/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/bindings/perl/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|
H A D | netpgpperl_wrap.c | 2119 SWIG_croak("Usage: netpgp_t_secring_set(self,secring);"); 2130 if (arg1) (arg1)->secring = arg2; 2161 result = (void *) ((arg1)->secring);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/bindings/python/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|
H A D | netpgppython.py | 72 __swig_setmethods__["secring"] = _netpgppython.netpgp_t_secring_set 73 __swig_getmethods__["secring"] = _netpgppython.netpgp_t_secring_get 74 if _newclass:secring = _swig_property(_netpgppython.netpgp_t_secring_get, _netpgppython.netpgp_t_secring_set)
|
H A D | netpgppython_wrap.c | 3107 if (arg1) (arg1)->secring = arg2; 3130 result = (void *) ((arg1)->secring);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/bindings/tcl/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|
H A D | netpgptcl_wrap.c | 2050 if (SWIG_GetArgs(interp, objc, objv,"oo:netpgp_t_secring_set self secring ",(void *)0,(void *)0) == TCL_ERROR) SWIG_fail; 2060 if (arg1) (arg1)->secring = arg2; 2082 result = (void *) ((arg1)->secring); 2233 { "-secring",_wrap_netpgp_t_secring_get, _wrap_netpgp_t_secring_set},
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | crypto.c | 444 pgp_keyring_t *secring, 509 parse->cbinfo.cryptinfo.secring = secring; 513 parse->cbinfo.sshseckey = (sshkeys) ? &secring->keys[0].key.seckey : NULL; 549 pgp_keyring_t *secring, 581 parse->cbinfo.cryptinfo.secring = secring; 585 parse->cbinfo.sshseckey = (sshkeys) ? &secring->keys[0].key.seckey : NULL; 441 pgp_decrypt_file(pgp_io_t *io, const char *infile, const char *outfile, pgp_keyring_t *secring, pgp_keyring_t *pubring, const unsigned use_armour, const unsigned allow_overwrite, const unsigned sshkeys, void *passfp, int numtries, pgp_cbfunc_t *getpassfunc) argument 546 pgp_decrypt_buf(pgp_io_t *io, const void *input, const size_t insize, pgp_keyring_t *secring, pgp_keyring_t *pubring, const unsigned use_armour, const unsigned sshkeys, void *passfp, int numtries, pgp_cbfunc_t *getpassfunc) argument
|
H A D | netpgp.c | 258 pgp_keyring_t *secring; local 316 if ((secring = calloc(1, sizeof(*secring))) == NULL) { 321 if (!pgp_ssh2_readkeys(netpgp->io, pubring, secring, NULL, filename, hashtype)) { 323 free(secring); 327 netpgp->secring = secring; 861 netpgp->secring = readkeyring(netpgp, "secring"); 862 if (netpgp->secring 1394 pgp_keyring_t *secring; local [all...] |
H A D | ssh2pgp.c | 434 pgp_keyring_t *secring, const char *pubfile, 467 EXPAND_ARRAY(secring, key); 468 seckey = &secring->keys[secring->keyc++]; 433 pgp_ssh2_readkeys(pgp_io_t *io, pgp_keyring_t *pubring, pgp_keyring_t *secring, const char *pubfile, const char *secfile, unsigned hashtype) argument
|
H A D | crypto.h | 239 pgp_keyring_t *secring; member in struct:pgp_cryptinfo_t
|
H A D | packet-print.c | 1432 pgp_keyring_t *secring, 1445 stream->cryptinfo.secring = secring; 1429 pgp_list_packets(pgp_io_t *io, char *filename, unsigned armour, pgp_keyring_t *secring, pgp_keyring_t *pubring, void *passfp, pgp_cbfunc_t *cb_get_passphrase) argument
|
H A D | reader.c | 2163 if (!cbinfo->cryptinfo.secring) { 2170 pgp_getkeybyid(io, cbinfo->cryptinfo.secring, 2220 /* validate key from secring */ 2223 pgp_getkeybyid(io, cbinfo->cryptinfo.secring,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/include/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|