H A D | openssl_spi.c | 664 KMF_DATA **certlist, uint32_t *numcerts) 689 *certlist = certs; 737 *certlist = certs; 1091 KMF_DATA *certlist = NULL; local 1101 validity, fname, &certlist, &loaded_certs); 1105 if (certlist != NULL) { 1107 kmf_free_data(&certlist[i]); 1108 free(certlist); 1118 certlist[i].Data; 1120 certlist[ 662 load_certs(KMF_HANDLE *kmfh, char *issuer, char *subject, KMF_BIGINT *serial, KMF_CERT_VALIDITY validity, char *pathname, KMF_DATA **certlist, uint32_t *numcerts) argument 1152 KMF_DATA *certlist = NULL; local 3308 local_export_pk12(KMF_HANDLE_T handle, KMF_CREDENTIAL *cred, int numcerts, KMF_X509_DER_CERT *certlist, int numkeys, KMF_KEY_HANDLE *keylist, char *filename) argument 3471 openssl_build_pk12(KMF_HANDLE_T handle, int numcerts, KMF_X509_DER_CERT *certlist, int numkeys, KMF_KEY_HANDLE *keylist, KMF_CREDENTIAL *p12cred, char *filename) argument 3605 KMF_DATA *certlist = NULL; local 3785 openssl_parse_bag(PKCS12_SAFEBAG *bag, char *pass, int passlen, STACK_OF(EVP_PKEY) *keylist, STACK_OF(X509) *certlist) argument 4149 add_cert_to_list(KMF_HANDLE *kmfh, X509 *sslcert, KMF_X509_DER_CERT **certlist, int *ncerts) argument 4301 convertPK12Objects( KMF_HANDLE *kmfh, STACK_OF(EVP_PKEY) *sslkeys, STACK_OF(X509) *sslcert, STACK_OF(X509) *sslcacerts, KMF_RAW_KEY_DATA **keylist, int *nkeys, KMF_X509_DER_CERT **certlist, int *ncerts) argument 4354 openssl_import_objects(KMF_HANDLE *kmfh, char *filename, KMF_CREDENTIAL *cred, KMF_X509_DER_CERT **certlist, int *ncerts, KMF_RAW_KEY_DATA **keylist, int *nkeys) argument [all...] |