Home
last modified time | relevance | path

Searched refs:PKESK (Results 1 – 25 of 62) sorted by relevance

123

/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/
H A Dmod.rs276 PKESK(PKESK), enumerator
322 impl_into_iterator!(PKESK);
359 &Packet::PKESK(_) => Tag::PKESK, in tag()
1010 pub enum PKESK { enum
1019 impl PKESK { impl
1023 PKESK::V3(_) => 3, in version()
1029 impl From<PKESK> for Packet {
1030 fn from(p: PKESK) -> Self { in from()
1031 Packet::PKESK(p) in from()
1036 impl Deref for PKESK { implementation
[all …]
H A Dpkesk.rs181 impl From<PKESK3> for super::PKESK { implementation
183 super::PKESK::V3(p) in from()
189 Packet::PKESK(p.into()) in from()
194 impl Arbitrary for super::PKESK { implementation
243 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_rsa()
268 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_cv25519()
293 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp256()
318 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp384()
343 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp521()
H A Dtag.rs20 PKESK, enumerator
100 1 => PKESK, in from()
134 &Tag::PKESK => 1, in from()
175 Tag::PKESK => in fmt()
249 || *self == Tag::PKESK || *self == Tag::SKESK in valid_start_of_message()
H A Dprelude.rs35 PKESK,
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/packet/
H A Dmod.rs276 PKESK(PKESK), enumerator
322 impl_into_iterator!(PKESK);
359 &Packet::PKESK(_) => Tag::PKESK, in tag()
1010 pub enum PKESK { enum
1019 impl PKESK { implementation
1023 PKESK::V3(_) => 3, in version()
1029 impl From<PKESK> for Packet {
1030 fn from(p: PKESK) -> Self { in from()
1031 Packet::PKESK(p) in from()
1036 impl Deref for PKESK { implementation
[all …]
H A Dpkesk.rs181 impl From<PKESK3> for super::PKESK { implementation
183 super::PKESK::V3(p) in from()
189 Packet::PKESK(p.into()) in from()
194 impl Arbitrary for super::PKESK { implementation
243 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_rsa()
268 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_cv25519()
293 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp256()
318 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp384()
343 if let Some(Packet::PKESK(ref pkesk)) = pkg { in decrypt_ecdh_nistp521()
H A Dtag.rs20 PKESK, enumerator
100 1 => PKESK, in from()
134 &Tag::PKESK => 1, in from()
175 Tag::PKESK => in fmt()
249 || *self == Tag::PKESK || *self == Tag::SKESK in valid_start_of_message()
H A Dprelude.rs35 PKESK,
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/
H A Dpkesk.rs6 use self::openpgp::packet::PKESK;
20 pub extern "C" fn pgp_pkesk_recipient(pkesk: *const PKESK) in pgp_pkesk_recipient()
34 pkesk: *const PKESK, in pgp_pkesk_decrypt() argument
H A Dmod.rs89 Tag::PKESK => "PKESK\x00", in pgp_tag_to_string()
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/packet/
H A Dpkesk.rs6 use self::openpgp::packet::PKESK;
20 pub extern "C" fn pgp_pkesk_recipient(pkesk: *const PKESK) in pgp_pkesk_recipient()
34 pkesk: *const PKESK, in pgp_pkesk_decrypt() argument
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/message/
H A Dgrammar.lalrpop45 PKESK,
70 PKESK => lexer::Token::PKESK,
H A Dmod.rs218 Tag::PKESK => Token::PKESK, in push()
586 s: &[PKESK, SEIP, Literal, MDC, Pop], in tokens()
616 s: &[PKESK, AED, Literal, Pop], in tokens()
732 s: &[(PKESK, 0), (SEIP, 0), (Literal, 1), (MDC, 1)], in tags()
736 s: &[(PKESK, 0), (SEIP, 0), (CompressedData, 1), (Literal, 2), in tags()
1193 == [ Tag::SKESK, Tag::PKESK, Tag::SKESK, Tag::SEIP ]); in encrypted_part()
H A Dlexer.rs24 PKESK, enumerator
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/message/
H A Dgrammar.lalrpop45 PKESK,
70 PKESK => lexer::Token::PKESK,
H A Dmod.rs218 Tag::PKESK => Token::PKESK, in push()
586 s: &[PKESK, SEIP, Literal, MDC, Pop], in tokens()
616 s: &[PKESK, AED, Literal, Pop], in tokens()
732 s: &[(PKESK, 0), (SEIP, 0), (Literal, 1), (MDC, 1)], in tags()
736 s: &[(PKESK, 0), (SEIP, 0), (CompressedData, 1), (Literal, 2), in tags()
1193 == [ Tag::SKESK, Tag::PKESK, Tag::SKESK, Tag::SEIP ]); in encrypted_part()
H A Dlexer.rs24 PKESK, enumerator
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/
H A Ddecrypt.rs88 fn try_decrypt<D>(&self, pkesk: &PKESK, in try_decrypt() argument
132 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument
311 let mut pkesks: Vec<packet::PKESK> = Vec::new(); in decrypt_unwrap()
346 Packet::PKESK(pkesk) => pkesks.push(pkesk), in decrypt_unwrap()
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/tool/src/commands/
H A Ddecrypt.rs88 fn try_decrypt<D>(&self, pkesk: &PKESK, in try_decrypt() argument
132 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument
311 let mut pkesks: Vec<packet::PKESK> = Vec::new(); in decrypt_unwrap()
346 Packet::PKESK(pkesk) => pkesks.push(pkesk), in decrypt_unwrap()
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/
H A Dserialize.rs2221 impl Marshal for PKESK { implementation
2224 &PKESK::V3(ref p) => p.serialize(o), in serialize()
2230 impl MarshalInto for PKESK { implementation
2240 PKESK::V3(p) => in serialize_into()
2608 &Packet::PKESK(ref p) => p.export(o), in export()
2634 &Packet::PKESK(ref p) => p.net_len(), in net_len()
2719 PKESK(&'a packet::PKESK), enumerator
2751 PacketRef::PKESK(_) => Tag::PKESK, in tag()
2795 PacketRef::PKESK(p) => p.serialize(o), in serialize()
2836 PacketRef::PKESK(p) => p.export(o), in export()
[all …]
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/
H A Dserialize.rs2221 impl Marshal for PKESK { implementation
2224 &PKESK::V3(ref p) => p.serialize(o), in serialize()
2230 impl MarshalInto for PKESK { implementation
2240 PKESK::V3(p) => in serialize_into()
2608 &Packet::PKESK(ref p) => p.export(o), in export()
2634 &Packet::PKESK(ref p) => p.net_len(), in net_len()
2719 PKESK(&'a packet::PKESK), enumerator
2751 PacketRef::PKESK(_) => Tag::PKESK, in tag()
2795 PacketRef::PKESK(p) => p.serialize(o), in serialize()
2836 PacketRef::PKESK(p) => p.export(o), in export()
[all …]
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/parse/
H A Dstream.rs23 PKESK,
414 *const *const PKESK, usize,
840 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument
852 let pkesks : Vec<*const PKESK> = in decrypt()
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp-ffi/src/parse/
H A Dstream.rs23 PKESK,
414 *const *const PKESK, usize,
840 fn decrypt<D>(&mut self, pkesks: &[PKESK], skesks: &[SKESK], in decrypt() argument
852 let pkesks : Vec<*const PKESK> = in decrypt()
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/ffi/lang/python/examples/
H A Ddecrypt.py29 elif tag == Tag.PKESK:
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/ffi/lang/python/examples/
H A Ddecrypt.py29 elif tag == Tag.PKESK:

123