1 | =pod
|
---|
2 |
|
---|
3 | =begin comment
|
---|
4 |
|
---|
5 | Any keypair function here that gets deprecated should be moved to
|
---|
6 | d2i_RSAPrivateKey.pod.
|
---|
7 |
|
---|
8 | =end comment
|
---|
9 |
|
---|
10 | =head1 NAME
|
---|
11 |
|
---|
12 | d2i_ACCESS_DESCRIPTION,
|
---|
13 | d2i_ADMISSIONS,
|
---|
14 | d2i_ADMISSION_SYNTAX,
|
---|
15 | d2i_ASIdOrRange,
|
---|
16 | d2i_ASIdentifierChoice,
|
---|
17 | d2i_ASIdentifiers,
|
---|
18 | d2i_ASN1_BIT_STRING,
|
---|
19 | d2i_ASN1_BMPSTRING,
|
---|
20 | d2i_ASN1_ENUMERATED,
|
---|
21 | d2i_ASN1_GENERALIZEDTIME,
|
---|
22 | d2i_ASN1_GENERALSTRING,
|
---|
23 | d2i_ASN1_IA5STRING,
|
---|
24 | d2i_ASN1_INTEGER,
|
---|
25 | d2i_ASN1_NULL,
|
---|
26 | d2i_ASN1_OBJECT,
|
---|
27 | d2i_ASN1_OCTET_STRING,
|
---|
28 | d2i_ASN1_PRINTABLE,
|
---|
29 | d2i_ASN1_PRINTABLESTRING,
|
---|
30 | d2i_ASN1_SEQUENCE_ANY,
|
---|
31 | d2i_ASN1_SET_ANY,
|
---|
32 | d2i_ASN1_T61STRING,
|
---|
33 | d2i_ASN1_TIME,
|
---|
34 | d2i_ASN1_TYPE,
|
---|
35 | d2i_ASN1_UINTEGER,
|
---|
36 | d2i_ASN1_UNIVERSALSTRING,
|
---|
37 | d2i_ASN1_UTCTIME,
|
---|
38 | d2i_ASN1_UTF8STRING,
|
---|
39 | d2i_ASN1_VISIBLESTRING,
|
---|
40 | d2i_ASRange,
|
---|
41 | d2i_AUTHORITY_INFO_ACCESS,
|
---|
42 | d2i_AUTHORITY_KEYID,
|
---|
43 | d2i_BASIC_CONSTRAINTS,
|
---|
44 | d2i_CERTIFICATEPOLICIES,
|
---|
45 | d2i_CMS_ContentInfo,
|
---|
46 | d2i_CMS_ReceiptRequest,
|
---|
47 | d2i_CMS_bio,
|
---|
48 | d2i_CRL_DIST_POINTS,
|
---|
49 | d2i_DHxparams,
|
---|
50 | d2i_DIRECTORYSTRING,
|
---|
51 | d2i_DISPLAYTEXT,
|
---|
52 | d2i_DIST_POINT,
|
---|
53 | d2i_DIST_POINT_NAME,
|
---|
54 | d2i_DSA_SIG,
|
---|
55 | d2i_ECDSA_SIG,
|
---|
56 | d2i_EDIPARTYNAME,
|
---|
57 | d2i_ESS_CERT_ID,
|
---|
58 | d2i_ESS_CERT_ID_V2,
|
---|
59 | d2i_ESS_ISSUER_SERIAL,
|
---|
60 | d2i_ESS_SIGNING_CERT,
|
---|
61 | d2i_ESS_SIGNING_CERT_V2,
|
---|
62 | d2i_EXTENDED_KEY_USAGE,
|
---|
63 | d2i_GENERAL_NAME,
|
---|
64 | d2i_GENERAL_NAMES,
|
---|
65 | d2i_IPAddressChoice,
|
---|
66 | d2i_IPAddressFamily,
|
---|
67 | d2i_IPAddressOrRange,
|
---|
68 | d2i_IPAddressRange,
|
---|
69 | d2i_ISSUER_SIGN_TOOL,
|
---|
70 | d2i_ISSUING_DIST_POINT,
|
---|
71 | d2i_NAMING_AUTHORITY,
|
---|
72 | d2i_NETSCAPE_CERT_SEQUENCE,
|
---|
73 | d2i_NETSCAPE_SPKAC,
|
---|
74 | d2i_NETSCAPE_SPKI,
|
---|
75 | d2i_NOTICEREF,
|
---|
76 | d2i_OCSP_BASICRESP,
|
---|
77 | d2i_OCSP_CERTID,
|
---|
78 | d2i_OCSP_CERTSTATUS,
|
---|
79 | d2i_OCSP_CRLID,
|
---|
80 | d2i_OCSP_ONEREQ,
|
---|
81 | d2i_OCSP_REQINFO,
|
---|
82 | d2i_OCSP_REQUEST,
|
---|
83 | d2i_OCSP_RESPBYTES,
|
---|
84 | d2i_OCSP_RESPDATA,
|
---|
85 | d2i_OCSP_RESPID,
|
---|
86 | d2i_OCSP_RESPONSE,
|
---|
87 | d2i_OCSP_REVOKEDINFO,
|
---|
88 | d2i_OCSP_SERVICELOC,
|
---|
89 | d2i_OCSP_SIGNATURE,
|
---|
90 | d2i_OCSP_SINGLERESP,
|
---|
91 | d2i_OSSL_CMP_MSG,
|
---|
92 | d2i_OSSL_CMP_PKIHEADER,
|
---|
93 | d2i_OSSL_CMP_PKISI,
|
---|
94 | d2i_OSSL_CRMF_CERTID,
|
---|
95 | d2i_OSSL_CRMF_CERTTEMPLATE,
|
---|
96 | d2i_OSSL_CRMF_ENCRYPTEDVALUE,
|
---|
97 | d2i_OSSL_CRMF_MSG,
|
---|
98 | d2i_OSSL_CRMF_MSGS,
|
---|
99 | d2i_OSSL_CRMF_PBMPARAMETER,
|
---|
100 | d2i_OSSL_CRMF_PKIPUBLICATIONINFO,
|
---|
101 | d2i_OSSL_CRMF_SINGLEPUBINFO,
|
---|
102 | d2i_OTHERNAME,
|
---|
103 | d2i_PBE2PARAM,
|
---|
104 | d2i_PBEPARAM,
|
---|
105 | d2i_PBKDF2PARAM,
|
---|
106 | d2i_PKCS12,
|
---|
107 | d2i_PKCS12_BAGS,
|
---|
108 | d2i_PKCS12_MAC_DATA,
|
---|
109 | d2i_PKCS12_SAFEBAG,
|
---|
110 | d2i_PKCS12_bio,
|
---|
111 | d2i_PKCS12_fp,
|
---|
112 | d2i_PKCS7,
|
---|
113 | d2i_PKCS7_DIGEST,
|
---|
114 | d2i_PKCS7_ENCRYPT,
|
---|
115 | d2i_PKCS7_ENC_CONTENT,
|
---|
116 | d2i_PKCS7_ENVELOPE,
|
---|
117 | d2i_PKCS7_ISSUER_AND_SERIAL,
|
---|
118 | d2i_PKCS7_RECIP_INFO,
|
---|
119 | d2i_PKCS7_SIGNED,
|
---|
120 | d2i_PKCS7_SIGNER_INFO,
|
---|
121 | d2i_PKCS7_SIGN_ENVELOPE,
|
---|
122 | d2i_PKCS7_bio,
|
---|
123 | d2i_PKCS7_fp,
|
---|
124 | d2i_PKCS8_PRIV_KEY_INFO,
|
---|
125 | d2i_PKCS8_PRIV_KEY_INFO_bio,
|
---|
126 | d2i_PKCS8_PRIV_KEY_INFO_fp,
|
---|
127 | d2i_PKCS8_bio,
|
---|
128 | d2i_PKCS8_fp,
|
---|
129 | d2i_PKEY_USAGE_PERIOD,
|
---|
130 | d2i_POLICYINFO,
|
---|
131 | d2i_POLICYQUALINFO,
|
---|
132 | d2i_PROFESSION_INFO,
|
---|
133 | d2i_PROXY_CERT_INFO_EXTENSION,
|
---|
134 | d2i_PROXY_POLICY,
|
---|
135 | d2i_RSA_OAEP_PARAMS,
|
---|
136 | d2i_RSA_PSS_PARAMS,
|
---|
137 | d2i_SCRYPT_PARAMS,
|
---|
138 | d2i_SCT_LIST,
|
---|
139 | d2i_SXNET,
|
---|
140 | d2i_SXNETID,
|
---|
141 | d2i_TS_ACCURACY,
|
---|
142 | d2i_TS_MSG_IMPRINT,
|
---|
143 | d2i_TS_MSG_IMPRINT_bio,
|
---|
144 | d2i_TS_MSG_IMPRINT_fp,
|
---|
145 | d2i_TS_REQ,
|
---|
146 | d2i_TS_REQ_bio,
|
---|
147 | d2i_TS_REQ_fp,
|
---|
148 | d2i_TS_RESP,
|
---|
149 | d2i_TS_RESP_bio,
|
---|
150 | d2i_TS_RESP_fp,
|
---|
151 | d2i_TS_STATUS_INFO,
|
---|
152 | d2i_TS_TST_INFO,
|
---|
153 | d2i_TS_TST_INFO_bio,
|
---|
154 | d2i_TS_TST_INFO_fp,
|
---|
155 | d2i_USERNOTICE,
|
---|
156 | d2i_X509,
|
---|
157 | d2i_X509_bio,
|
---|
158 | d2i_X509_fp,
|
---|
159 | d2i_X509_ALGOR,
|
---|
160 | d2i_X509_ALGORS,
|
---|
161 | d2i_X509_ATTRIBUTE,
|
---|
162 | d2i_X509_CERT_AUX,
|
---|
163 | d2i_X509_CINF,
|
---|
164 | d2i_X509_CRL,
|
---|
165 | d2i_X509_CRL_INFO,
|
---|
166 | d2i_X509_CRL_bio,
|
---|
167 | d2i_X509_CRL_fp,
|
---|
168 | d2i_X509_EXTENSION,
|
---|
169 | d2i_X509_EXTENSIONS,
|
---|
170 | d2i_X509_NAME,
|
---|
171 | d2i_X509_NAME_ENTRY,
|
---|
172 | d2i_X509_PUBKEY,
|
---|
173 | d2i_X509_PUBKEY_bio,
|
---|
174 | d2i_X509_PUBKEY_fp,
|
---|
175 | d2i_X509_REQ,
|
---|
176 | d2i_X509_REQ_INFO,
|
---|
177 | d2i_X509_REQ_bio,
|
---|
178 | d2i_X509_REQ_fp,
|
---|
179 | d2i_X509_REVOKED,
|
---|
180 | d2i_X509_SIG,
|
---|
181 | d2i_X509_VAL,
|
---|
182 | i2d_ACCESS_DESCRIPTION,
|
---|
183 | i2d_ADMISSIONS,
|
---|
184 | i2d_ADMISSION_SYNTAX,
|
---|
185 | i2d_ASIdOrRange,
|
---|
186 | i2d_ASIdentifierChoice,
|
---|
187 | i2d_ASIdentifiers,
|
---|
188 | i2d_ASN1_BIT_STRING,
|
---|
189 | i2d_ASN1_BMPSTRING,
|
---|
190 | i2d_ASN1_ENUMERATED,
|
---|
191 | i2d_ASN1_GENERALIZEDTIME,
|
---|
192 | i2d_ASN1_GENERALSTRING,
|
---|
193 | i2d_ASN1_IA5STRING,
|
---|
194 | i2d_ASN1_INTEGER,
|
---|
195 | i2d_ASN1_NULL,
|
---|
196 | i2d_ASN1_OBJECT,
|
---|
197 | i2d_ASN1_OCTET_STRING,
|
---|
198 | i2d_ASN1_PRINTABLE,
|
---|
199 | i2d_ASN1_PRINTABLESTRING,
|
---|
200 | i2d_ASN1_SEQUENCE_ANY,
|
---|
201 | i2d_ASN1_SET_ANY,
|
---|
202 | i2d_ASN1_T61STRING,
|
---|
203 | i2d_ASN1_TIME,
|
---|
204 | i2d_ASN1_TYPE,
|
---|
205 | i2d_ASN1_UNIVERSALSTRING,
|
---|
206 | i2d_ASN1_UTCTIME,
|
---|
207 | i2d_ASN1_UTF8STRING,
|
---|
208 | i2d_ASN1_VISIBLESTRING,
|
---|
209 | i2d_ASN1_bio_stream,
|
---|
210 | i2d_ASRange,
|
---|
211 | i2d_AUTHORITY_INFO_ACCESS,
|
---|
212 | i2d_AUTHORITY_KEYID,
|
---|
213 | i2d_BASIC_CONSTRAINTS,
|
---|
214 | i2d_CERTIFICATEPOLICIES,
|
---|
215 | i2d_CMS_ContentInfo,
|
---|
216 | i2d_CMS_ReceiptRequest,
|
---|
217 | i2d_CMS_bio,
|
---|
218 | i2d_CRL_DIST_POINTS,
|
---|
219 | i2d_DHxparams,
|
---|
220 | i2d_DIRECTORYSTRING,
|
---|
221 | i2d_DISPLAYTEXT,
|
---|
222 | i2d_DIST_POINT,
|
---|
223 | i2d_DIST_POINT_NAME,
|
---|
224 | i2d_DSA_SIG,
|
---|
225 | i2d_ECDSA_SIG,
|
---|
226 | i2d_EDIPARTYNAME,
|
---|
227 | i2d_ESS_CERT_ID,
|
---|
228 | i2d_ESS_CERT_ID_V2,
|
---|
229 | i2d_ESS_ISSUER_SERIAL,
|
---|
230 | i2d_ESS_SIGNING_CERT,
|
---|
231 | i2d_ESS_SIGNING_CERT_V2,
|
---|
232 | i2d_EXTENDED_KEY_USAGE,
|
---|
233 | i2d_GENERAL_NAME,
|
---|
234 | i2d_GENERAL_NAMES,
|
---|
235 | i2d_IPAddressChoice,
|
---|
236 | i2d_IPAddressFamily,
|
---|
237 | i2d_IPAddressOrRange,
|
---|
238 | i2d_IPAddressRange,
|
---|
239 | i2d_ISSUER_SIGN_TOOL,
|
---|
240 | i2d_ISSUING_DIST_POINT,
|
---|
241 | i2d_NAMING_AUTHORITY,
|
---|
242 | i2d_NETSCAPE_CERT_SEQUENCE,
|
---|
243 | i2d_NETSCAPE_SPKAC,
|
---|
244 | i2d_NETSCAPE_SPKI,
|
---|
245 | i2d_NOTICEREF,
|
---|
246 | i2d_OCSP_BASICRESP,
|
---|
247 | i2d_OCSP_CERTID,
|
---|
248 | i2d_OCSP_CERTSTATUS,
|
---|
249 | i2d_OCSP_CRLID,
|
---|
250 | i2d_OCSP_ONEREQ,
|
---|
251 | i2d_OCSP_REQINFO,
|
---|
252 | i2d_OCSP_REQUEST,
|
---|
253 | i2d_OCSP_RESPBYTES,
|
---|
254 | i2d_OCSP_RESPDATA,
|
---|
255 | i2d_OCSP_RESPID,
|
---|
256 | i2d_OCSP_RESPONSE,
|
---|
257 | i2d_OCSP_REVOKEDINFO,
|
---|
258 | i2d_OCSP_SERVICELOC,
|
---|
259 | i2d_OCSP_SIGNATURE,
|
---|
260 | i2d_OCSP_SINGLERESP,
|
---|
261 | i2d_OSSL_CMP_MSG,
|
---|
262 | i2d_OSSL_CMP_PKIHEADER,
|
---|
263 | i2d_OSSL_CMP_PKISI,
|
---|
264 | i2d_OSSL_CRMF_CERTID,
|
---|
265 | i2d_OSSL_CRMF_CERTTEMPLATE,
|
---|
266 | i2d_OSSL_CRMF_ENCRYPTEDVALUE,
|
---|
267 | i2d_OSSL_CRMF_MSG,
|
---|
268 | i2d_OSSL_CRMF_MSGS,
|
---|
269 | i2d_OSSL_CRMF_PBMPARAMETER,
|
---|
270 | i2d_OSSL_CRMF_PKIPUBLICATIONINFO,
|
---|
271 | i2d_OSSL_CRMF_SINGLEPUBINFO,
|
---|
272 | i2d_OTHERNAME,
|
---|
273 | i2d_PBE2PARAM,
|
---|
274 | i2d_PBEPARAM,
|
---|
275 | i2d_PBKDF2PARAM,
|
---|
276 | i2d_PKCS12,
|
---|
277 | i2d_PKCS12_BAGS,
|
---|
278 | i2d_PKCS12_MAC_DATA,
|
---|
279 | i2d_PKCS12_SAFEBAG,
|
---|
280 | i2d_PKCS12_bio,
|
---|
281 | i2d_PKCS12_fp,
|
---|
282 | i2d_PKCS7,
|
---|
283 | i2d_PKCS7_DIGEST,
|
---|
284 | i2d_PKCS7_ENCRYPT,
|
---|
285 | i2d_PKCS7_ENC_CONTENT,
|
---|
286 | i2d_PKCS7_ENVELOPE,
|
---|
287 | i2d_PKCS7_ISSUER_AND_SERIAL,
|
---|
288 | i2d_PKCS7_NDEF,
|
---|
289 | i2d_PKCS7_RECIP_INFO,
|
---|
290 | i2d_PKCS7_SIGNED,
|
---|
291 | i2d_PKCS7_SIGNER_INFO,
|
---|
292 | i2d_PKCS7_SIGN_ENVELOPE,
|
---|
293 | i2d_PKCS7_bio,
|
---|
294 | i2d_PKCS7_fp,
|
---|
295 | i2d_PKCS8PrivateKeyInfo_bio,
|
---|
296 | i2d_PKCS8PrivateKeyInfo_fp,
|
---|
297 | i2d_PKCS8_PRIV_KEY_INFO,
|
---|
298 | i2d_PKCS8_PRIV_KEY_INFO_bio,
|
---|
299 | i2d_PKCS8_PRIV_KEY_INFO_fp,
|
---|
300 | i2d_PKCS8_bio,
|
---|
301 | i2d_PKCS8_fp,
|
---|
302 | i2d_PKEY_USAGE_PERIOD,
|
---|
303 | i2d_POLICYINFO,
|
---|
304 | i2d_POLICYQUALINFO,
|
---|
305 | i2d_PROFESSION_INFO,
|
---|
306 | i2d_PROXY_CERT_INFO_EXTENSION,
|
---|
307 | i2d_PROXY_POLICY,
|
---|
308 | i2d_RSA_OAEP_PARAMS,
|
---|
309 | i2d_RSA_PSS_PARAMS,
|
---|
310 | i2d_SCRYPT_PARAMS,
|
---|
311 | i2d_SCT_LIST,
|
---|
312 | i2d_SXNET,
|
---|
313 | i2d_SXNETID,
|
---|
314 | i2d_TS_ACCURACY,
|
---|
315 | i2d_TS_MSG_IMPRINT,
|
---|
316 | i2d_TS_MSG_IMPRINT_bio,
|
---|
317 | i2d_TS_MSG_IMPRINT_fp,
|
---|
318 | i2d_TS_REQ,
|
---|
319 | i2d_TS_REQ_bio,
|
---|
320 | i2d_TS_REQ_fp,
|
---|
321 | i2d_TS_RESP,
|
---|
322 | i2d_TS_RESP_bio,
|
---|
323 | i2d_TS_RESP_fp,
|
---|
324 | i2d_TS_STATUS_INFO,
|
---|
325 | i2d_TS_TST_INFO,
|
---|
326 | i2d_TS_TST_INFO_bio,
|
---|
327 | i2d_TS_TST_INFO_fp,
|
---|
328 | i2d_USERNOTICE,
|
---|
329 | i2d_X509,
|
---|
330 | i2d_X509_bio,
|
---|
331 | i2d_X509_fp,
|
---|
332 | i2d_X509_ALGOR,
|
---|
333 | i2d_X509_ALGORS,
|
---|
334 | i2d_X509_ATTRIBUTE,
|
---|
335 | i2d_X509_CERT_AUX,
|
---|
336 | i2d_X509_CINF,
|
---|
337 | i2d_X509_CRL,
|
---|
338 | i2d_X509_CRL_INFO,
|
---|
339 | i2d_X509_CRL_bio,
|
---|
340 | i2d_X509_CRL_fp,
|
---|
341 | i2d_X509_EXTENSION,
|
---|
342 | i2d_X509_EXTENSIONS,
|
---|
343 | i2d_X509_NAME,
|
---|
344 | i2d_X509_NAME_ENTRY,
|
---|
345 | i2d_X509_PUBKEY,
|
---|
346 | i2d_X509_PUBKEY_bio,
|
---|
347 | i2d_X509_PUBKEY_fp,
|
---|
348 | i2d_X509_REQ,
|
---|
349 | i2d_X509_REQ_INFO,
|
---|
350 | i2d_X509_REQ_bio,
|
---|
351 | i2d_X509_REQ_fp,
|
---|
352 | i2d_X509_REVOKED,
|
---|
353 | i2d_X509_SIG,
|
---|
354 | i2d_X509_VAL,
|
---|
355 | - convert objects from/to ASN.1/DER representation
|
---|
356 |
|
---|
357 | =head1 SYNOPSIS
|
---|
358 |
|
---|
359 | =for openssl generic
|
---|
360 |
|
---|
361 | TYPE *d2i_TYPE(TYPE **a, const unsigned char **ppin, long length);
|
---|
362 | TYPE *d2i_TYPE_bio(BIO *bp, TYPE **a);
|
---|
363 | TYPE *d2i_TYPE_fp(FILE *fp, TYPE **a);
|
---|
364 |
|
---|
365 | int i2d_TYPE(const TYPE *a, unsigned char **ppout);
|
---|
366 | int i2d_TYPE(TYPE *a, unsigned char **ppout);
|
---|
367 | int i2d_TYPE_fp(FILE *fp, const TYPE *a);
|
---|
368 | int i2d_TYPE_fp(FILE *fp, TYPE *a);
|
---|
369 | int i2d_TYPE_bio(BIO *bp, const TYPE *a);
|
---|
370 | int i2d_TYPE_bio(BIO *bp, TYPE *a);
|
---|
371 |
|
---|
372 | =head1 DESCRIPTION
|
---|
373 |
|
---|
374 | In the description here, B<I<TYPE>> is used a placeholder
|
---|
375 | for any of the OpenSSL datatypes, such as B<X509_CRL>.
|
---|
376 | The function parameters I<ppin> and I<ppout> are generally
|
---|
377 | either both named I<pp> in the headers, or I<in> and I<out>.
|
---|
378 |
|
---|
379 | These functions convert OpenSSL objects to and from their ASN.1/DER
|
---|
380 | encoding. Unlike the C structures which can have pointers to sub-objects
|
---|
381 | within, the DER is a serialized encoding, suitable for sending over the
|
---|
382 | network, writing to a file, and so on.
|
---|
383 |
|
---|
384 | B<d2i_I<TYPE>>() attempts to decode I<len> bytes at I<*ppin>. If successful a
|
---|
385 | pointer to the B<I<TYPE>> structure is returned and I<*ppin> is incremented to
|
---|
386 | the byte following the parsed data. If I<a> is not NULL then a pointer
|
---|
387 | to the returned structure is also written to I<*a>. If an error occurred
|
---|
388 | then NULL is returned.
|
---|
389 |
|
---|
390 | On a successful return, if I<*a> is not NULL then it is assumed that I<*a>
|
---|
391 | contains a valid B<I<TYPE>> structure and an attempt is made to reuse it. This
|
---|
392 | "reuse" capability is present for historical compatibility but its use is
|
---|
393 | B<strongly discouraged> (see BUGS below, and the discussion in the RETURN
|
---|
394 | VALUES section).
|
---|
395 |
|
---|
396 | B<d2i_I<TYPE>_bio>() is similar to B<d2i_I<TYPE>>() except it attempts
|
---|
397 | to parse data from BIO I<bp>.
|
---|
398 |
|
---|
399 | B<d2i_I<TYPE>_fp>() is similar to B<d2i_I<TYPE>>() except it attempts
|
---|
400 | to parse data from FILE pointer I<fp>.
|
---|
401 |
|
---|
402 | B<i2d_I<TYPE>>() encodes the structure pointed to by I<a> into DER format.
|
---|
403 | If I<ppout> is not NULL, it writes the DER encoded data to the buffer
|
---|
404 | at I<*ppout>, and increments it to point after the data just written.
|
---|
405 | If the return value is negative an error occurred, otherwise it
|
---|
406 | returns the length of the encoded data.
|
---|
407 |
|
---|
408 | If I<*ppout> is NULL memory will be allocated for a buffer and the encoded
|
---|
409 | data written to it. In this case I<*ppout> is not incremented and it points
|
---|
410 | to the start of the data just written.
|
---|
411 |
|
---|
412 | B<i2d_I<TYPE>_bio>() is similar to B<i2d_I<TYPE>>() except it writes
|
---|
413 | the encoding of the structure I<a> to BIO I<bp> and it
|
---|
414 | returns 1 for success and 0 for failure.
|
---|
415 |
|
---|
416 | B<i2d_I<TYPE>_fp>() is similar to B<i2d_I<TYPE>>() except it writes
|
---|
417 | the encoding of the structure I<a> to FILE pointer I<fp> and it
|
---|
418 | returns 1 for success and 0 for failure.
|
---|
419 |
|
---|
420 | These routines do not encrypt private keys and therefore offer no
|
---|
421 | security; use L<PEM_write_PrivateKey(3)> or similar for writing to files.
|
---|
422 |
|
---|
423 | =head1 NOTES
|
---|
424 |
|
---|
425 | The letters B<i> and B<d> in B<i2d_I<TYPE>>() stand for
|
---|
426 | "internal" (that is, an internal C structure) and "DER" respectively.
|
---|
427 | So B<i2d_I<TYPE>>() converts from internal to DER.
|
---|
428 |
|
---|
429 | The functions can also understand B<BER> forms.
|
---|
430 |
|
---|
431 | The actual TYPE structure passed to B<i2d_I<TYPE>>() must be a valid
|
---|
432 | populated B<I<TYPE>> structure -- it B<cannot> simply be fed with an
|
---|
433 | empty structure such as that returned by TYPE_new().
|
---|
434 |
|
---|
435 | The encoded data is in binary form and may contain embedded zeros.
|
---|
436 | Therefore, any FILE pointers or BIOs should be opened in binary mode.
|
---|
437 | Functions such as strlen() will B<not> return the correct length
|
---|
438 | of the encoded structure.
|
---|
439 |
|
---|
440 | The ways that I<*ppin> and I<*ppout> are incremented after the operation
|
---|
441 | can trap the unwary. See the B<WARNINGS> section for some common
|
---|
442 | errors.
|
---|
443 | The reason for this-auto increment behaviour is to reflect a typical
|
---|
444 | usage of ASN1 functions: after one structure is encoded or decoded
|
---|
445 | another will be processed after it.
|
---|
446 |
|
---|
447 | The following points about the data types might be useful:
|
---|
448 |
|
---|
449 | =over 4
|
---|
450 |
|
---|
451 | =item B<ASN1_OBJECT>
|
---|
452 |
|
---|
453 | Represents an ASN1 OBJECT IDENTIFIER.
|
---|
454 |
|
---|
455 | =item B<DHparams>
|
---|
456 |
|
---|
457 | Represents a PKCS#3 DH parameters structure.
|
---|
458 |
|
---|
459 | =item B<DHxparams>
|
---|
460 |
|
---|
461 | Represents an ANSI X9.42 DH parameters structure.
|
---|
462 |
|
---|
463 | =item B<ECDSA_SIG>
|
---|
464 |
|
---|
465 | Represents an ECDSA signature.
|
---|
466 |
|
---|
467 | =item B<X509_ALGOR>
|
---|
468 |
|
---|
469 | Represents an B<AlgorithmIdentifier> structure as used in IETF RFC 6960 and
|
---|
470 | elsewhere.
|
---|
471 |
|
---|
472 | =item B<X509_NAME>
|
---|
473 |
|
---|
474 | Represents a B<Name> type as used for subject and issuer names in
|
---|
475 | IETF RFC 6960 and elsewhere.
|
---|
476 |
|
---|
477 | =item B<X509_REQ>
|
---|
478 |
|
---|
479 | Represents a PKCS#10 certificate request.
|
---|
480 |
|
---|
481 | =item B<X509_SIG>
|
---|
482 |
|
---|
483 | Represents the B<DigestInfo> structure defined in PKCS#1 and PKCS#7.
|
---|
484 |
|
---|
485 | =back
|
---|
486 |
|
---|
487 | =head1 RETURN VALUES
|
---|
488 |
|
---|
489 | B<d2i_I<TYPE>>(), B<d2i_I<TYPE>_bio>() and B<d2i_I<TYPE>_fp>() return a valid
|
---|
490 | B<I<TYPE>> structure or NULL if an error occurs. If the "reuse" capability has
|
---|
491 | been used with a valid structure being passed in via I<a>, then the object is
|
---|
492 | freed in the event of error and I<*a> is set to NULL.
|
---|
493 |
|
---|
494 | B<i2d_I<TYPE>>() returns the number of bytes successfully encoded or a negative
|
---|
495 | value if an error occurs.
|
---|
496 |
|
---|
497 | B<i2d_I<TYPE>_bio>() and B<i2d_I<TYPE>_fp>() return 1 for success and 0 if an
|
---|
498 | error occurs.
|
---|
499 |
|
---|
500 | =head1 EXAMPLES
|
---|
501 |
|
---|
502 | Allocate and encode the DER encoding of an X509 structure:
|
---|
503 |
|
---|
504 | int len;
|
---|
505 | unsigned char *buf;
|
---|
506 |
|
---|
507 | buf = NULL;
|
---|
508 | len = i2d_X509(x, &buf);
|
---|
509 | if (len < 0)
|
---|
510 | /* error */
|
---|
511 |
|
---|
512 | Attempt to decode a buffer:
|
---|
513 |
|
---|
514 | X509 *x;
|
---|
515 | unsigned char *buf;
|
---|
516 | const unsigned char *p;
|
---|
517 | int len;
|
---|
518 |
|
---|
519 | /* Set up buf and len to point to the input buffer. */
|
---|
520 | p = buf;
|
---|
521 | x = d2i_X509(NULL, &p, len);
|
---|
522 | if (x == NULL)
|
---|
523 | /* error */
|
---|
524 |
|
---|
525 | Alternative technique:
|
---|
526 |
|
---|
527 | X509 *x;
|
---|
528 | unsigned char *buf;
|
---|
529 | const unsigned char *p;
|
---|
530 | int len;
|
---|
531 |
|
---|
532 | /* Set up buf and len to point to the input buffer. */
|
---|
533 | p = buf;
|
---|
534 | x = NULL;
|
---|
535 |
|
---|
536 | if (d2i_X509(&x, &p, len) == NULL)
|
---|
537 | /* error */
|
---|
538 |
|
---|
539 | =head1 WARNINGS
|
---|
540 |
|
---|
541 | Using a temporary variable is mandatory. A common
|
---|
542 | mistake is to attempt to use a buffer directly as follows:
|
---|
543 |
|
---|
544 | int len;
|
---|
545 | unsigned char *buf;
|
---|
546 |
|
---|
547 | len = i2d_X509(x, NULL);
|
---|
548 | buf = OPENSSL_malloc(len);
|
---|
549 | ...
|
---|
550 | i2d_X509(x, &buf);
|
---|
551 | ...
|
---|
552 | OPENSSL_free(buf);
|
---|
553 |
|
---|
554 | This code will result in I<buf> apparently containing garbage because
|
---|
555 | it was incremented after the call to point after the data just written.
|
---|
556 | Also I<buf> will no longer contain the pointer allocated by OPENSSL_malloc()
|
---|
557 | and the subsequent call to OPENSSL_free() is likely to crash.
|
---|
558 |
|
---|
559 | Another trap to avoid is misuse of the I<a> argument to B<d2i_I<TYPE>>():
|
---|
560 |
|
---|
561 | X509 *x;
|
---|
562 |
|
---|
563 | if (d2i_X509(&x, &p, len) == NULL)
|
---|
564 | /* error */
|
---|
565 |
|
---|
566 | This will probably crash somewhere in d2i_X509(). The reason for this
|
---|
567 | is that the variable I<x> is uninitialized and an attempt will be made to
|
---|
568 | interpret its (invalid) value as an B<X509> structure, typically causing
|
---|
569 | a segmentation violation. If I<x> is set to NULL first then this will not
|
---|
570 | happen.
|
---|
571 |
|
---|
572 | =head1 BUGS
|
---|
573 |
|
---|
574 | In some versions of OpenSSL the "reuse" behaviour of B<d2i_I<TYPE>>() when
|
---|
575 | I<*a> is valid is broken and some parts of the reused structure may
|
---|
576 | persist if they are not present in the new one. Additionally, in versions of
|
---|
577 | OpenSSL prior to 1.1.0, when the "reuse" behaviour is used and an error occurs
|
---|
578 | the behaviour is inconsistent. Some functions behaved as described here, while
|
---|
579 | some did not free I<*a> on error and did not set I<*a> to NULL.
|
---|
580 |
|
---|
581 | As a result of the above issues the "reuse" behaviour is strongly discouraged.
|
---|
582 |
|
---|
583 | B<i2d_I<TYPE>>() will not return an error in many versions of OpenSSL,
|
---|
584 | if mandatory fields are not initialized due to a programming error
|
---|
585 | then the encoded structure may contain invalid data or omit the
|
---|
586 | fields entirely and will not be parsed by B<d2i_I<TYPE>>(). This may be
|
---|
587 | fixed in future so code should not assume that B<i2d_I<TYPE>>() will
|
---|
588 | always succeed.
|
---|
589 |
|
---|
590 | Any function which encodes a structure (B<i2d_I<TYPE>>(),
|
---|
591 | B<i2d_I<TYPE>_bio>() or B<i2d_I<TYPE>_fp>()) may return a stale encoding if the
|
---|
592 | structure has been modified after deserialization or previous
|
---|
593 | serialization. This is because some objects cache the encoding for
|
---|
594 | efficiency reasons.
|
---|
595 |
|
---|
596 | =head1 COPYRIGHT
|
---|
597 |
|
---|
598 | Copyright 1998-2023 The OpenSSL Project Authors. All Rights Reserved.
|
---|
599 |
|
---|
600 | Licensed under the Apache License 2.0 (the "License"). You may not use
|
---|
601 | this file except in compliance with the License. You can obtain a copy
|
---|
602 | in the file LICENSE in the source distribution or at
|
---|
603 | L<https://www.openssl.org/source/license.html>.
|
---|
604 |
|
---|
605 | =cut
|
---|