/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/types/ |
H A D | revocation_key.rs | 58 pk_algo: PublicKeyAlgorithm, field 74 RevocationKey::new(cert.primary_key().pk_algo(), in from() 82 pub fn new(pk_algo: PublicKeyAlgorithm, fp: Fingerprint, sensitive: bool) in new() 86 pk_algo, fp, sensitive, unknown: 0, in new() 91 pub fn from_bits(pk_algo: PublicKeyAlgorithm, fp: Fingerprint, class: u8) in from_bits() 100 pk_algo, fp, sensitive, unknown, in from_bits() 117 (self.pk_algo, &self.fp) in revoker() 121 pub fn set_revoker(&mut self, pk_algo: PublicKeyAlgorithm, fp: Fingerprint) in set_revoker() 123 let pk_algo = std::mem::replace(&mut self.pk_algo, pk_algo); in set_revoker() localVariable 125 (pk_algo, fp) in set_revoker() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/types/ |
H A D | revocation_key.rs | 58 pk_algo: PublicKeyAlgorithm, field 74 RevocationKey::new(cert.primary_key().pk_algo(), in from() 82 pub fn new(pk_algo: PublicKeyAlgorithm, fp: Fingerprint, sensitive: bool) in new() 86 pk_algo, fp, sensitive, unknown: 0, in new() 91 pub fn from_bits(pk_algo: PublicKeyAlgorithm, fp: Fingerprint, class: u8) in from_bits() 100 pk_algo, fp, sensitive, unknown, in from_bits() 117 (self.pk_algo, &self.fp) in revoker() 121 pub fn set_revoker(&mut self, pk_algo: PublicKeyAlgorithm, fp: Fingerprint) in set_revoker() 123 let pk_algo = std::mem::replace(&mut self.pk_algo, pk_algo); in set_revoker() localVariable 125 (pk_algo, fp) in set_revoker() [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/ |
H A D | one_pass_sig.rs | 43 pk_algo: PublicKeyAlgorithm, field 56 .field("pk_algo", &self.pk_algo) in fmt() 70 pk_algo: PublicKeyAlgorithm::Unknown(0), in new() 87 pub fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 88 self.pk_algo in pk_algo() 93 ::std::mem::replace(&mut self.pk_algo, algo) in set_pk_algo() 164 pk_algo: s.pk_algo(), in try_from()
|
H A D | pkesk.rs | 39 pk_algo: PublicKeyAlgorithm, field 46 pub fn new(recipient: KeyID, pk_algo: PublicKeyAlgorithm, in new() 52 pk_algo, in new() 88 pk_algo: recipient.pk_algo(), in for_recipient() 104 pub fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 105 self.pk_algo in pk_algo() 110 ::std::mem::replace(&mut self.pk_algo, algo) in set_pk_algo() 203 let (ciphertext, pk_algo) = loop { in arbitrary() 205 if let Some(pk_algo) = ciphertext.pk_algo() { in arbitrary() 206 break (ciphertext, pk_algo); in arbitrary() [all …]
|
H A D | key.rs | 731 pk_algo: PublicKeyAlgorithm, field 744 && self.pk_algo == other.pk_algo in eq() 809 self.pk_algo.cmp(&b.pk_algo) in public_cmp() 839 pk_algo, in new() 929 pk_algo, in with_secret() 969 self.pk_algo in pk_algo() 978 ::std::mem::replace(&mut self.pk_algo, pk_algo) in set_pk_algo() 1132 let pk_algo = self.pk_algo; in decrypt_secret() localVariable 1527 pk_algo: mpis.algo() in arbitrary() 1603 let pk_algo = pair.pk_algo(); in encrypted_rsa_key() localVariable [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/ |
H A D | one_pass_sig.rs | 43 pk_algo: PublicKeyAlgorithm, field 56 .field("pk_algo", &self.pk_algo) in fmt() 70 pk_algo: PublicKeyAlgorithm::Unknown(0), in new() 87 pub fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 88 self.pk_algo in pk_algo() 93 ::std::mem::replace(&mut self.pk_algo, algo) in set_pk_algo() 164 pk_algo: s.pk_algo(), in try_from()
|
H A D | pkesk.rs | 39 pk_algo: PublicKeyAlgorithm, field 46 pub fn new(recipient: KeyID, pk_algo: PublicKeyAlgorithm, in new() 52 pk_algo, in new() 88 pk_algo: recipient.pk_algo(), in for_recipient() 104 pub fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 105 self.pk_algo in pk_algo() 110 ::std::mem::replace(&mut self.pk_algo, algo) in set_pk_algo() 203 let (ciphertext, pk_algo) = loop { in arbitrary() 205 if let Some(pk_algo) = ciphertext.pk_algo() { in arbitrary() 206 break (ciphertext, pk_algo); in arbitrary() [all …]
|
H A D | key.rs | 731 pk_algo: PublicKeyAlgorithm, field 744 && self.pk_algo == other.pk_algo in eq() 809 self.pk_algo.cmp(&b.pk_algo) in public_cmp() 839 pk_algo, in new() 929 pk_algo, in with_secret() 969 self.pk_algo in pk_algo() 978 ::std::mem::replace(&mut self.pk_algo, pk_algo) in set_pk_algo() 1132 let pk_algo = self.pk_algo; in decrypt_secret() localVariable 1527 pk_algo: mpis.algo() in arbitrary() 1603 let pk_algo = pair.pk_algo(); in encrypted_rsa_key() localVariable [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/autocrypt/src/ |
H A D | cert.rs | 58 assert_eq!(cert1.primary_key().pk_algo(), in autocrypt_v1() 60 assert_eq!(cert1.keys().subkeys().next().unwrap().key().pk_algo(), in autocrypt_v1() 69 assert_eq!(cert1.primary_key().pk_algo(), in autocrypt_v1_1() 71 assert_eq!(cert1.keys().subkeys().next().unwrap().key().pk_algo(), in autocrypt_v1_1()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/autocrypt/src/ |
H A D | cert.rs | 58 assert_eq!(cert1.primary_key().pk_algo(), in autocrypt_v1() 60 assert_eq!(cert1.keys().subkeys().next().unwrap().key().pk_algo(), in autocrypt_v1() 69 assert_eq!(cert1.primary_key().pk_algo(), in autocrypt_v1_1() 71 assert_eq!(cert1.keys().subkeys().next().unwrap().key().pk_algo(), in autocrypt_v1_1()
|
/dports/security/gnutls/gnutls-3.6.16/lib/ |
H A D | tls-sig.c | 124 gnutls_pk_algorithm_t pk_algo; in _gnutls_handshake_sign_data10() local 126 pk_algo = gnutls_privkey_get_pk_algorithm(pkey, NULL); in _gnutls_handshake_sign_data10() 127 if (pk_algo == GNUTLS_PK_RSA) in _gnutls_handshake_sign_data10() 138 pk_algo = gnutls_sign_get_pk_algorithm(sign_algo); in _gnutls_handshake_sign_data10() 139 if (pk_algo == GNUTLS_PK_UNKNOWN) in _gnutls_handshake_sign_data10() 221 gnutls_pk_algorithm_t pk_algo; in _gnutls_handshake_verify_data10() local 224 if (pk_algo == GNUTLS_PK_RSA) { in _gnutls_handshake_verify_data10() 230 sign_algo = gnutls_pk_to_sign(pk_algo, hash_algo); in _gnutls_handshake_verify_data10() 521 gnutls_pk_algorithm_t pk_algo; in _gnutls_handshake_verify_crt_vrfy10() local 526 if (pk_algo == GNUTLS_PK_RSA) { in _gnutls_handshake_verify_crt_vrfy10() [all …]
|
/dports/security/gnutls/gnutls-3.6.16/tests/ |
H A D | crq-basic.c | 81 unsigned pk_algo; member 89 .pk_algo = GNUTLS_PK_RSA, 97 .pk_algo = GNUTLS_PK_RSA, 191 if (ret != (int)crq_list[i].pk_algo) { in doit()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/ |
H A D | key.rs | 65 let pk_algo : u8 = key.pk_algo().into(); in pgp_key_public_key_algo() localVariable 66 pk_algo as c_int in pgp_key_public_key_algo()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/ |
H A D | key.rs | 65 let pk_algo : u8 = key.pk_algo().into(); in pgp_key_public_key_algo() localVariable 66 pk_algo as c_int in pgp_key_public_key_algo()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/signature/ |
H A D | mod.rs | 197 pk_algo: PublicKeyAlgorithm, field 254 pub(crate) fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 255 self.pk_algo in pk_algo() 440 pk_algo: PublicKeyAlgorithm::Unknown(0), in new() 1497 self.pk_algo = signer.public().pk_algo(); in pre_sign() 1605 .field("pk_algo", &self.pk_algo()) in fmt() 1676 pk_algo, 1691 pub fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 1692 self.fields.pk_algo() in pk_algo() 1876 && self.pk_algo() == other.pk_algo() in normalized_eq() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/signature/ |
H A D | mod.rs | 197 pk_algo: PublicKeyAlgorithm, field 254 pub(crate) fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 255 self.pk_algo in pk_algo() 440 pk_algo: PublicKeyAlgorithm::Unknown(0), in new() 1497 self.pk_algo = signer.public().pk_algo(); in pre_sign() 1605 .field("pk_algo", &self.pk_algo()) in fmt() 1676 pk_algo, 1691 pub fn pk_algo(&self) -> PublicKeyAlgorithm { in pk_algo() method 1692 self.fields.pk_algo() in pk_algo() 1876 && self.pk_algo() == other.pk_algo() in normalized_eq() [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/nettle/ |
H A D | asymmetric.rs | 31 match (self.public().pk_algo(), self.public().mpis(), secret) in sign() 136 (pk_algo, _, _) => Err(Error::InvalidOperation(format!( in sign() 139 pk_algo, self.public(), self.secret())).into()), in sign() 223 match self.pk_algo() { in encrypt() 265 let ok = match (sig.pk_algo(), self.mpis(), sig.mpis()) { in verify() 346 sig.pk_algo(), self.pk_algo(), sig.mpis())).into()), in verify() 484 let (mpis, secret, pk_algo) = match (curve.clone(), for_signing) { in generate_ecc() 606 pk_algo, in generate_ecc()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/nettle/ |
H A D | asymmetric.rs | 31 match (self.public().pk_algo(), self.public().mpis(), secret) in sign() 136 (pk_algo, _, _) => Err(Error::InvalidOperation(format!( in sign() 139 pk_algo, self.public(), self.secret())).into()), in sign() 223 match self.pk_algo() { in encrypt() 265 let ok = match (sig.pk_algo(), self.mpis(), sig.mpis()) { in verify() 346 sig.pk_algo(), self.pk_algo(), sig.mpis())).into()), in verify() 484 let (mpis, secret, pk_algo) = match (curve.clone(), for_signing) { in generate_ecc() 606 pk_algo, in generate_ecc()
|
/dports/security/gnupg/gnupg-2.3.3/sm/ |
H A D | sign.c | 541 int pk_algo; in gpgsm_sign() local 543 pk_algo = gpgsm_get_key_algo_info (cl->cert, &nbits); in gpgsm_sign() 544 cl->pk_algo = pk_algo; in gpgsm_sign() 553 if (pk_algo == GCRY_PK_ECC) in gpgsm_sign() 603 if (! gnupg_pk_is_allowed (opt.compliance, PK_USE_SIGNING, pk_algo, 0, in gpgsm_sign() 913 pubkey_algo_to_string (cl->pk_algo), in gpgsm_sign() 920 cl->pk_algo, in gpgsm_sign()
|
H A D | encrypt.c | 428 encrypt_dek (const DEK dek, ksba_cert_t cert, int pk_algo, in encrypt_dek() argument 467 if (pk_algo == GCRY_PK_ECC) in encrypt_dek() 756 int pk_algo; in gpgsm_encrypt() local 759 pk_algo = gpgsm_get_key_algo_info (cl->cert, &nbits); in gpgsm_encrypt() 760 if (!gnupg_pk_is_compliant (opt.compliance, pk_algo, 0, in gpgsm_encrypt() 776 && !gnupg_pk_is_compliant (CO_DE_VS, pk_algo, 0, NULL, nbits, NULL)) in gpgsm_encrypt() 779 rc = encrypt_dek (dek, cl->cert, pk_algo, &encval); in gpgsm_encrypt()
|
/dports/security/gnupg/gnupg-2.3.3/g10/ |
H A D | export.c | 636 enum gcry_pk_algos pk_algo; in cleartext_secret_key_to_openpgp() local 655 pk_algo = gcry_pk_map_name (key_type); in cleartext_secret_key_to_openpgp() 666 switch (canon_pk_algo (pk_algo)) in cleartext_secret_key_to_openpgp() 810 enum gcry_pk_algos pk_algo; in transfer_format_to_openpgp() local 898 pk_algo = gcry_pk_map_name (string); in transfer_format_to_openpgp() 906 switch (canon_pk_algo (pk_algo)) in transfer_format_to_openpgp() 910 pk_algo = 0; /* Does not match. */ in transfer_format_to_openpgp() 914 pk_algo = 0; /* Does not match. */ in transfer_format_to_openpgp() 918 pk_algo = 0; /* Does not match. */ in transfer_format_to_openpgp() 934 pk_algo = 0; /* Oops. */ in transfer_format_to_openpgp() [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/ |
H A D | decrypt.rs | 157 if ! pkesk.pk_algo().is_supported() { in decrypt() 173 let algo = key.pk_algo(); in decrypt() 212 if ! pkesk.pk_algo().is_supported() { in decrypt() 232 let algo = key.pk_algo(); in decrypt()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/ |
H A D | decrypt.rs | 157 if ! pkesk.pk_algo().is_supported() { in decrypt() 173 let algo = key.pk_algo(); in decrypt() 212 if ! pkesk.pk_algo().is_supported() { in decrypt() 232 let algo = key.pk_algo(); in decrypt()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/ |
H A D | parse.rs | 1329 if ! pk_algo.for_signing() { in parse() 1339 typ, pk_algo.into(), hash_algo, in parse() 1442 let pk_algo : PublicKeyAlgorithm = data[2].into(); in plausible() localVariable 1828 let pk_algo = php_try!(php.parse_u8("pk_algo")); in parse() localVariable 1837 sig.set_pk_algo(pk_algo.into()); in parse() 2178 pk_algo: PublicKeyAlgorithm, in parse() 2184 pk_algo, mpis) in parse() 2187 pk_algo: PublicKeyAlgorithm, in parse() 2194 pk_algo, mpis, secret) in parse() 2891 if ! pk_algo.for_encryption() { in parse() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/ |
H A D | parse.rs | 1329 if ! pk_algo.for_signing() { in parse() 1339 typ, pk_algo.into(), hash_algo, in parse() 1442 let pk_algo : PublicKeyAlgorithm = data[2].into(); in plausible() localVariable 1828 let pk_algo = php_try!(php.parse_u8("pk_algo")); in parse() localVariable 1837 sig.set_pk_algo(pk_algo.into()); in parse() 2178 pk_algo: PublicKeyAlgorithm, in parse() 2184 pk_algo, mpis) in parse() 2187 pk_algo: PublicKeyAlgorithm, in parse() 2194 pk_algo, mpis, secret) in parse() 2891 if ! pk_algo.for_encryption() { in parse() [all …]
|