Home | History | Annotate | Download | only in ssl

Lines Matching defs:in

10  * apply to all code found in this distribution, be it the RC4, RSA,
15 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * If this package is used in a product, Eric Young should be given attribution
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
60 * Redistribution and use in source and binary forms, with or without
67 * 2. Redistributions in binary form must reproduce the above copyright
68 * notice, this list of conditions and the following disclaimer in
75 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
83 * nor may "OpenSSL" appear in their names without prior written
89 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
94 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
99 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
134 BIO *in;
140 in = BIO_new(BIO_s_file());
142 if (sk == NULL || in == NULL) {
147 if (!BIO_read_filename(in, file)) {
152 if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) {
188 BIO_free(in);
198 BIO *in;
205 in = BIO_new(BIO_s_file());
207 if (in == NULL) {
212 if (!BIO_read_filename(in, file)) {
217 if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) {
242 BIO_free(in);
252 BIO *in;
256 in = BIO_new(BIO_s_file());
257 if (in == NULL) {
262 if (BIO_read_filename(in, file) <= 0) {
269 x = d2i_X509_bio(in, NULL);
272 x = PEM_read_bio_X509(in, NULL, ssl->ctx->default_passwd_callback,
288 BIO_free(in);
295 BIO *in;
298 in = BIO_new(BIO_s_file());
299 if (in == NULL) {
304 if (BIO_read_filename(in, file) <= 0) {
311 rsa = d2i_RSAPrivateKey_bio(in, NULL);
315 PEM_read_bio_RSAPrivateKey(in, NULL, ssl->ctx->default_passwd_callback,
330 BIO_free(in);
336 BIO *in;
339 in = BIO_new(BIO_s_file());
340 if (in == NULL) {
345 if (BIO_read_filename(in, file) <= 0) {
352 pkey = PEM_read_bio_PrivateKey(in, NULL, ssl->ctx->default_passwd_callback,
356 pkey = d2i_PrivateKey_bio(in, NULL);
370 BIO_free(in);
376 BIO *in;
380 in = BIO_new(BIO_s_file());
381 if (in == NULL) {
386 if (BIO_read_filename(in, file) <= 0) {
393 x = d2i_X509_bio(in, NULL);
396 x = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback,
412 BIO_free(in);
418 BIO *in;
421 in = BIO_new(BIO_s_file());
422 if (in == NULL) {
427 if (BIO_read_filename(in, file) <= 0) {
434 rsa = d2i_RSAPrivateKey_bio(in, NULL);
437 rsa = PEM_read_bio_RSAPrivateKey(in, NULL, ctx->default_passwd_callback,
452 BIO_free(in);
458 BIO *in;
461 in = BIO_new(BIO_s_file());
462 if (in == NULL) {
467 if (BIO_read_filename(in, file) <= 0) {
474 pkey = PEM_read_bio_PrivateKey(in, NULL, ctx->default_passwd_callback,
478 pkey = d2i_PrivateKey_bio(in, NULL);
492 BIO_free(in);
496 /* Read a file that contains our certificate in "PEM" format, possibly followed
497 * by a sequence of CA certificates that should be sent to the peer in the
500 BIO *in;
506 in = BIO_new(BIO_s_file());
507 if (in == NULL) {
512 if (BIO_read_filename(in, file) <= 0) {
517 x = PEM_read_bio_X509_AUX(in, NULL, ctx->default_passwd_callback,
539 while ((ca = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback,
565 BIO_free(in);