/titanic_52/usr/src/common/net/wanboot/ |
H A D | p12auxpars.c | 151 STACK_OF(EVP_PKEY) **pkey, STACK_OF(X509) **certs); 158 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 172 * pkey - Points to location pointing to the private key returned. 209 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument 222 if (pkey) in sunw_PKCS12_parse() 223 *pkey = NULL; in sunw_PKCS12_parse() 265 name_str, pkey, cert, ca); in sunw_PKCS12_parse() 273 if (pkey && *pkey) { in sunw_PKCS12_parse() 274 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse() 320 parse_pkcs12(PKCS12 * p12,const char * pass,int matchty,char * keyid,int kstr_len,char * name_str,EVP_PKEY ** pkey,X509 ** cert,STACK_OF (X509)** ca) parse_pkcs12() argument 498 sunw_PKCS12_contents(PKCS12 * p12,const char * pass,STACK_OF (EVP_PKEY)** pkey,STACK_OF (X509)** certs) sunw_PKCS12_contents() argument 649 EVP_PKEY *pkey = NULL; parse_one_bag() local [all...] |
H A D | p12misc.c | 224 * pkey - Entry which potentially has attributes to be freed. 230 sunw_evp_pkey_free(EVP_PKEY *pkey) in sunw_evp_pkey_free() argument 232 if (pkey != NULL) { in sunw_evp_pkey_free() 233 if (pkey->attributes != NULL) { in sunw_evp_pkey_free() 234 sk_X509_ATTRIBUTE_pop_free(pkey->attributes, in sunw_evp_pkey_free() 236 pkey->attributes = NULL; in sunw_evp_pkey_free() 238 EVP_PKEY_free(pkey); in sunw_evp_pkey_free() 249 * pkey - Points to a private key to set the keyidstr in. 262 sunw_set_localkeyid(const char *keyid_str, int keyid_len, EVP_PKEY *pkey, in sunw_set_localkeyid() argument 278 if (pkey ! in sunw_set_localkeyid() 349 sunw_get_pkey_localkeyid(getdo_actions_t dowhat,EVP_PKEY * pkey,char ** keyid_str,int * keyid_len) sunw_get_pkey_localkeyid() argument 414 sunw_get_pkey_fname(getdo_actions_t dowhat,EVP_PKEY * pkey,char ** fname) sunw_get_pkey_fname() argument 671 sunw_check_keys(X509 * cert,EVP_PKEY * pkey) sunw_check_keys() argument [all...] |
H A D | p12access.c | 97 * pkey - EVP_PKEY formatted private key 104 sunw_use_pkey(SSL_CTX *ctx, EVP_PKEY *pkey) in sunw_use_pkey() argument 107 if (ctx == NULL || pkey == NULL) { in sunw_use_pkey() 112 if (SSL_CTX_use_PrivateKey(ctx, pkey) != 1) { in sunw_use_pkey() 250 EVP_PKEY *pkey = NULL; in sunw_p12_use_keyfile() local 262 ret = p12_doparse(p12, passwd, DO_UNMATCHING, &pkey, NULL, in sunw_p12_use_keyfile() 264 if (ret > 0 && pkey != NULL) { in sunw_p12_use_keyfile() 265 if (sunw_use_pkey(ctx, pkey) != 1) { in sunw_p12_use_keyfile() 281 if (ret == -1 && pkey != NULL) { in sunw_p12_use_keyfile() 282 sunw_evp_pkey_free(pkey); in sunw_p12_use_keyfile() 411 p12_doparse(PKCS12 * p12,char * passwd,int matchty,EVP_PKEY ** pkey,X509 ** cert,STACK_OF (X509)** ca) p12_doparse() argument [all...] |
H A D | auxutil.c | 292 * pkey - Points at a location where the address of the matching private 303 * A pkey structure has a stack of attributes. 319 * A pointer to cert and/or pkey which matches the name or keyid is stored 328 find_attr(int nid, ASN1_STRING *str, STACK_OF(EVP_PKEY) *kl, EVP_PKEY **pkey, argument 344 chkcerts = (cert != NULL || pkey != NULL) && cl != NULL; 401 if (pkey != NULL && kl != NULL) { 403 * Looking for pkey to match a cert? If so, assume that 412 if (pkey != NULL) 413 *pkey = sk_EVP_PKEY_delete(kl, k); 428 if (pkey ! 495 get_key_cert(int n,STACK_OF (EVP_PKEY)* kl,EVP_PKEY ** pkey,STACK_OF (X509)* cl,X509 ** cert) global() argument [all...] |
H A D | p12auxutl.c | 112 EVP_PKEY *pkey = NULL; in sunw_PKCS12_create() local 259 pkey = sk_EVP_PKEY_value(pkeys, i); in sunw_PKCS12_create() 262 if ((p8 = EVP_PKEY2PKCS8(pkey)) == NULL) { in sunw_PKCS12_create() 277 len = sunw_get_pkey_fname(GETDO_COPY, pkey, in sunw_PKCS12_create() 289 len = sunw_get_pkey_localkeyid(GETDO_COPY, pkey, in sunw_PKCS12_create()
|
/titanic_52/usr/src/lib/libpkg/common/ |
H A D | p12lib.c | 226 * or it should point to a valid STACK_OF(X509) structure. pkey and cert can 240 * pkey - Points to location pointing to the private key returned. 277 int keyid_len, char *name_str, EVP_PKEY **pkey, X509 **cert, in sunw_PKCS12_parse() argument 290 if (pkey) in sunw_PKCS12_parse() 291 *pkey = NULL; in sunw_PKCS12_parse() 333 name_str, pkey, cert, ca); in sunw_PKCS12_parse() 341 if (pkey && *pkey) { in sunw_PKCS12_parse() 342 sunw_evp_pkey_free(*pkey); in sunw_PKCS12_parse() 392 STACK_OF(EVP_PKEY) **pkey, STACK_O in sunw_PEM_contents() 391 sunw_PEM_contents(FILE * fp,pem_password_cb * cb,void * userdata,STACK_OF (EVP_PKEY)** pkey,STACK_OF (X509)** certs) sunw_PEM_contents() argument 455 sunw_PKCS12_contents(PKCS12 * p12,const char * pass,STACK_OF (EVP_PKEY)** pkey,STACK_OF (X509)** certs) sunw_PKCS12_contents() argument 646 EVP_PKEY *pkey = NULL; sunw_PKCS12_create() local 927 sunw_evp_pkey_free(EVP_PKEY * pkey) sunw_evp_pkey_free() argument 959 sunw_set_localkeyid(const char * keyid_str,int keyid_len,EVP_PKEY * pkey,X509 * cert) sunw_set_localkeyid() argument 1046 sunw_get_pkey_localkeyid(getdo_actions_t dowhat,EVP_PKEY * pkey,char ** keyid_str,int * keyid_len) sunw_get_pkey_localkeyid() argument 1111 sunw_get_pkey_fname(getdo_actions_t dowhat,EVP_PKEY * pkey,char ** fname) sunw_get_pkey_fname() argument 1375 sunw_set_fname(const char * ascname,EVP_PKEY * pkey,X509 * cert) sunw_set_fname() argument 1470 sunw_check_keys(X509 * cert,EVP_PKEY * pkey) sunw_check_keys() argument 1542 parse_pkcs12(PKCS12 * p12,const char * pass,int matchty,char * keyid,int kstr_len,char * name_str,EVP_PKEY ** pkey,X509 ** cert,STACK_OF (X509)** ca) parse_pkcs12() argument 1807 EVP_PKEY *pkey = NULL; parse_one_bag() local 2254 get_key_cert(int n,STACK_OF (EVP_PKEY)* kl,EVP_PKEY ** pkey,STACK_OF (X509)* cl,X509 ** cert) get_key_cert() argument 2594 find_attr(int nid,ASN1_STRING * str,STACK_OF (EVP_PKEY)* kl,EVP_PKEY ** pkey,STACK_OF (X509)* cl,X509 ** cert) global() argument [all...] |
/titanic_52/usr/src/lib/libnsl/key/ |
H A D | publickey.c | 148 getkeys_nis(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_nis() argument 195 if (pkey) { in getkeys_nis() 202 (void) strcpy(pkey, keyval); in getkeys_nis() 228 getkeys_files(int *errp, char *netname, char *pkey, char *skey, char *passwd) in getkeys_files() argument 276 if (pkey) { in getkeys_files() 285 (void) strcpy(pkey, mval); in getkeys_files() 310 __getpublickey_cached(char *netname, char *pkey, int *from_cache) in __getpublickey_cached() argument 312 return (__getpublickey_cached_g(netname, KEYSIZE, 0, pkey, in __getpublickey_cached() 317 getpublickey(const char *netname, char *pkey) in getpublickey() argument 319 return (__getpublickey_cached((char *)netname, pkey, (in in getpublickey() 425 getkeys_ldap_g(int * err,char * netname,char * pkey,int pkeylen,char * skey,int skeylen,char * passwd,keylen_t keylen,algtype_t algtype) getkeys_ldap_g() argument 549 __getpublickey_cached_g(const char netname[],keylen_t keylen,algtype_t algtype,char * pkey,size_t pkeylen,int * from_cache) __getpublickey_cached_g() argument 617 getpublickey_g(const char * netname,int keylen,int algtype,char * pkey,size_t pkeylen) getpublickey_g() argument [all...] |
H A D | gen_dhkeys.c | 168 __gen_dhkeys_g(char *pkey, /* out */ in __gen_dhkeys_g() argument 176 if (! pkey || ! skey || ! pass) in __gen_dhkeys_g() 180 __gen_dhkeys(pkey, skey, pass); in __gen_dhkeys_g() 188 (*dlfp)(pkey, skey, pass); /* void */ in __gen_dhkeys_g()
|
/titanic_52/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 799 readAltFormatPrivateKey(KMF_DATA *filedata, EVP_PKEY **pkey) in readAltFormatPrivateKey() argument 814 *pkey = NULL; in readAltFormatPrivateKey() 905 *pkey = ImportRawRSAKey(&rsa); in readAltFormatPrivateKey() 958 EVP_PKEY *pkey = NULL; in openssl_load_key() local 977 pkey = d2i_PrivateKey_bio(keyfile, NULL); in openssl_load_key() 978 if (pkey == NULL) { in openssl_load_key() 987 &pkey); in openssl_load_key() 993 pkey = PEM_read_bio_PrivateKey(keyfile, NULL, NULL, NULL); in openssl_load_key() 994 if (pkey == NULL) { in openssl_load_key() 1011 &derdata, &pkey); in openssl_load_key() 1411 ssl_write_key(KMF_HANDLE * kmfh,KMF_ENCODE_FORMAT format,BIO * out,KMF_CREDENTIAL * cred,EVP_PKEY * pkey,boolean_t private) ssl_write_key() argument 1800 EVP_PKEY *pkey = (EVP_PKEY *)key->keyp; OpenSSL_SignData() local 1933 EVP_PKEY *pkey = NULL; OpenSSL_DeleteKey() local 2105 EVP_PKEY *pkey = X509_get_pubkey(xcert); OpenSSL_CertGetPrintable() local 2815 EVP_PKEY *pkey = NULL; fetch_key() local 3078 add_key_to_safe(EVP_PKEY * pkey,KMF_CREDENTIAL * cred,uchar_t * keyid,unsigned int keyidlen,char * label,int label_len) add_key_to_safe() argument 3228 EVP_PKEY *pkey = NULL; raw_key_to_pkey() local 3297 EVP_PKEY *pkey = NULL; find_matching_key() local 3357 EVP_PKEY *pkey = NULL; local_export_pk12() local 3425 EVP_PKEY *pkey = NULL; local_export_pk12() local 3612 EVP_PKEY *pkey = NULL; extract_pem() local 3756 set_pkey_attrib(EVP_PKEY * pkey,ASN1_TYPE * attrib,int nid) set_pkey_attrib() argument 3801 EVP_PKEY *pkey = NULL; openssl_parse_bag() local 4243 convertToRawKey(EVP_PKEY * pkey,KMF_RAW_KEY_DATA * key) convertToRawKey() argument 4331 EVP_PKEY *pkey = sk_EVP_PKEY_value(sslkeys, i); convertPK12Objects() local 4418 EVP_PKEY *pkey; openssl_import_objects() local 4864 EVP_PKEY *pkey = NULL; OpenSSL_StoreKey() local 4997 EVP_PKEY *pkey; OpenSSL_ImportCRL() local 5458 EVP_PKEY *pkey; OpenSSL_VerifyCRLFile() local [all...] |
/titanic_52/usr/src/cmd/ibd_upgrade/ |
H A D | ibd_upgrade.sh | 40 pkey= 56 pkey=0x$2 121 # per partition; consequently device names have non zero pkey) 131 -o "$pkey" = "0x0" -o "$pkey" = "0x" ]; then 151 do_cmd "dladm create-part -f -l $2 -P $pkey $partition_name"
|
/titanic_52/usr/src/lib/nsswitch/ldap/common/ |
H A D | getkeyent.c | 69 char *keytype = (char *)argp->key.pkey.keytype; in _nss_ldap_key2str() 73 char *buffer, *pkey, *skey; in _nss_ldap_key2str() local 98 pkey = *pkey_array + keytypelen; in _nss_ldap_key2str() 126 len = strlen(pkey) + strlen(skey) + 2; in _nss_ldap_key2str() 137 (void) snprintf(buffer, len, "%s:%s", pkey, skey); in _nss_ldap_key2str() 175 if (_ldap_filter_name(netname, argp->key.pkey.name, sizeof (netname)) in getkeys()
|
/titanic_52/usr/src/lib/libnsl/rpc/ |
H A D | auth_des.c | 106 netobj pkey; in authdes_seccreate() local 116 pkey.n_bytes = (char *)pkey_data; in authdes_seccreate() 117 pkey.n_len = (uint_t)strlen((char *)pkey_data) + 1; in authdes_seccreate() 118 return (authdes_pk_seccreate(servername, &pkey, win, timehost, in authdes_seccreate() 129 authdes_pk_seccreate(const char *servername, netobj *pkey, uint_t window, in authdes_pk_seccreate() argument 156 (void) memcpy(ad->ad_pkey, pkey->n_bytes, pkey->n_len); in authdes_pk_seccreate() 406 netobj pkey; in authdes_refresh() local 422 pkey.n_bytes = (char *)(ad->ad_pkey); in authdes_refresh() 423 pkey in authdes_refresh() [all...] |
H A D | key_call.c | 611 * both, of skey or pkey may have zero length. If both lengths are 615 * Stores the specified netname/pkey/skey triplet in the keyserv. 625 const char *pkey, in key_setnet_g_ext() argument 646 arg.st_pub_key.keybuf3_val = (char *)pkey; in key_setnet_g_ext() 698 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g() argument 700 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g() 709 const char *pkey, keylen_t pkeylen, algtype_t algtype) in key_setnet_g_ruid() argument 711 return (key_setnet_g_ext(netname, skey, skeylen, pkey, pkeylen, in key_setnet_g_ruid() 716 key_get_conv(char *pkey, des_block *deskey) in key_get_conv() argument 720 if (!key_call((rpcproc_t)KEY_GET_CONV, xdr_keybuf, pkey, in key_get_conv() 733 key_get_conv_g(const char * pkey,keylen_t pkeylen,algtype_t algtype,des_block deskey[],keynum_t keynum) key_get_conv_g() argument [all...] |
/titanic_52/usr/src/lib/gss_mechs/mech_dh/dh192/ |
H A D | fakensl.c | 44 int algtype, char *pkey, size_t pkeylen, int *cached) in __getpublickey_cached_g() argument 46 return (getpublickey(remotename, pkey)); in __getpublickey_cached_g() 53 int algtype, char *pkey, size_t pkeylen) in getpublickey_g() argument 55 return (getpublickey(remotename, pkey)); in getpublickey_g()
|
/titanic_52/usr/src/uts/common/io/ib/ibnex/ |
H A D | ibnex_hca.c | 302 * port=x,pkey=y,protocol=ip,<wanboot options> 304 * ibport@<Port#>,<pkey>,<service name> 305 * where pkey = 0 for port communication service nodes 318 ib_pkey_t pkey; in ibnex_config_obp_args() local 344 devname, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_config_obp_args() 382 rval = ibnex_get_dip_from_guid(port_guid, index, pkey, &cdip); in ibnex_config_obp_args() 390 if (pkey == port_attr->pa_pkey_tbl[ii].pt_pkey) { in ibnex_config_obp_args() 392 index, IBNEX_VPPA_COMMSVC_NODE, pkey, &rval, in ibnex_config_obp_args() 413 char *devname, ib_pkey_t *pkey, uint8_t *port) in ibnex_prom_devname_to_pkey_n_portnum() argument 426 (tmp = strstr(devname, "pkey in ibnex_prom_devname_to_pkey_n_portnum() 481 ib_pkey_t pkey; ibnex_hca_bus_config_one() local [all...] |
H A D | ibnex.c | 1479 ib_pkey_t pkey; in ibnex_create_vppa_nodes() local 1497 pkey = port_attr->pa_pkey_tbl[ii].pt_pkey; in ibnex_create_vppa_nodes() 1499 if (IBNEX_INVALID_PKEY(pkey)) { in ibnex_create_vppa_nodes() 1503 port_attr->pa_port_guid, idx, pkey, &dip); in ibnex_create_vppa_nodes() 1507 pkey, &rval, IBNEX_CFGADM_ENUMERATE); in ibnex_create_vppa_nodes() 1596 * ibport@<Port#>,<pkey>,<service name> 1597 * where pkey = 0 for port communication service nodes 1609 ib_pkey_t pkey; in ibnex_config_port_node() local 1617 &index, &pkey, &port_num) != IBNEX_SUCCESS) { in ibnex_config_port_node() 1653 rval = ibnex_get_dip_from_guid(port_guid, index, pkey, in ibnex_config_port_node() 1712 ibnex_get_pkey_commsvc_index_portnum(char * device_name,int * index,ib_pkey_t * pkey,uint8_t * port_num) ibnex_get_pkey_commsvc_index_portnum() argument 2707 ibnex_get_node_and_dip_from_guid(ib_guid_t guid,int index,ib_pkey_t pkey,ibnex_node_data_t ** nodep,dev_info_t ** dip) ibnex_get_node_and_dip_from_guid() argument 2757 ibnex_get_dip_from_guid(ib_guid_t guid,int index,ib_pkey_t pkey,dev_info_t ** dip) ibnex_get_dip_from_guid() argument 2966 ibnex_commsvc_initnode(dev_info_t * parent,ibdm_port_attr_t * port_attr,int index,int node_type,ib_pkey_t pkey,int * rval,int flag) ibnex_commsvc_initnode() argument 3111 ibnex_create_port_node_prop(ibdm_port_attr_t * port_attr,dev_info_t * child_dip,char * srvname,ib_pkey_t pkey) ibnex_create_port_node_prop() argument 3377 ibnex_is_node_data_present(ibnex_node_type_t node_type,void * attr,int index,ib_pkey_t pkey) ibnex_is_node_data_present() argument 3526 ibnex_init_child_nodedata(ibnex_node_type_t node_type,void * attr,int index,ib_pkey_t pkey) ibnex_init_child_nodedata() argument [all...] |
/titanic_52/usr/src/uts/common/sys/ib/clients/of/rdma/ |
H A D | ib_addr.h | 72 uint16_t pkey) in ib_addr_set_pkey() argument 74 dev_addr->broadcast[8] = pkey >> 8; in ib_addr_set_pkey() 75 dev_addr->broadcast[9] = (unsigned char) pkey; in ib_addr_set_pkey()
|
/titanic_52/usr/src/cmd/krb5/kadmin/dbutil/ |
H A D | dump.c | 613 krb5_key_data *pkey, *akey, nullkey; local 656 pkey = akey = (krb5_key_data *) NULL; 696 &pkey)) && 709 if (!pkey && akey) { 710 pkey = akey; 724 (krb5_int32) pkey->key_data_length[0], 726 (krb5_int32) pkey->key_data_length[1], 729 (krb5_int32) pkey->key_data_type[0]); 730 for (i=0; i<pkey->key_data_length[0]; i++) { 731 fprintf(arg->ofile, "%02x", pkey 1789 krb5_key_data *pkey, *akey; global() local [all...] |
/titanic_52/usr/src/uts/common/io/ib/ibtl/ |
H A D | ibtl_hca.c | 874 * Search for a Full pkey. Use the pkey at index 0 if not found. 1327 * pkey - The input PKey value, whose index we are interested in. 1338 ib_pkey_t pkey, uint16_t *pkey_ix) in ibtl_pkey2index() argument 1345 hca_devp, port_num, pkey); in ibtl_pkey2index() 1349 if ((pkey == IB_PKEY_INVALID_FULL) || in ibtl_pkey2index() 1350 (pkey == IB_PKEY_INVALID_LIMITED)) in ibtl_pkey2index() 1362 if (pkey == port_infop->p_pkey_tbl[i]) { in ibtl_pkey2index() 1378 * pkey - The returned PKey value. 1387 uint16_t pkey_ix, ib_pkey_t *pkey) in ibtl_index2pkey() argument 1435 ibt_pkey2index(ibt_hca_hdl_t hca_hdl,uint8_t port_num,ib_pkey_t pkey,uint16_t * pkey_ix) ibt_pkey2index() argument 1466 ibt_pkey2index_byguid(ib_guid_t hca_guid,uint8_t port_num,ib_pkey_t pkey,uint16_t * pkey_ix) ibt_pkey2index_byguid() argument 1507 ibt_index2pkey(ibt_hca_hdl_t hca_hdl,uint8_t port_num,uint16_t pkey_ix,ib_pkey_t * pkey) ibt_index2pkey() argument 1539 ibt_index2pkey_byguid(ib_guid_t hca_guid,uint8_t port_num,uint16_t pkey_ix,ib_pkey_t * pkey) ibt_index2pkey_byguid() argument [all...] |
/titanic_52/usr/src/uts/common/sys/ib/ibnex/ |
H A D | ibnex.h | 275 #define IBNEX_INVALID_PKEY(pkey) \ argument 276 (((pkey) == IB_PKEY_INVALID_FULL) || \ 277 ((pkey) == IB_PKEY_INVALID_LIMITED))
|
/titanic_52/usr/src/lib/libc/port/threads/ |
H A D | tsd.c | 51 thr_keycreate(thread_key_t *pkey, void (*destructor)(void *)) in thr_keycreate() argument 128 *pkey = tsdm->tsdm_nused; in thr_keycreate() 140 pthread_key_create(pthread_key_t *pkey, void (*destructor)(void *)) in pthread_key_create() argument 142 return (thr_keycreate(pkey, destructor)); in pthread_key_create()
|
/titanic_52/usr/src/uts/common/sys/ib/mgt/ibdm/ |
H A D | ibdm_impl.h | 374 #define IBDM_INVALID_PKEY(pkey) \ argument 375 (((pkey) == IB_PKEY_INVALID_FULL) || \ 376 ((pkey) == IB_PKEY_INVALID_LIMITED))
|
/titanic_52/usr/src/lib/libdladm/common/ |
H A D | libdlib.c | 416 * given in 'physlinkid' with the P_key 'pkey' and return the datalink ID in 418 * partition will be created even if the P_Key 'pkey' does not exist or if the 425 ib_pkey_t pkey, uint32_t flags, char *pname, datalink_id_t *partlinkid, in dladm_part_create() argument 436 pattr.dia_pkey = pkey; in dladm_part_create() 613 ib_pkey_t pkey; in i_dladm_part_up() local 657 pkey = (ib_pkey_t)u64; in i_dladm_part_up() 674 pattr.dia_pkey = pkey; in i_dladm_part_up()
|
/titanic_52/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 240 __generic_common_dhkeys(char *pkey, /* Public key of remote */ in __generic_common_dhkeys() argument 248 MINT *pk = mp_xtom(pkey); in __generic_common_dhkeys()
|
/titanic_52/usr/src/cmd/cmd-inet/usr.lib/wanboot/p12split/ |
H A D | p12split.c | 527 do_ofile(char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ta) in do_ofile() argument 559 if (pkey != NULL && sk_EVP_PKEY_push(klist, pkey) == 0) { in do_ofile() 583 * Put the cert and pkey off of the stack so that they won't in do_ofile() 595 if (pkey != NULL && sk_EVP_PKEY_num(klist) == 1) { in do_ofile()
|