/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/ |
H A D | mod.rs | 254 OnePassSig(OnePassSig), enumerator 315 impl_into_iterator!(OnePassSig); 348 &Packet::OnePassSig(_) => Tag::OnePassSig, in tag() 943 pub enum OnePassSig { enum 952 impl OnePassSig { implementation 956 &OnePassSig::V3(_) => 3, in version() 962 impl From<OnePassSig> for Packet { 963 fn from(s: OnePassSig) -> Self { in from() 964 Packet::OnePassSig(s) in from() 969 impl Deref for OnePassSig { implementation [all …]
|
H A D | tag.rs | 26 OnePassSig, enumerator 103 4 => OnePassSig, in from() 137 &Tag::OnePassSig => 4, in from() 181 Tag::OnePassSig => in fmt() 252 || *self == Tag::OnePassSig in valid_start_of_message()
|
H A D | one_pass_sig.rs | 137 impl From<OnePassSig3> for super::OnePassSig { implementation 139 super::OnePassSig::V3(s) in from() 145 super::OnePassSig::from(p).into() in from() 172 impl Arbitrary for super::OnePassSig { implementation
|
H A D | prelude.rs | 34 OnePassSig,
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/ |
H A D | mod.rs | 254 OnePassSig(OnePassSig), enumerator 315 impl_into_iterator!(OnePassSig); 348 &Packet::OnePassSig(_) => Tag::OnePassSig, in tag() 943 pub enum OnePassSig { enum 952 impl OnePassSig { impl 956 &OnePassSig::V3(_) => 3, in version() 962 impl From<OnePassSig> for Packet { 963 fn from(s: OnePassSig) -> Self { in from() 964 Packet::OnePassSig(s) in from() 969 impl Deref for OnePassSig { implementation [all …]
|
H A D | tag.rs | 26 OnePassSig, enumerator 103 4 => OnePassSig, in from() 137 &Tag::OnePassSig => 4, in from() 181 Tag::OnePassSig => in fmt() 252 || *self == Tag::OnePassSig in valid_start_of_message()
|
H A D | one_pass_sig.rs | 137 impl From<OnePassSig3> for super::OnePassSig { implementation 139 super::OnePassSig::V3(s) in from() 145 super::OnePassSig::from(p).into() in from() 172 impl Arbitrary for super::OnePassSig { implementation
|
H A D | prelude.rs | 34 OnePassSig,
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/tests/ |
H A D | sq-sign.rs | 43 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign() 97 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append() 147 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append() 153 if let Packet::OnePassSig(ref ops) = packets[1] { in sq_sign_append() 238 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append_on_compress_then_sign() 289 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append_on_compress_then_sign() 295 if let Packet::OnePassSig(ref ops) = packets[1] { in sq_sign_append_on_compress_then_sign() 565 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append_a_notarization() 571 if let Packet::OnePassSig(ref ops) = packets[1] { in sq_sign_append_a_notarization() 577 if let Packet::OnePassSig(ref ops) = packets[2] { in sq_sign_append_a_notarization() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/tests/ |
H A D | sq-sign.rs | 43 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign() 97 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append() 147 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append() 153 if let Packet::OnePassSig(ref ops) = packets[1] { in sq_sign_append() 238 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append_on_compress_then_sign() 289 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append_on_compress_then_sign() 295 if let Packet::OnePassSig(ref ops) = packets[1] { in sq_sign_append_on_compress_then_sign() 565 if let Packet::OnePassSig(ref ops) = packets[0] { in sq_sign_append_a_notarization() 571 if let Packet::OnePassSig(ref ops) = packets[1] { in sq_sign_append_a_notarization() 577 if let Packet::OnePassSig(ref ops) = packets[2] { in sq_sign_append_a_notarization() [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/message/ |
H A D | mod.rs | 222 Tag::OnePassSig => Token::OPS, in push() 746 s: &[(OnePassSig, 0), (Literal, 0), (Signature, 0)], in tags() 750 s: &[(OnePassSig, 0), (CompressedData, 0), (Literal, 1), in tags() 755 s: &[(OnePassSig, 0), (OnePassSig, 0), (Literal, 0), in tags() 760 s: &[(OnePassSig, 0), (OnePassSig, 0), (Literal, 0), in tags() 765 s: &[(OnePassSig, 0), (OnePassSig, 0), (SEIP, 0), in tags() 766 (OnePassSig, 1), (SEIP, 1), (Literal, 2), (MDC, 2), in tags() 778 (OnePassSig, 0), (Literal, 0), (Signature, 0)], in tags()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/message/ |
H A D | mod.rs | 222 Tag::OnePassSig => Token::OPS, in push() 746 s: &[(OnePassSig, 0), (Literal, 0), (Signature, 0)], in tags() 750 s: &[(OnePassSig, 0), (CompressedData, 0), (Literal, 1), in tags() 755 s: &[(OnePassSig, 0), (OnePassSig, 0), (Literal, 0), in tags() 760 s: &[(OnePassSig, 0), (OnePassSig, 0), (Literal, 0), in tags() 765 s: &[(OnePassSig, 0), (OnePassSig, 0), (SEIP, 0), in tags() 766 (OnePassSig, 1), (SEIP, 1), (Literal, 2), (MDC, 2), in tags() 778 (OnePassSig, 0), (Literal, 0), (Signature, 0)], in tags()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/header/ |
H A D | mod.rs | 188 Tag::OnePassSig if ! future_compatible => l == 13, in valid() 189 Tag::OnePassSig => l < 1024, in valid()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/header/ |
H A D | mod.rs | 188 Tag::OnePassSig if ! future_compatible => l == 13, in valid() 189 Tag::OnePassSig => l < 1024, in valid()
|
/dports/security/p5-Crypt-OpenPGP/Crypt-OpenPGP-1.12/lib/Crypt/OpenPGP/ |
H A D | OnePassSig.pm | 1 package Crypt::OpenPGP::OnePassSig;
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/ |
H A D | serialize.rs | 1696 impl Marshal for OnePassSig { implementation 1699 &OnePassSig::V3(ref s) => s.serialize(o), in serialize() 1705 impl MarshalInto for OnePassSig { implementation 1708 &OnePassSig::V3(ref s) => s.serialized_len(), in serialized_len() 2597 &Packet::OnePassSig(ref p) => p.export(o), in export() 2623 &Packet::OnePassSig(ref p) => p.net_len(), in net_len() 2697 OnePassSig(&'a packet::OnePassSig), enumerator 2740 PacketRef::OnePassSig(_) => Tag::OnePassSig, in tag() 2784 PacketRef::OnePassSig(p) => p.serialize(o), in serialize() 2825 PacketRef::OnePassSig(p) => p.export(o), in export() [all …]
|
H A D | parse.rs | 1799 impl OnePassSig { implementation 1807 impl_parse_generic_packet!(OnePassSig); 1967 if let &Packet::OnePassSig(ref p) = p { in one_pass_sig_parser_test() 1982 OnePassSig::V3(p) => Ok(p), in from_reader() 1987 OnePassSig::__Nonexhaustive => unreachable!(), in from_reader() 2025 if let Packet::OnePassSig(_) = pp.packet { in one_pass_sig_test() 3963 Tag::OnePassSig => bad, in plausible() 4149 Tag::OnePassSig => OnePassSig::parse(parser), in parse() 4169 if tag == Tag::OnePassSig { in parse() 5227 (Tag::OnePassSig, &[ 1, 0, 0 ]), [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/ |
H A D | serialize.rs | 1696 impl Marshal for OnePassSig { implementation 1699 &OnePassSig::V3(ref s) => s.serialize(o), in serialize() 1705 impl MarshalInto for OnePassSig { implementation 1708 &OnePassSig::V3(ref s) => s.serialized_len(), in serialized_len() 2597 &Packet::OnePassSig(ref p) => p.export(o), in export() 2623 &Packet::OnePassSig(ref p) => p.net_len(), in net_len() 2697 OnePassSig(&'a packet::OnePassSig), enumerator 2740 PacketRef::OnePassSig(_) => Tag::OnePassSig, in tag() 2784 PacketRef::OnePassSig(p) => p.serialize(o), in serialize() 2825 PacketRef::OnePassSig(p) => p.export(o), in export() [all …]
|
H A D | parse.rs | 1799 impl OnePassSig { impl 1807 impl_parse_generic_packet!(OnePassSig); 1967 if let &Packet::OnePassSig(ref p) = p { in one_pass_sig_parser_test() 1982 OnePassSig::V3(p) => Ok(p), in from_reader() 1987 OnePassSig::__Nonexhaustive => unreachable!(), in from_reader() 2025 if let Packet::OnePassSig(_) = pp.packet { in one_pass_sig_test() 3963 Tag::OnePassSig => bad, in plausible() 4149 Tag::OnePassSig => OnePassSig::parse(parser), in parse() 4169 if tag == Tag::OnePassSig { in parse() 5227 (Tag::OnePassSig, &[ 1, 0, 0 ]), [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/ |
H A D | mod.rs | 92 Tag::OnePassSig => "ONE PASS SIG\x00", in pgp_tag_to_string()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/ |
H A D | mod.rs | 92 Tag::OnePassSig => "ONE PASS SIG\x00", in pgp_tag_to_string()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/ |
H A D | sign.rs | 293 Packet::OnePassSig(mut ops) => { in sign_message_() 313 Packet::OnePassSig(ops).serialize(&mut sink)?; in sign_message_()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/ |
H A D | sign.rs | 293 Packet::OnePassSig(mut ops) => { in sign_message_() 313 Packet::OnePassSig(ops).serialize(&mut sink)?; in sign_message_()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/examples/ |
H A D | notarize.rs | 89 Packet::OnePassSig(ref ops) => in main()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/examples/ |
H A D | notarize.rs | 89 Packet::OnePassSig(ref ops) => in main()
|