Initializing help system before first use

XPRMloadmod, XPRMloadmodsec

XPRMloadmod, XPRMloadmodsec


Purpose
Load a Binary Model file.
Synopsis
XPRMmodel XPRMloadmod(const char *bname, const char *intname);
XPRMmodel XPRMloadmodsec(const char *bname, const char *intname, const char *flags, const char *passfile, const char *privkey, const char *keys);
Arguments
bname 
Name of a binary model file
intname 
Internal name (may be NULL)
flags 
Loading options (may be NULL, options may be separated by spaces or '-' symbols):
"c" 
Check signature (if the file is signed)
"V" 
If the file is signed, load it only if the signature is valid
"T" 
Load only signed files with a valid signature
"F" 
The argument passfile is a file name (not the password itself)
passfile 
Password or password file (for encrypted bim files)
privkey 
Private key file (for encrypted bim files)
keys 
File of public keys
Return value
Reference to the model that has been loaded or NULL.
Further information
1. This function returns the reference of a new model instance created from a binary model file. The second form of the function will be used to load encrypted and/or signed bim files if additional information has to be provided. While loading a model from a file, Mosel also automatically opens any additional modules that are required by this model. If an internal name is provided, it is used in place of the name stored in the bim file. If a model already existing in core memory ( i.e. with the same internal name) is loaded a second time, the first instance of this model is deleted and a reference to the newly created model is returned. If model name or provided internal name is "*", a unique name is automatically generated using pattern "model_\#" where \# is a hexadecimal number. If the loaded model has no name (empty string) and no internal name is provided, string "(none)" is used as a default.
2. The argument keys is a list of public key files ( i.e. each line of the file is a key file name): when a signed bim file is loaded, its signature is checked with the keys listed in this file. If this argument is not specified, the signing key is searched in the default public keys directory located at getparam("ssl_dir")+"/pubkeys".
Related topics

© 2001-2019 Fair Isaac Corporation. All rights reserved. This documentation is the property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except solely for internal evaluation purposes to determine whether to purchase a license to the software described in this documentation, or as otherwise set forth in a written software license agreement between you and FICO (or a FICO affiliate). Use of this documentation and the software described in it must conform strictly to the foregoing permitted uses, and no other use is permitted.