/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/ |
H A D | mod.rs | 276 PKESK(PKESK), enumerator 322 impl_into_iterator!(PKESK); 359 &Packet::PKESK(_) => Tag::PKESK, in tag() 1010 pub enum PKESK { enum 1019 impl PKESK { impl 1023 PKESK::V3(_) => 3, in version() 1029 impl From<PKESK> for Packet { 1030 fn from(p: PKESK) -> Self { in from() 1031 Packet::PKESK(p) in from() 1036 impl Deref for PKESK { implementation [all …]
|
H A D | pkesk.rs | 181 impl From<PKESK3> for super::PKESK { implementation 183 super::PKESK::V3(p) in from() 189 Packet::PKESK(p.into()) in from() 194 impl Arbitrary for super::PKESK { implementation 243 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_rsa() 268 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_cv25519() 293 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp256() 318 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp384() 343 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp521()
|
H A D | tag.rs | 20 PKESK, enumerator 100 1 => PKESK, in from() 134 &Tag::PKESK => 1, in from() 175 Tag::PKESK => in fmt() 249 || *self == Tag::PKESK || *self == Tag::SKESK in valid_start_of_message()
|
H A D | prelude.rs | 35 PKESK,
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/ |
H A D | mod.rs | 276 PKESK(PKESK), enumerator 322 impl_into_iterator!(PKESK); 359 &Packet::PKESK(_) => Tag::PKESK, in tag() 1010 pub enum PKESK { enum 1019 impl PKESK { implementation 1023 PKESK::V3(_) => 3, in version() 1029 impl From<PKESK> for Packet { 1030 fn from(p: PKESK) -> Self { in from() 1031 Packet::PKESK(p) in from() 1036 impl Deref for PKESK { implementation [all …]
|
H A D | pkesk.rs | 181 impl From<PKESK3> for super::PKESK { implementation 183 super::PKESK::V3(p) in from() 189 Packet::PKESK(p.into()) in from() 194 impl Arbitrary for super::PKESK { implementation 243 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_rsa() 268 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_cv25519() 293 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp256() 318 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp384() 343 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp521()
|
H A D | tag.rs | 20 PKESK, enumerator 100 1 => PKESK, in from() 134 &Tag::PKESK => 1, in from() 175 Tag::PKESK => in fmt() 249 || *self == Tag::PKESK || *self == Tag::SKESK in valid_start_of_message()
|
H A D | prelude.rs | 35 PKESK,
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/ |
H A D | pkesk.rs | 6 use self::openpgp::packet::PKESK; 20 pub extern "C" fn pgp_pkesk_recipient(pkesk: *const PKESK) in pgp_pkesk_recipient() 34 pkesk: *const PKESK, in pgp_pkesk_decrypt() argument
|
H A D | mod.rs | 89 Tag::PKESK => "PKESK\x00", in pgp_tag_to_string()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/ |
H A D | pkesk.rs | 6 use self::openpgp::packet::PKESK; 20 pub extern "C" fn pgp_pkesk_recipient(pkesk: *const PKESK) in pgp_pkesk_recipient() 34 pkesk: *const PKESK, in pgp_pkesk_decrypt() argument
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/message/ |
H A D | grammar.lalrpop | 45 PKESK, 70 PKESK => lexer::Token::PKESK,
|
H A D | mod.rs | 218 Tag::PKESK => Token::PKESK, in push() 586 s: &[PKESK, SEIP, Literal, MDC, Pop], in tokens() 616 s: &[PKESK, AED, Literal, Pop], in tokens() 732 s: &[(PKESK, 0), (SEIP, 0), (Literal, 1), (MDC, 1)], in tags() 736 s: &[(PKESK, 0), (SEIP, 0), (CompressedData, 1), (Literal, 2), in tags() 1193 == [ Tag::SKESK, Tag::PKESK, Tag::SKESK, Tag::SEIP ]); in encrypted_part()
|
H A D | lexer.rs | 24 PKESK, enumerator
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/message/ |
H A D | grammar.lalrpop | 45 PKESK, 70 PKESK => lexer::Token::PKESK,
|
H A D | mod.rs | 218 Tag::PKESK => Token::PKESK, in push() 586 s: &[PKESK, SEIP, Literal, MDC, Pop], in tokens() 616 s: &[PKESK, AED, Literal, Pop], in tokens() 732 s: &[(PKESK, 0), (SEIP, 0), (Literal, 1), (MDC, 1)], in tags() 736 s: &[(PKESK, 0), (SEIP, 0), (CompressedData, 1), (Literal, 2), in tags() 1193 == [ Tag::SKESK, Tag::PKESK, Tag::SKESK, Tag::SEIP ]); in encrypted_part()
|
H A D | lexer.rs | 24 PKESK, enumerator
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/ |
H A D | decrypt.rs | 88 fn try_decrypt<D>(&self, pkesk: &PKESK, in try_decrypt() argument 132 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument 311 let mut pkesks: Vec<packet::PKESK> = Vec::new(); in decrypt_unwrap() 346 Packet::PKESK(pkesk) => pkesks.push(pkesk), in decrypt_unwrap()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/ |
H A D | decrypt.rs | 88 fn try_decrypt<D>(&self, pkesk: &PKESK, in try_decrypt() argument 132 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument 311 let mut pkesks: Vec<packet::PKESK> = Vec::new(); in decrypt_unwrap() 346 Packet::PKESK(pkesk) => pkesks.push(pkesk), in decrypt_unwrap()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/ |
H A D | serialize.rs | 2221 impl Marshal for PKESK { implementation 2224 &PKESK::V3(ref p) => p.serialize(o), in serialize() 2230 impl MarshalInto for PKESK { implementation 2240 PKESK::V3(p) => in serialize_into() 2608 &Packet::PKESK(ref p) => p.export(o), in export() 2634 &Packet::PKESK(ref p) => p.net_len(), in net_len() 2719 PKESK(&'a packet::PKESK), enumerator 2751 PacketRef::PKESK(_) => Tag::PKESK, in tag() 2795 PacketRef::PKESK(p) => p.serialize(o), in serialize() 2836 PacketRef::PKESK(p) => p.export(o), in export() [all …]
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/ |
H A D | serialize.rs | 2221 impl Marshal for PKESK { implementation 2224 &PKESK::V3(ref p) => p.serialize(o), in serialize() 2230 impl MarshalInto for PKESK { implementation 2240 PKESK::V3(p) => in serialize_into() 2608 &Packet::PKESK(ref p) => p.export(o), in export() 2634 &Packet::PKESK(ref p) => p.net_len(), in net_len() 2719 PKESK(&'a packet::PKESK), enumerator 2751 PacketRef::PKESK(_) => Tag::PKESK, in tag() 2795 PacketRef::PKESK(p) => p.serialize(o), in serialize() 2836 PacketRef::PKESK(p) => p.export(o), in export() [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/parse/ |
H A D | stream.rs | 23 PKESK, 414 *const *const PKESK, usize, 840 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument 852 let pkesks : Vec<*const PKESK> = in decrypt()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/parse/ |
H A D | stream.rs | 23 PKESK, 414 *const *const PKESK, usize, 840 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument 852 let pkesks : Vec<*const PKESK> = in decrypt()
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/ffi/lang/python/examples/ |
H A D | decrypt.py | 29 elif tag == Tag.PKESK:
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/ffi/lang/python/examples/ |
H A D | decrypt.py | 29 elif tag == Tag.PKESK:
|