Home | History | Annotate | Download | only in ssl

Lines Matching defs:in

10  * apply to all code found in this distribution, be it the RC4, RSA,
15 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * If this package is used in a product, Eric Young should be given attribution
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
60 * Redistribution and use in source and binary forms, with or without
67 * 2. Redistributions in binary form must reproduce the above copyright
68 * notice, this list of conditions and the following disclaimer in
75 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
83 * nor may "OpenSSL" appear in their names without prior written
89 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
94 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
99 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
135 BIO *in;
141 in = BIO_new(BIO_s_file());
143 if (sk == NULL || in == NULL) {
148 if (!BIO_read_filename(in, file)) {
153 if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) {
188 BIO_free(in);
198 BIO *in;
205 in = BIO_new(BIO_s_file());
207 if (in == NULL) {
212 if (!BIO_read_filename(in, file)) {
217 if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) {
242 BIO_free(in);
253 * \param dir the directory to append from. All files in this directory will be
255 * SSL_add_dir_cert_subjects_to_stack() that are not already in the stack will
257 * \return 1 for success, 0 for failure. Note that in the case of failure some
299 BIO *in;
303 in = BIO_new(BIO_s_file());
304 if (in == NULL) {
309 if (BIO_read_filename(in, file) <= 0) {
316 x = d2i_X509_bio(in, NULL);
319 x = PEM_read_bio_X509(in, NULL, ssl->ctx->default_passwd_callback,
335 BIO_free(in);
342 BIO *in;
345 in = BIO_new(BIO_s_file());
346 if (in == NULL) {
351 if (BIO_read_filename(in, file) <= 0) {
358 rsa = d2i_RSAPrivateKey_bio(in, NULL);
362 PEM_read_bio_RSAPrivateKey(in, NULL, ssl->ctx->default_passwd_callback,
377 BIO_free(in);
383 BIO *in;
386 in = BIO_new(BIO_s_file());
387 if (in == NULL) {
392 if (BIO_read_filename(in, file) <= 0) {
399 pkey = PEM_read_bio_PrivateKey(in, NULL, ssl->ctx->default_passwd_callback,
403 pkey = d2i_PrivateKey_bio(in, NULL);
417 BIO_free(in);
423 BIO *in;
427 in = BIO_new(BIO_s_file());
428 if (in == NULL) {
433 if (BIO_read_filename(in, file) <= 0) {
440 x = d2i_X509_bio(in, NULL);
443 x = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback,
459 BIO_free(in);
465 BIO *in;
468 in = BIO_new(BIO_s_file());
469 if (in == NULL) {
474 if (BIO_read_filename(in, file) <= 0) {
481 rsa = d2i_RSAPrivateKey_bio(in, NULL);
484 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, ctx->default_passwd_callback,
499 BIO_free(in);
505 BIO *in;
508 in = BIO_new(BIO_s_file());
509 if (in == NULL) {
514 if (BIO_read_filename(in, file) <= 0) {
521 pkey = PEM_read_bio_PrivateKey(in, NULL, ctx->default_passwd_callback,
525 pkey = d2i_PrivateKey_bio(in, NULL);
539 BIO_free(in);
543 /* Read a file that contains our certificate in "PEM" format, possibly followed
544 * by a sequence of CA certificates that should be sent to the peer in the
547 BIO *in;
553 in = BIO_new(BIO_s_file());
554 if (in == NULL) {
559 if (BIO_read_filename(in, file) <= 0) {
564 x = PEM_read_bio_X509_AUX(in, NULL, ctx->default_passwd_callback,
586 while ((ca = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback,
612 BIO_free(in);