/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | Makefile.bsd | 31 ./${PROG} -k pubring.gpg NetBSD-6.0_RC1_hashes.asc 32 ./${PROG} -k pubring.gpg NetBSD-6.0_RC1_hashes.gpg 42 ./${PROG} -c dump -k pubring.gpg NetBSD-6.0_RC1_hashes.asc > /dev/null 45 @echo "testing pubring with one key" 50 ./chk.sh -k joyent-pubring.gpg digest-20121220.tgz 52 ./${PROG} -k pubring.gpg version.asc 54 ./${PROG} -k pubring.gpg noversion.asc 56 ./${PROG} -k pubring.gpg dash-escaped-text.asc
|
H A D | Makefile.in | 26 ./${PROG} -k pubring.gpg NetBSD-6.0_RC1_hashes.asc 27 ./${PROG} -k pubring.gpg NetBSD-6.0_RC1_hashes.gpg 37 ./${PROG} -c dump -k pubring.gpg NetBSD-6.0_RC1_hashes.asc > /dev/null 40 @echo "testing pubring with one key" 45 ./chk.sh -k joyent-pubring.gpg digest-20121220.tgz 47 ./${PROG} -k pubring.gpg version.asc 49 ./${PROG} -k pubring.gpg noversion.asc 51 ./${PROG} -k pubring.gpg dash-escaped-text.asc
|
H A D | chk.sh | 38 keyring=pubring.gpg 100 cp ${keyring} ${dir}/pubring.gpg 106 (cd ${dir} && ${here}/netpgpverify -k pubring.gpg ${name}.sig) || die "Bad signature"
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | netpgp.c | 237 (void) fprintf(io->errs, "can't open pubring '%s'\n", ringfile); 348 pgp_keyring_t *pubring; local 370 if ((pubring = calloc(1, sizeof(*pubring))) == NULL) { 386 if (!pgp_ssh2_readkeys(netpgp->io, pubring, NULL, filename, NULL, hashtype)) { 387 free(pubring); 392 if (netpgp->pubring == NULL) { 393 netpgp->pubring = pubring; 395 pgp_append_keyring(netpgp->pubring, pubrin [all...] |
H A D | crypto.c | 448 pgp_keyring_t *pubring, 515 parse->cbinfo.cryptinfo.pubring = pubring; 553 pgp_keyring_t *pubring, 585 parse->cbinfo.cryptinfo.pubring = pubring; 444 pgp_decrypt_file(pgp_io_t *io, const char *infile, const char *outfile, pgp_keyring_t *secring, pgp_keyring_t *pubring, const unsigned use_armour, const unsigned allow_overwrite, const unsigned sshkeys, void *passfp, int numtries, pgp_cbfunc_t *getpassfunc) argument 549 pgp_decrypt_buf(pgp_io_t *io, const void *input, const size_t insize, pgp_keyring_t *secring, pgp_keyring_t *pubring, const unsigned use_armour, const unsigned sshkeys, void *passfp, int numtries, pgp_cbfunc_t *getpassfunc) argument
|
H A D | ssh2pgp.c | 433 pgp_ssh2_readkeys(pgp_io_t *io, pgp_keyring_t *pubring, argument 451 EXPAND_ARRAY(pubring, key); 452 pubkey = &pubring->keys[pubring->keyc++]; 461 pubkey = &pubring->keys[0];
|
H A D | crypto.h | 252 pgp_keyring_t *pubring; member in struct:pgp_cryptinfo_t
|
H A D | reader.c | 2229 /* print key from pubring */ 2231 pubkey = pgp_getkeybyid(io, cbinfo->cryptinfo.pubring, 2252 pgp_print_keydata(io, cbinfo->cryptinfo.pubring, pubkey, 2295 pgp_print_keydata(io, cbinfo->cryptinfo.pubring, cbinfo->cryptinfo.keydata, "signature ",
|
H A D | packet-print.c | 1451 pgp_keyring_t *pubring, 1464 stream->cryptinfo.pubring = pubring; 1447 pgp_list_packets(pgp_io_t *io, char *filename, unsigned armour, pgp_keyring_t *secring, pgp_keyring_t *pubring, void *passfp, pgp_cbfunc_t *cb_get_passphrase) argument
|
/netbsd-current/crypto/external/bsd/netpgp/bin/netpgpverify/ |
H A D | Makefile | 42 ./${PROG} -k ${EXTDIST}/src/netpgpverify/pubring.gpg ${EXTDIST}/src/netpgpverify/NetBSD-6.0_RC1_hashes.asc 43 ./${PROG} -k ${EXTDIST}/src/netpgpverify/pubring.gpg ${EXTDIST}/src/netpgpverify/NetBSD-6.0_RC1_hashes.gpg 50 ./${PROG} -k ${EXTDIST}/src/netpgpverify/pubring.gpg ${EXTDIST}/src/netpgpverify/noversion.asc
|
/netbsd-current/crypto/external/bsd/netpgp/dist/bindings/perl/ |
H A D | netpgp.h | 50 void *pubring; /* public key ring */ member in struct:netpgp_t
|
H A D | netpgpperl_wrap.c | 2055 SWIG_croak("Usage: netpgp_t_pubring_set(self,pubring);"); 2066 if (arg1) (arg1)->pubring = arg2; 2097 result = (void *) ((arg1)->pubring);
|
/netbsd-current/crypto/external/bsd/netpgp/dist/bindings/python/ |
H A D | netpgp.h | 50 void *pubring; /* public key ring */ member in struct:netpgp_t
|
H A D | netpgppython.py | 69 __swig_setmethods__["pubring"] = _netpgppython.netpgp_t_pubring_set 70 __swig_getmethods__["pubring"] = _netpgppython.netpgp_t_pubring_get 71 if _newclass:pubring = _swig_property(_netpgppython.netpgp_t_pubring_get, _netpgppython.netpgp_t_pubring_set)
|
H A D | netpgppython_wrap.c | 3056 if (arg1) (arg1)->pubring = arg2; 3079 result = (void *) ((arg1)->pubring);
|
/netbsd-current/crypto/external/bsd/netpgp/dist/bindings/tcl/ |
H A D | netpgp.h | 50 void *pubring; /* public key ring */ member in struct:netpgp_t
|
H A D | netpgptcl_wrap.c | 2002 if (SWIG_GetArgs(interp, objc, objv,"oo:netpgp_t_pubring_set self pubring ",(void *)0,(void *)0) == TCL_ERROR) SWIG_fail; 2012 if (arg1) (arg1)->pubring = arg2; 2034 result = (void *) ((arg1)->pubring); 2232 { "-pubring",_wrap_netpgp_t_pubring_get, _wrap_netpgp_t_pubring_set},
|
/netbsd-current/crypto/external/bsd/netpgp/dist/include/ |
H A D | netpgp.h | 50 void *pubring; /* public key ring */ member in struct:__anon224
|
/netbsd-current/tests/usr.bin/netpgpverify/ |
H A D | t_netpgpverify.sh | 121 begin-base64 644 pubring.gpg 7196 atf_check -s exit:0 -o file:expected16 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg -c verify b.gpg 7197 atf_check -s exit:0 -o file:expected18 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg -c verify a.gpg 7198 # atf_check -s exit:0 -o file:expected19 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg -c verify NetBSD-6.0_RC2_hashes.asc 7199 atf_check -s exit:0 -o file:expected20 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg -c cat jj.asc 7200 atf_check -s exit:0 -o file:expected21 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg < a.gpg 7201 atf_check -s exit:0 -o file:expected22 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg < jj.asc 7203 atf_check -s exit:0 -o file:expected24 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg < b.gpg 7206 atf_check -s exit:0 -o file:expected27 -e empty env TZ=US/Pacific netpgpverify -k pubring.gpg < NetBSD-6.0_hashes.asc 7207 atf_check -s exit:0 -o file:expected28 -e empty env TZ=US/Pacific netpgpverify -k pubring [all...] |