\n", ringfile);
1312 if (netpgp->secring != NULL) {
1313 pgp_keyring_free(netpgp->secring);
1382 return pgp_decrypt_file(netpgp->io, f, out, netpgp->secring,
1416 if ((keypair = resolve_userid(netpgp, netpgp->secring, userid)) == NULL) {
1432 "netpgp: warning - using pubkey from secring\n");
1447 pgp_keyring_t *secring;
1449 secring = netpgp->secring;
1450 seckey = &secring->keys[0].key.seckey;
1545 if ((keypair = resolve_userid(netpgp, netpgp->secring, userid)) == NULL) {
1561 "netpgp: warning - using pubkey from secring\n");
1576 pgp_keyring_t *secring;
1578 secring = netpgp->secring;
1579 seckey = &secring->keys[0].key.seckey;
1733 mem = pgp_decrypt_buf(netpgp->io, input, insize, netpgp->secring,
1811 netpgp->secring,