• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/

Lines Matching defs:skey

34                                        gcry_mpi_t *data, gcry_mpi_t *skey,
37 gcry_mpi_t hash, gcry_mpi_t *skey);
113 gcry_mpi_t *skey, gcry_mpi_t **retfactors)
118 (void)skey;
125 dummy_check_secret_key (int algorithm, gcry_mpi_t *skey)
128 (void)skey;
148 gcry_mpi_t *skey, int flags)
153 (void)skey;
161 gcry_mpi_t *skey)
166 (void)skey;
547 gcry_mpi_t *skey, gcry_mpi_t **retfactors,
565 (algorithm, nbits, use_e, genparms, skey, retfactors, r_extrainfo);
571 (algorithm, nbits, use_e, skey, retfactors);
582 pubkey_check_secret_key (int algorithm, gcry_mpi_t *skey)
594 (algorithm, skey);
661 gcry_mpi_t *skey, int flags)
673 log_mpidump (" skey:", skey[i]);
683 rc = pubkey->decrypt (algorithm, result, data, skey, flags);
702 * Sign data with skey and put the result into resarr which
708 gcry_mpi_t *skey)
719 log_mpidump (" skey:", skey[i]);
728 rc = pubkey->sign (algorithm, resarr, data, skey);
2989 Caller has to provide a secret key as the SEXP skey and data in a
3017 gcry_mpi_t *skey = NULL, *data = NULL, plain = NULL;
3030 rc = sexp_to_key (s_skey, 1, NULL, &skey, &module_key);
3045 rc = pubkey_decrypt (module_key->mod_id, &plain, data, skey, flags);
3084 if (skey)
3086 release_mpi_array (skey);
3087 gcry_free (skey);
3118 Caller has to provide a secret key as the SEXP skey and data
3146 gcry_mpi_t *skey = NULL, hash = NULL, *result = NULL;
3158 rc = sexp_to_key (s_skey, 1, NULL, &skey, &module);
3183 rc = pubkey_sign (module->mod_id, result, hash, skey);
3254 if (skey)
3256 release_mpi_array (skey);
3257 gcry_free (skey);
3422 gcry_mpi_t skey[12];
3428 skey[0] = NULL;
3475 if (strlen (sec_elems) >= DIM(skey))
3525 rc = pubkey_generate (module->mod_id, nbits, use_e, list, skey,
3569 mpis[nelem++] = skey[i];
3586 mpis[nelem++] = skey[i];
3591 skey[i] = NULL;
3652 release_mpi_array (skey);