Lines Matching refs:key

50 /* This is the list of the default public-key ciphers included in
118 fips_signal_error ("using dummy public key function");
127 fips_signal_error ("using dummy public key function");
140 fips_signal_error ("using dummy public key function");
153 fips_signal_error ("using dummy public key function");
165 fips_signal_error ("using dummy public key function");
180 fips_signal_error ("using dummy public key function");
189 fips_signal_error ("using dummy public key function");
333 /* Map the public key algorithm whose ID is contained in ALGORITHM to
440 * Return the number of public key material numbers
463 * Return the number of secret key material numbers
532 /* Generate a new public key with algorithm ALGORITHM of size NBITS
602 * This is the interface to the public key encryption. Encrypt DATA
651 * This is the interface to the public key decryption.
699 * This is the interface to the public key signing.
744 * Verify a public key signature.
941 * Convert a S-Exp with either a private or a public key to our
951 * Provide a SE with the first element be either "private-key" or
952 * or "public-key". It is followed by a list with its first element
956 * "private-key" or "public-key" - the first one found is used.
961 * Example of a DSA public key:
962 * (private-key
988 want_private? "private-key":"public-key", 0);
990 return GPG_ERR_INV_OBJ; /* Does not contain a key object. */
1006 /* Fixme: We should make sure that an ECC key is always named "ecc"
1009 with a key is compatible with an application of the key (signing,
1307 NBITS is the length of the key in bits.
1389 rc = GPG_ERR_TOO_SHORT; /* the key is too short */
1569 Caller has to provide a public key as the SEXP pkey and data as a
1579 s_pkey = <key-as-defined-in-sexp_to_key>
1602 /* Get the key. */
1712 Caller has to provide a secret key as the SEXP skey and data in a
1728 s_skey = <key-as-defined-in-sexp_to_key>
1803 Caller has to provide a secret key as the SEXP skey and data
1818 s_skey = <key-as-defined-in-sexp_to_key>
1855 work on a private key. */
1938 Caller has to supply the public key pkey, the signature sig and his
1939 hashvalue data. Public key has to be a standard public key given
2003 Test a key.
2005 This may be used either for a public or a secret key to see whether
2010 s_key = <key-as-defined-in-sexp_to_key> */
2015 gcry_mpi_t *key = NULL;
2020 /* Note we currently support only secret key checking. */
2021 rc = sexp_to_key (s_key, 1, &key, &module);
2024 rc = pubkey_check_secret_key (module->mod_id, key);
2025 release_mpi_array (key);
2026 gcry_free (key);
2033 Create a public key pair and return it in r_key.
2034 How the key is created depends on s_parms:
2041 The key is returned in a format depending on the
2045 (key-data
2046 (public-key
2053 (private-key
2061 (misc-key-info
2218 p = stpcpy (p, "(key-data");
2219 p = stpcpy (p, "(public-key(");
2229 p = stpcpy (p, "(private-key(");
2250 p = stpcpy (p, "(misc-key-info(pm1-factors");
2324 Get the number of nbits from the public key.
2327 more general function to retrieve different properties of the key? */
2329 gcry_pk_get_nbits (gcry_sexp_t key)
2339 rc = sexp_to_key (key, 0, &keyarr, &module);
2341 rc = sexp_to_key (key, 1, &keyarr, &module);
2360 key parameters expressed in a way depended on the algorithm.
2367 gcry_pk_get_keygrip (gcry_sexp_t key, unsigned char *array)
2382 list = gcry_sexp_find_token (key, "public-key", 0);
2384 list = gcry_sexp_find_token (key, "private-key", 0);
2386 list = gcry_sexp_find_token (key, "protected-private-key", 0);
2388 list = gcry_sexp_find_token (key, "shadowed-private-key", 0);
2390 return NULL; /* No public- or private-key object. */