gnutls_datum_t load_file = { NULL, 0 };
char pass[1024];
+ if (!emile_cipher_init()) return NULL;
+
/* Init */
if (!(key = malloc(sizeof(Eet_Key))))
goto on_error;
EVP_PKEY *pkey = NULL;
X509 *cert = NULL;
+ if (!emile_cipher_init()) return NULL;
+
/* Load the X509 certificate in memory. */
fp = fopen(certificate_file, "r");
if (!fp)
EAPI void
eet_identity_close(Eet_Key *key)
{
+ if (!emile_cipher_init()) return ;
+
#ifdef HAVE_SIGNATURE
if (!key || (key->references > 0))
return;
if (!key)
return;
+ if (!emile_cipher_init()) return ;
+
if (key->private_key)
{
if (gnutls_x509_privkey_export_rsa_raw(key->private_key,
if (!key)
return;
+ if (!emile_cipher_init()) return ;
+
rsa = EVP_PKEY_get1_RSA(key->private_key);
if (rsa)
{
if (!fp || !key || !key->certificate || !key->private_key)
return EET_ERROR_BAD_OBJECT;
+ if (!emile_cipher_init()) return EET_ERROR_NOT_IMPLEMENTED;
+
/* Get the file size. */
fd = fileno(fp);
if (fd < 0)
if (signature_length < sizeof(int) * 3)
return NULL;
+ if (!emile_cipher_init()) return NULL;
+
/* Get the header */
memcpy(&magic, header, sizeof(int));
memcpy(&sign_len, header+1, sizeof(int));
return;
}
+ if (!emile_cipher_init()) return ;
+
# ifdef HAVE_GNUTLS
gnutls_datum_t datum;
gnutls_x509_crt_t cert;