/openssl/test/testutil/ |
H A D | tests.c | 25 void test_fail_message_prefix(const char *prefix, const char *file, in test_fail_message_prefix() argument 39 if (file != NULL) { in test_fail_message_prefix() 40 test_printf_stderr(" @ %s:%d", file, line); in test_fail_message_prefix() 74 static void test_fail_message_va(const char *prefix, const char *file, in test_fail_message_va() argument 87 static void test_fail_message(const char *prefix, const char *file, in test_fail_message() argument 108 void test_info(const char *file, int line, const char *desc, ...) in test_info() argument 127 void test_error(const char *file, int line, const char *desc, ...) in test_error() argument 160 int test_skip(const char *file, int line, const char *desc, ...) in test_skip() argument 261 int test_true(const char *file, int line, const char *s, int b) in test_true() argument 269 int test_false(const char *file, int line, const char *s, int b) in test_false() argument [all …]
|
H A D | load.c | 18 X509 *load_cert_pem(const char *file, OSSL_LIB_CTX *libctx) in load_cert_pem() argument 23 if (!TEST_ptr(file) || !TEST_ptr(bio = BIO_new(BIO_s_file()))) in load_cert_pem() 25 if (TEST_int_gt(BIO_read_filename(bio, file), 0) in load_cert_pem() 33 STACK_OF(X509) *load_certs_pem(const char *file) in STACK_OF() 39 if (!TEST_ptr(file) || (bio = BIO_new_file(file, "r")) == NULL) in STACK_OF() 69 EVP_PKEY *load_pkey_pem(const char *file, OSSL_LIB_CTX *libctx) in load_pkey_pem() argument 74 if (!TEST_ptr(file) || !TEST_ptr(bio = BIO_new(BIO_s_file()))) in load_pkey_pem() 76 if (TEST_int_gt(BIO_read_filename(bio, file), 0)) { in load_pkey_pem() 92 X509_REQ *load_csr_der(const char *file, OSSL_LIB_CTX *libctx) in load_csr_der() argument 97 if (!TEST_ptr(file) || !TEST_ptr(bio = BIO_new_file(file, "rb"))) in load_csr_der()
|
H A D | tu_local.h | 21 void test_fail_message_prefix(const char *prefix, const char *file, 26 void test_fail_string_message(const char *prefix, const char *file, 32 void test_fail_bignum_message(const char *prefix, const char *file, 37 void test_fail_bignum_mono_message(const char *prefix, const char *file, 42 void test_fail_memory_message(const char *prefix, const char *file,
|
/openssl/crypto/ |
H A D | mem.c | 192 ptr = malloc_impl(num, file, line); in CRYPTO_malloc() 219 if (file != NULL || line != 0) { in CRYPTO_malloc() 221 ERR_set_debug(file, line, NULL); in CRYPTO_malloc() 231 ret = CRYPTO_malloc(num, file, line); in CRYPTO_zalloc() 307 return CRYPTO_malloc(num, file, line); in CRYPTO_realloc() 310 CRYPTO_free(str, file, line); in CRYPTO_realloc() 324 return CRYPTO_malloc(num, file, line); in CRYPTO_clear_realloc() 337 ret = CRYPTO_malloc(num, file, line); in CRYPTO_clear_realloc() 349 free_impl(str, file, line); in CRYPTO_free() 362 CRYPTO_free(str, file, line); in CRYPTO_clear_free() [all …]
|
H A D | o_fopen.c | 40 FILE *file = NULL; in openssl_fopen() local 76 (file = _wfopen(wfilename, wmode)) == NULL && in openssl_fopen() 83 file = fopen(filename, mode); in openssl_fopen() 86 file = fopen(filename, mode); in openssl_fopen() 113 file = fopen(filename, mode); in openssl_fopen() 118 file = fopen(filename, mode); in openssl_fopen() 120 return file; in openssl_fopen()
|
/openssl/test/recipes/ |
H A D | 90-test_store.t | 154 my $file = srctop_file($_); 217 my $file = data_file($_); 220 $file]))); 564 my ($file, $isdir, $authority) = @_; 568 die "to_file_uri: No file given\n" if !defined($file) || $file eq ''; 570 ($vol, $dir, $file) = File::Spec->splitpath($file, $isdir // 0); 602 $file = $dir . $file; 605 return "file:$file"; 609 my ($file) = @_; 611 return File::Spec->rel2abs($file); [all …]
|
H A D | 80-test_pkcs12.t | 211 my $path = srctop_file("test", "recipes", "80-test_pkcs12_data", $file); 213 "test pbmac1 pkcs12 file $file"); 228 my $path = srctop_file("test", "recipes", "80-test_pkcs12_data", $file); 230 "test pbmac1 pkcs12 file $file"); 233 "-passin", "pass:1234"], stderr => "${file}_info.txt")), 234 "test_export_pkcs12_${file}_info"); 241 my $path = srctop_file("test", "recipes", "80-test_pkcs12_data", $file); 245 "test pbmac1 pkcs12 bad file $file"); 252 my $file = "pbmac1_sha1_hmac_and_prf.p12"; 253 my $path = srctop_file("test", "recipes", "80-test_pkcs12_data", $file); [all …]
|
/openssl/external/perl/Text-Template-1.56/t/ |
H A D | taint.t | 21 my $file = $tmpfile->filename; 32 open my $fh, '>', $file or die "Couldn't write temporary file $file: $!"; 34 close $fh or die "Couldn't finish temporary file $file: $!"; 72 my $tfile = $file; 75 should_be_clean($file); 78 should_fail TYPE => 'file', SOURCE => $file; 79 should_work TYPE => 'file', SOURCE => $file, UNTAINT => 1; 82 open $fh, '<', $file or die "Couldn't open $file for reading: $!; aborting"; 86 open $fh, '<', $file or die "Couldn't open $file for reading: $!; aborting";
|
/openssl/providers/implementations/storemgmt/ |
H A D | file_store.c | 76 BIO *file; member 81 } file; member 117 OPENSSL_free(ctx->_.file.propq); in free_file_ctx() 161 ctx->_.file.file = source; in file_open_stream() 332 ctx->_.file.propq = NULL; in file_set_ctx_params() 533 ret = OSSL_DECODER_from_bio(ctx->_.file.decoderctx, ctx->_.file.file); in file_load_file() 534 if (BIO_eof(ctx->_.file.file) in file_load_file() 729 return !BIO_pending(ctx->_.file.file) in file_eof() 730 && BIO_eof(ctx->_.file.file); in file_eof() 752 BIO_free(ctx->_.file.file); in file_close_stream() [all …]
|
/openssl/doc/man3/ |
H A D | BIO_s_fd.pod | 5 BIO_s_fd, BIO_set_fd, BIO_get_fd, BIO_new_fd - file descriptor BIO 20 BIO_s_fd() returns the file descriptor BIO method. This is a wrapper 27 file descriptor when the BIO is freed. 29 BIO_reset() attempts to change the file pointer to the start of file 32 BIO_seek() sets the file pointer to position B<ofs> from start of file 35 BIO_tell() returns the current file position such as by calling 42 It also returns the file descriptor. 61 BIO_s_fd() returns the file descriptor BIO method. 65 BIO_get_fd() returns the file descriptor or -1 if the BIO has not 73 This is a file descriptor BIO version of "Hello World": [all …]
|
H A D | CONF_modules_load_file.pod | 24 configuration file pathname as follows. 82 consider a configuration file error as fatal and exit immediately. 96 Load a configuration file and print out any errors and exit (missing file 100 fprintf(stderr, "FATAL: error loading configuration file\n"); 110 fprintf(stderr, "FATAL: error loading configuration file\n"); 116 missing configuration file ignored: 124 Load and parse configuration file manually, custom error handling: 132 fprintf(stderr, "Error opening configuration file\n"); 133 /* Other missing configuration file behaviour */ 139 /* Other malformed configuration file behaviour */ [all …]
|
H A D | BIO_s_file.pod | 27 BIO_s_file() returns the BIO file method. As its name implies it 37 BIO_reset() attempts to change the file pointer to the start of file 40 BIO_seek() sets the file pointer to position B<ofs> from start of file 52 BIO_new_fp() creates a file BIO wrapping B<stream>. Flags can be: 60 BIO_get_fp() retrieves the fp of a file BIO, it is a macro. 63 from the start of file. 68 BIO_rw_filename() set the file BIO B<b> to use file B<name> for 85 BIO_s_file() returns the file BIO method. 99 returned if the file does not exist. 121 Write to a file: [all …]
|
H A D | SSL_get_fd.pod | 5 SSL_get_fd, SSL_get_rfd, SSL_get_wfd - get file descriptor linked to an SSL object 17 SSL_get_fd() returns the file descriptor which is linked to B<ssl>. 18 SSL_get_rfd() and SSL_get_wfd() return the file descriptors for the 20 write channel are different, SSL_get_fd() will return the file descriptor 32 (suitable for file descriptors). 36 The file descriptor linked to B<ssl>. 49 this file except in compliance with the License. You can obtain a copy 50 in the file LICENSE in the source distribution or at
|
/openssl/crypto/x509/ |
H A D | x509_d2.c | 50 int X509_STORE_load_file_ex(X509_STORE *ctx, const char *file, in X509_STORE_load_file_ex() argument 55 if (file == NULL in X509_STORE_load_file_ex() 57 || X509_LOOKUP_load_file_ex(lookup, file, X509_FILETYPE_PEM, libctx, in X509_STORE_load_file_ex() 64 int X509_STORE_load_file(X509_STORE *ctx, const char *file) in X509_STORE_load_file() argument 66 return X509_STORE_load_file_ex(ctx, file, NULL, NULL); in X509_STORE_load_file() 99 int X509_STORE_load_locations_ex(X509_STORE *ctx, const char *file, in X509_STORE_load_locations_ex() argument 103 if (file == NULL && path == NULL) in X509_STORE_load_locations_ex() 105 if (file != NULL && !X509_STORE_load_file_ex(ctx, file, libctx, propq)) in X509_STORE_load_locations_ex() 112 int X509_STORE_load_locations(X509_STORE *ctx, const char *file, in X509_STORE_load_locations() argument 115 return X509_STORE_load_locations_ex(ctx, file, path, NULL, NULL); in X509_STORE_load_locations()
|
H A D | by_file.c | 52 const char *file; in by_file_ctrl_ex() local 57 file = ossl_safe_getenv(X509_get_default_cert_file_env()); in by_file_ctrl_ex() 58 if (file) in by_file_ctrl_ex() 94 if (file == NULL) { in X509_load_cert_file_ex() 101 if ((in == NULL) || (BIO_read_filename(in, file) <= 0)) { in X509_load_cert_file_ex() 167 return X509_load_cert_file_ex(ctx, file, type, NULL, NULL); in X509_load_cert_file() 170 int X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type) in X509_load_crl_file() argument 176 if (file == NULL) { in X509_load_crl_file() 183 if ((in == NULL) || (BIO_read_filename(in, file) <= 0)) { in X509_load_crl_file() 241 in = BIO_new_file(file, "r"); in X509_load_cert_crl_file_ex() [all …]
|
/openssl/crypto/rand/ |
H A D | randfile.c | 85 int RAND_load_file(const char *file, long bytes) in RAND_load_file() argument 106 if ((in = openssl_fopen(file, "rb")) == NULL) { in RAND_load_file() 108 "Filename=%s", file); in RAND_load_file() 115 "Filename=%s", file); in RAND_load_file() 182 int RAND_write_file(const char *file) in RAND_write_file() argument 192 "Filename=%s", file); in RAND_write_file() 218 "Filename=%s", file); in RAND_write_file() 243 out = openssl_fopen(file, "rb+"); in RAND_write_file() 247 out = openssl_fopen(file, "wb"); in RAND_write_file() 250 "Filename=%s", file); in RAND_write_file() [all …]
|
/openssl/doc/man7/ |
H A D | ossl_store-file.pod | 13 ossl_store-file - The store 'file' scheme loader 23 Support for the 'file' scheme is built into C<libcrypto>. 24 Since files come in all kinds of formats and content types, the 'file' 25 scheme has its own layer of functionality called "file handlers", 26 which are used to try to decode diverse types of file contents. 28 In case a file is formatted as PEM, each called file handler receives 31 formatted files can contain more than one object, the file handlers 34 If the file isn't determined to be formatted as PEM, the content is 35 loaded in raw form in its entirety and passed to the available file 38 Each file handler is expected to handle PEM and non-PEM content as [all …]
|
/openssl/Configurations/ |
H A D | README-design.md | 20 build-file templates. See the section on build-file templates further 75 This is the `build.info` file in `apps/`, one may notice that all file 98 file, but can make the info file easier to understand. This is to 187 extra source file. 408 Build-file templates 422 a source file from some input. 465 file that directly corresponds to the object file. 528 executable file from object files. 544 script file from some input. 559 functions defined in the build-file template. [all …]
|
/openssl/util/ |
H A D | ck_errf.pl | 98 foreach my $file (@source) { 99 open( IN, "<$file" ) || die "Can't open $file, $!"; 113 print "$file:$.:$errlib not listed in $config\n"; 119 print "$file:$.:???:$n\n"; 132 print "$file:$.:$func:$n [${errlib}err]\n"; 139 print "$file:$.:$func:$n\n";
|
/openssl/doc/man1/ |
H A D | openssl-srp.pod.in | 6 openssl-srp - maintain SRP password file 18 [B<-srpvfile> I<file>] 34 appropriate operation on the SRP file. 37 The configuration file to use, and the section within the file, can be 62 Delete user from verifier file. 72 =item B<-srpvfile> I<file> 74 If the config file is not specified, 75 B<-srpvfile> can be used to specify the file to operate on. 89 The password source for the input and output file. 114 this file except in compliance with the License. You can obtain a copy [all …]
|
H A D | openssl-asn1parse.pod.in | 24 [B<-genconf> I<file>] 48 The input file, default is standard input. 75 file is described in the NOTES section below. 97 file using the B<-out> option. 105 END marker in a PEM file. 171 Parse a file: 173 openssl asn1parse -in file.pem 175 Parse a DER file: 177 openssl asn1parse -inform DER -in file.der 187 Generate using a config file: [all …]
|
H A D | openssl-pkcs12.pod.in | 6 openssl-pkcs12 - PKCS#12 file command 444 Parse a PKCS#12 file and output it to a PEM file: 446 openssl pkcs12 -in file.p12 -out file.pem 450 openssl pkcs12 -in file.p12 -clcerts -out file.pem 454 openssl pkcs12 -in file.p12 -out file.pem -noenc 456 Print some info about a PKCS#12 file: 464 Create a PKCS#12 file from a PEM file that may contain a key and certificates: 466 openssl pkcs12 -export -in file.pem -out file.p12 -name "My PSE" 470 openssl pkcs12 -export -in file.pem -out file.p12 -name "My PSE" \ 473 Export a PKCS#12 file with data from a certificate PEM file and from a further [all …]
|
/openssl/engines/ |
H A D | e_loader_attic.c | 880 } file; member 934 ctx->_.file.file = BIO_push(buff, ctx->_.file.file); in file_find_type() 1042 } else if ((ctx->_.file.file = BIO_new_file(path, "rb")) == NULL in file_open_ex() 1044 BIO_free_all(ctx->_.file.file); in file_open_ex() 1081 ctx->_.file.file = bp; in file_attach() 1084 ctx->_.file.file = NULL; in file_attach() 1647 return BIO_eof(ctx->_.file.file); in file_eof() 1656 BIO_free_all(ctx->_.file.file); in file_close() 1662 BIO *buff = ctx->_.file.file; in file_close() 1665 (void)BIO_pop(ctx->_.file.file); in file_close() [all …]
|
/openssl/crypto/err/ |
H A D | err.c | 166 const char **file, int *line, 354 unsigned long ERR_get_error_all(const char **file, int *line, in ERR_get_error_all() argument 358 return get_error_values(EV_POP, file, line, func, data, flags); in ERR_get_error_all() 362 unsigned long ERR_get_error_line(const char **file, int *line) in ERR_get_error_line() argument 364 return get_error_values(EV_POP, file, line, NULL, NULL, NULL); in ERR_get_error_line() 379 unsigned long ERR_peek_error_line(const char **file, int *line) in ERR_peek_error_line() argument 394 unsigned long ERR_peek_error_all(const char **file, int *line, in ERR_peek_error_all() argument 492 if (file != NULL) { in get_error_values() 493 *file = es->err_file[i]; in get_error_values() 494 if (*file == NULL) in get_error_values() [all …]
|
/openssl/test/ |
H A D | cms-examples.pl | 105 my ( $file, $tlist ) = @$_; 106 print "Example file $file:\n"; 108 run_reencode_test( $exdir, $file ); 111 run_certsout_test( $exdir, $file ); 114 run_dataout_test( $exdir, $file ); 117 run_verify_test( $exdir, $tlist, $file ); 120 run_digest_test( $exdir, $tlist, $file ); 123 run_encrypted_test( $exdir, $tlist, $file, $secretkey ); 126 run_envelope_test( $exdir, $tlist, $file );
|