Home | History | Annotate | Download | only in ssl

Lines Matching defs:in

10  * apply to all code found in this distribution, be it the RC4, RSA,
15 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * If this package is used in a product, Eric Young should be given attribution
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
82 BIO *in;
86 in = BIO_new(BIO_s_file());
87 if (in == NULL) {
92 if (BIO_read_filename(in, file) <= 0) {
99 x = d2i_X509_bio(in, NULL);
102 x = PEM_read_bio_X509(in, NULL, ssl->ctx->default_passwd_callback,
118 BIO_free(in);
173 * key is opaque (in case of, say, a smartcard). */
191 BIO *in;
194 in = BIO_new(BIO_s_file());
195 if (in == NULL) {
200 if (BIO_read_filename(in, file) <= 0) {
207 rsa = d2i_RSAPrivateKey_bio(in, NULL);
211 PEM_read_bio_RSAPrivateKey(in, NULL, ssl->ctx->default_passwd_callback,
226 BIO_free(in);
261 BIO *in;
264 in = BIO_new(BIO_s_file());
265 if (in == NULL) {
270 if (BIO_read_filename(in, file) <= 0) {
277 pkey = PEM_read_bio_PrivateKey(in, NULL, ssl->ctx->default_passwd_callback,
281 pkey = d2i_PrivateKey_bio(in, NULL);
295 BIO_free(in);
345 * key is opaque (in case of, say, a smartcard). */
369 BIO *in;
373 in = BIO_new(BIO_s_file());
374 if (in == NULL) {
379 if (BIO_read_filename(in, file) <= 0) {
386 x = d2i_X509_bio(in, NULL);
389 x = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback,
406 BIO_free(in);
451 BIO *in;
454 in = BIO_new(BIO_s_file());
455 if (in == NULL) {
460 if (BIO_read_filename(in, file) <= 0) {
467 rsa = d2i_RSAPrivateKey_bio(in, NULL);
470 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, ctx->default_passwd_callback,
486 BIO_free(in);
518 BIO *in;
521 in = BIO_new(BIO_s_file());
522 if (in == NULL) {
527 if (BIO_read_filename(in, file) <= 0) {
534 pkey = PEM_read_bio_PrivateKey(in, NULL, ctx->default_passwd_callback,
538 pkey = d2i_PrivateKey_bio(in, NULL);
552 BIO_free(in);
575 /* Read a file that contains our certificate in "PEM" format, possibly followed
576 * by a sequence of CA certificates that should be sent to the peer in the
579 BIO *in;
585 in = BIO_new(BIO_s_file());
586 if (in == NULL) {
591 if (BIO_read_filename(in, file) <= 0) {
596 in, NULL, ctx->default_passwd_callback,
618 while ((ca = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback,
644 BIO_free(in);