H A D | openssl_spi.c | 667 KMF_DATA **certlist, uint32_t *numcerts) 692 *certlist = certs; 740 *certlist = certs; 1094 KMF_DATA *certlist = NULL; local 1104 validity, fname, &certlist, &loaded_certs); 1108 if (certlist != NULL) { 1110 kmf_free_data(&certlist[i]); 1111 free(certlist); 1121 certlist[i].Data; 1123 certlist[ 665 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA **certlist, uint32_t *numcerts) argument 1155 KMF_DATA *certlist = NULL; local 3319 local_export_pk12(KMF_HANDLE_T handle, KMF_CREDENTIAL *cred, int numcerts, KMF_X509_DER_CERT *certlist, int numkeys, KMF_KEY_HANDLE *keylist, char *filename) argument 3482 openssl_build_pk12(KMF_HANDLE_T handle, int numcerts, KMF_X509_DER_CERT *certlist, int numkeys, KMF_KEY_HANDLE *keylist, KMF_CREDENTIAL *p12cred, char *filename) argument 3616 KMF_DATA *certlist = NULL; local 3796 openssl_parse_bag(PKCS12_SAFEBAG *bag, char *pass, int passlen, STACK_OF(EVP_PKEY) *keylist, STACK_OF(X509) *certlist) argument 4160 add_cert_to_list(KMF_HANDLE *kmfh, X509 *sslcert, KMF_X509_DER_CERT **certlist, int *ncerts) argument 4317 convertPK12Objects( KMF_HANDLE *kmfh, STACK_OF(EVP_PKEY) *sslkeys, STACK_OF(X509) *sslcert, STACK_OF(X509) *sslcacerts, KMF_RAW_KEY_DATA **keylist, int *nkeys, KMF_X509_DER_CERT **certlist, int *ncerts) argument 4370 openssl_import_objects(KMF_HANDLE *kmfh, char *filename, KMF_CREDENTIAL *cred, KMF_X509_DER_CERT **certlist, int *ncerts, KMF_RAW_KEY_DATA **keylist, int *nkeys) argument [all...] |