/netbsd-current/crypto/external/bsd/netpgp/dist/bindings/perl/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|
H A D | netpgpperl_wrap.c | 2119 SWIG_croak("Usage: netpgp_t_secring_set(self,secring);"); 2130 if (arg1) (arg1)->secring = arg2; 2161 result = (void *) ((arg1)->secring);
|
/netbsd-current/crypto/external/bsd/netpgp/dist/bindings/python/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|
H A D | netpgppython.py | 72 __swig_setmethods__["secring"] = _netpgppython.netpgp_t_secring_set 73 __swig_getmethods__["secring"] = _netpgppython.netpgp_t_secring_get 74 if _newclass:secring = _swig_property(_netpgppython.netpgp_t_secring_get, _netpgppython.netpgp_t_secring_set)
|
H A D | netpgppython_wrap.c | 3107 if (arg1) (arg1)->secring = arg2; 3130 result = (void *) ((arg1)->secring);
|
/netbsd-current/crypto/external/bsd/netpgp/dist/bindings/tcl/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:netpgp_t
|
H A D | netpgptcl_wrap.c | 2050 if (SWIG_GetArgs(interp, objc, objv,"oo:netpgp_t_secring_set self secring ",(void *)0,(void *)0) == TCL_ERROR) SWIG_fail; 2060 if (arg1) (arg1)->secring = arg2; 2082 result = (void *) ((arg1)->secring); 2233 { "-secring",_wrap_netpgp_t_secring_get, _wrap_netpgp_t_secring_set},
|
/netbsd-current/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | crypto.c | 447 pgp_keyring_t *secring, 512 parse->cbinfo.cryptinfo.secring = secring; 516 parse->cbinfo.sshseckey = (sshkeys) ? &secring->keys[0].key.seckey : NULL; 552 pgp_keyring_t *secring, 584 parse->cbinfo.cryptinfo.secring = secring; 588 parse->cbinfo.sshseckey = (sshkeys) ? &secring->keys[0].key.seckey : NULL; 444 pgp_decrypt_file(pgp_io_t *io, const char *infile, const char *outfile, pgp_keyring_t *secring, pgp_keyring_t *pubring, const unsigned use_armour, const unsigned allow_overwrite, const unsigned sshkeys, void *passfp, int numtries, pgp_cbfunc_t *getpassfunc) argument 549 pgp_decrypt_buf(pgp_io_t *io, const void *input, const size_t insize, pgp_keyring_t *secring, pgp_keyring_t *pubring, const unsigned use_armour, const unsigned sshkeys, void *passfp, int numtries, pgp_cbfunc_t *getpassfunc) argument
|
H A D | netpgp.c | 349 pgp_keyring_t *secring; local 407 if ((secring = calloc(1, sizeof(*secring))) == NULL) { 412 if (!pgp_ssh2_readkeys(netpgp->io, pubring, secring, NULL, filename, hashtype)) { 414 free(secring); 418 netpgp->secring = secring; 887 netpgp->secring = readkeyring(netpgp, "secring"); 888 if (netpgp->secring 1447 pgp_keyring_t *secring; local 1576 pgp_keyring_t *secring; local [all...] |
H A D | ssh2pgp.c | 434 pgp_keyring_t *secring, const char *pubfile, 467 EXPAND_ARRAY(secring, key); 468 seckey = &secring->keys[secring->keyc++]; 433 pgp_ssh2_readkeys(pgp_io_t *io, pgp_keyring_t *pubring, pgp_keyring_t *secring, const char *pubfile, const char *secfile, unsigned hashtype) argument
|
H A D | crypto.h | 249 pgp_keyring_t *secring; member in struct:pgp_cryptinfo_t
|
H A D | reader.c | 2177 if (!cbinfo->cryptinfo.secring) { 2184 pgp_getkeybyid(io, cbinfo->cryptinfo.secring, 2234 /* validate key from secring */ 2237 pgp_getkeybyid(io, cbinfo->cryptinfo.secring,
|
H A D | packet-print.c | 1450 pgp_keyring_t *secring, 1463 stream->cryptinfo.secring = secring; 1447 pgp_list_packets(pgp_io_t *io, char *filename, unsigned armour, pgp_keyring_t *secring, pgp_keyring_t *pubring, void *passfp, pgp_cbfunc_t *cb_get_passphrase) argument
|
/netbsd-current/crypto/external/bsd/netpgp/dist/include/ |
H A D | netpgp.h | 51 void *secring; /* s3kr1t key ring */ member in struct:__anon224
|