123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605 |
- =pod
- =begin comment
- Any keypair function here that gets deprecated should be moved to
- d2i_RSAPrivateKey.pod.
- =end comment
- =head1 NAME
- d2i_ACCESS_DESCRIPTION,
- d2i_ADMISSIONS,
- d2i_ADMISSION_SYNTAX,
- d2i_ASIdOrRange,
- d2i_ASIdentifierChoice,
- d2i_ASIdentifiers,
- d2i_ASN1_BIT_STRING,
- d2i_ASN1_BMPSTRING,
- d2i_ASN1_ENUMERATED,
- d2i_ASN1_GENERALIZEDTIME,
- d2i_ASN1_GENERALSTRING,
- d2i_ASN1_IA5STRING,
- d2i_ASN1_INTEGER,
- d2i_ASN1_NULL,
- d2i_ASN1_OBJECT,
- d2i_ASN1_OCTET_STRING,
- d2i_ASN1_PRINTABLE,
- d2i_ASN1_PRINTABLESTRING,
- d2i_ASN1_SEQUENCE_ANY,
- d2i_ASN1_SET_ANY,
- d2i_ASN1_T61STRING,
- d2i_ASN1_TIME,
- d2i_ASN1_TYPE,
- d2i_ASN1_UINTEGER,
- d2i_ASN1_UNIVERSALSTRING,
- d2i_ASN1_UTCTIME,
- d2i_ASN1_UTF8STRING,
- d2i_ASN1_VISIBLESTRING,
- d2i_ASRange,
- d2i_AUTHORITY_INFO_ACCESS,
- d2i_AUTHORITY_KEYID,
- d2i_BASIC_CONSTRAINTS,
- d2i_CERTIFICATEPOLICIES,
- d2i_CMS_ContentInfo,
- d2i_CMS_ReceiptRequest,
- d2i_CMS_bio,
- d2i_CRL_DIST_POINTS,
- d2i_DHxparams,
- d2i_DIRECTORYSTRING,
- d2i_DISPLAYTEXT,
- d2i_DIST_POINT,
- d2i_DIST_POINT_NAME,
- d2i_DSA_SIG,
- d2i_ECDSA_SIG,
- d2i_EDIPARTYNAME,
- d2i_ESS_CERT_ID,
- d2i_ESS_CERT_ID_V2,
- d2i_ESS_ISSUER_SERIAL,
- d2i_ESS_SIGNING_CERT,
- d2i_ESS_SIGNING_CERT_V2,
- d2i_EXTENDED_KEY_USAGE,
- d2i_GENERAL_NAME,
- d2i_GENERAL_NAMES,
- d2i_IPAddressChoice,
- d2i_IPAddressFamily,
- d2i_IPAddressOrRange,
- d2i_IPAddressRange,
- d2i_ISSUER_SIGN_TOOL,
- d2i_ISSUING_DIST_POINT,
- d2i_NAMING_AUTHORITY,
- d2i_NETSCAPE_CERT_SEQUENCE,
- d2i_NETSCAPE_SPKAC,
- d2i_NETSCAPE_SPKI,
- d2i_NOTICEREF,
- d2i_OCSP_BASICRESP,
- d2i_OCSP_CERTID,
- d2i_OCSP_CERTSTATUS,
- d2i_OCSP_CRLID,
- d2i_OCSP_ONEREQ,
- d2i_OCSP_REQINFO,
- d2i_OCSP_REQUEST,
- d2i_OCSP_RESPBYTES,
- d2i_OCSP_RESPDATA,
- d2i_OCSP_RESPID,
- d2i_OCSP_RESPONSE,
- d2i_OCSP_REVOKEDINFO,
- d2i_OCSP_SERVICELOC,
- d2i_OCSP_SIGNATURE,
- d2i_OCSP_SINGLERESP,
- d2i_OSSL_CMP_MSG,
- d2i_OSSL_CMP_PKIHEADER,
- d2i_OSSL_CMP_PKISI,
- d2i_OSSL_CRMF_CERTID,
- d2i_OSSL_CRMF_CERTTEMPLATE,
- d2i_OSSL_CRMF_ENCRYPTEDVALUE,
- d2i_OSSL_CRMF_MSG,
- d2i_OSSL_CRMF_MSGS,
- d2i_OSSL_CRMF_PBMPARAMETER,
- d2i_OSSL_CRMF_PKIPUBLICATIONINFO,
- d2i_OSSL_CRMF_SINGLEPUBINFO,
- d2i_OTHERNAME,
- d2i_PBE2PARAM,
- d2i_PBEPARAM,
- d2i_PBKDF2PARAM,
- d2i_PKCS12,
- d2i_PKCS12_BAGS,
- d2i_PKCS12_MAC_DATA,
- d2i_PKCS12_SAFEBAG,
- d2i_PKCS12_bio,
- d2i_PKCS12_fp,
- d2i_PKCS7,
- d2i_PKCS7_DIGEST,
- d2i_PKCS7_ENCRYPT,
- d2i_PKCS7_ENC_CONTENT,
- d2i_PKCS7_ENVELOPE,
- d2i_PKCS7_ISSUER_AND_SERIAL,
- d2i_PKCS7_RECIP_INFO,
- d2i_PKCS7_SIGNED,
- d2i_PKCS7_SIGNER_INFO,
- d2i_PKCS7_SIGN_ENVELOPE,
- d2i_PKCS7_bio,
- d2i_PKCS7_fp,
- d2i_PKCS8_PRIV_KEY_INFO,
- d2i_PKCS8_PRIV_KEY_INFO_bio,
- d2i_PKCS8_PRIV_KEY_INFO_fp,
- d2i_PKCS8_bio,
- d2i_PKCS8_fp,
- d2i_PKEY_USAGE_PERIOD,
- d2i_POLICYINFO,
- d2i_POLICYQUALINFO,
- d2i_PROFESSION_INFO,
- d2i_PROXY_CERT_INFO_EXTENSION,
- d2i_PROXY_POLICY,
- d2i_RSA_OAEP_PARAMS,
- d2i_RSA_PSS_PARAMS,
- d2i_SCRYPT_PARAMS,
- d2i_SCT_LIST,
- d2i_SXNET,
- d2i_SXNETID,
- d2i_TS_ACCURACY,
- d2i_TS_MSG_IMPRINT,
- d2i_TS_MSG_IMPRINT_bio,
- d2i_TS_MSG_IMPRINT_fp,
- d2i_TS_REQ,
- d2i_TS_REQ_bio,
- d2i_TS_REQ_fp,
- d2i_TS_RESP,
- d2i_TS_RESP_bio,
- d2i_TS_RESP_fp,
- d2i_TS_STATUS_INFO,
- d2i_TS_TST_INFO,
- d2i_TS_TST_INFO_bio,
- d2i_TS_TST_INFO_fp,
- d2i_USERNOTICE,
- d2i_X509,
- d2i_X509_bio,
- d2i_X509_fp,
- d2i_X509_ALGOR,
- d2i_X509_ALGORS,
- d2i_X509_ATTRIBUTE,
- d2i_X509_CERT_AUX,
- d2i_X509_CINF,
- d2i_X509_CRL,
- d2i_X509_CRL_INFO,
- d2i_X509_CRL_bio,
- d2i_X509_CRL_fp,
- d2i_X509_EXTENSION,
- d2i_X509_EXTENSIONS,
- d2i_X509_NAME,
- d2i_X509_NAME_ENTRY,
- d2i_X509_PUBKEY,
- d2i_X509_PUBKEY_bio,
- d2i_X509_PUBKEY_fp,
- d2i_X509_REQ,
- d2i_X509_REQ_INFO,
- d2i_X509_REQ_bio,
- d2i_X509_REQ_fp,
- d2i_X509_REVOKED,
- d2i_X509_SIG,
- d2i_X509_VAL,
- i2d_ACCESS_DESCRIPTION,
- i2d_ADMISSIONS,
- i2d_ADMISSION_SYNTAX,
- i2d_ASIdOrRange,
- i2d_ASIdentifierChoice,
- i2d_ASIdentifiers,
- i2d_ASN1_BIT_STRING,
- i2d_ASN1_BMPSTRING,
- i2d_ASN1_ENUMERATED,
- i2d_ASN1_GENERALIZEDTIME,
- i2d_ASN1_GENERALSTRING,
- i2d_ASN1_IA5STRING,
- i2d_ASN1_INTEGER,
- i2d_ASN1_NULL,
- i2d_ASN1_OBJECT,
- i2d_ASN1_OCTET_STRING,
- i2d_ASN1_PRINTABLE,
- i2d_ASN1_PRINTABLESTRING,
- i2d_ASN1_SEQUENCE_ANY,
- i2d_ASN1_SET_ANY,
- i2d_ASN1_T61STRING,
- i2d_ASN1_TIME,
- i2d_ASN1_TYPE,
- i2d_ASN1_UNIVERSALSTRING,
- i2d_ASN1_UTCTIME,
- i2d_ASN1_UTF8STRING,
- i2d_ASN1_VISIBLESTRING,
- i2d_ASN1_bio_stream,
- i2d_ASRange,
- i2d_AUTHORITY_INFO_ACCESS,
- i2d_AUTHORITY_KEYID,
- i2d_BASIC_CONSTRAINTS,
- i2d_CERTIFICATEPOLICIES,
- i2d_CMS_ContentInfo,
- i2d_CMS_ReceiptRequest,
- i2d_CMS_bio,
- i2d_CRL_DIST_POINTS,
- i2d_DHxparams,
- i2d_DIRECTORYSTRING,
- i2d_DISPLAYTEXT,
- i2d_DIST_POINT,
- i2d_DIST_POINT_NAME,
- i2d_DSA_SIG,
- i2d_ECDSA_SIG,
- i2d_EDIPARTYNAME,
- i2d_ESS_CERT_ID,
- i2d_ESS_CERT_ID_V2,
- i2d_ESS_ISSUER_SERIAL,
- i2d_ESS_SIGNING_CERT,
- i2d_ESS_SIGNING_CERT_V2,
- i2d_EXTENDED_KEY_USAGE,
- i2d_GENERAL_NAME,
- i2d_GENERAL_NAMES,
- i2d_IPAddressChoice,
- i2d_IPAddressFamily,
- i2d_IPAddressOrRange,
- i2d_IPAddressRange,
- i2d_ISSUER_SIGN_TOOL,
- i2d_ISSUING_DIST_POINT,
- i2d_NAMING_AUTHORITY,
- i2d_NETSCAPE_CERT_SEQUENCE,
- i2d_NETSCAPE_SPKAC,
- i2d_NETSCAPE_SPKI,
- i2d_NOTICEREF,
- i2d_OCSP_BASICRESP,
- i2d_OCSP_CERTID,
- i2d_OCSP_CERTSTATUS,
- i2d_OCSP_CRLID,
- i2d_OCSP_ONEREQ,
- i2d_OCSP_REQINFO,
- i2d_OCSP_REQUEST,
- i2d_OCSP_RESPBYTES,
- i2d_OCSP_RESPDATA,
- i2d_OCSP_RESPID,
- i2d_OCSP_RESPONSE,
- i2d_OCSP_REVOKEDINFO,
- i2d_OCSP_SERVICELOC,
- i2d_OCSP_SIGNATURE,
- i2d_OCSP_SINGLERESP,
- i2d_OSSL_CMP_MSG,
- i2d_OSSL_CMP_PKIHEADER,
- i2d_OSSL_CMP_PKISI,
- i2d_OSSL_CRMF_CERTID,
- i2d_OSSL_CRMF_CERTTEMPLATE,
- i2d_OSSL_CRMF_ENCRYPTEDVALUE,
- i2d_OSSL_CRMF_MSG,
- i2d_OSSL_CRMF_MSGS,
- i2d_OSSL_CRMF_PBMPARAMETER,
- i2d_OSSL_CRMF_PKIPUBLICATIONINFO,
- i2d_OSSL_CRMF_SINGLEPUBINFO,
- i2d_OTHERNAME,
- i2d_PBE2PARAM,
- i2d_PBEPARAM,
- i2d_PBKDF2PARAM,
- i2d_PKCS12,
- i2d_PKCS12_BAGS,
- i2d_PKCS12_MAC_DATA,
- i2d_PKCS12_SAFEBAG,
- i2d_PKCS12_bio,
- i2d_PKCS12_fp,
- i2d_PKCS7,
- i2d_PKCS7_DIGEST,
- i2d_PKCS7_ENCRYPT,
- i2d_PKCS7_ENC_CONTENT,
- i2d_PKCS7_ENVELOPE,
- i2d_PKCS7_ISSUER_AND_SERIAL,
- i2d_PKCS7_NDEF,
- i2d_PKCS7_RECIP_INFO,
- i2d_PKCS7_SIGNED,
- i2d_PKCS7_SIGNER_INFO,
- i2d_PKCS7_SIGN_ENVELOPE,
- i2d_PKCS7_bio,
- i2d_PKCS7_fp,
- i2d_PKCS8PrivateKeyInfo_bio,
- i2d_PKCS8PrivateKeyInfo_fp,
- i2d_PKCS8_PRIV_KEY_INFO,
- i2d_PKCS8_PRIV_KEY_INFO_bio,
- i2d_PKCS8_PRIV_KEY_INFO_fp,
- i2d_PKCS8_bio,
- i2d_PKCS8_fp,
- i2d_PKEY_USAGE_PERIOD,
- i2d_POLICYINFO,
- i2d_POLICYQUALINFO,
- i2d_PROFESSION_INFO,
- i2d_PROXY_CERT_INFO_EXTENSION,
- i2d_PROXY_POLICY,
- i2d_RSA_OAEP_PARAMS,
- i2d_RSA_PSS_PARAMS,
- i2d_SCRYPT_PARAMS,
- i2d_SCT_LIST,
- i2d_SXNET,
- i2d_SXNETID,
- i2d_TS_ACCURACY,
- i2d_TS_MSG_IMPRINT,
- i2d_TS_MSG_IMPRINT_bio,
- i2d_TS_MSG_IMPRINT_fp,
- i2d_TS_REQ,
- i2d_TS_REQ_bio,
- i2d_TS_REQ_fp,
- i2d_TS_RESP,
- i2d_TS_RESP_bio,
- i2d_TS_RESP_fp,
- i2d_TS_STATUS_INFO,
- i2d_TS_TST_INFO,
- i2d_TS_TST_INFO_bio,
- i2d_TS_TST_INFO_fp,
- i2d_USERNOTICE,
- i2d_X509,
- i2d_X509_bio,
- i2d_X509_fp,
- i2d_X509_ALGOR,
- i2d_X509_ALGORS,
- i2d_X509_ATTRIBUTE,
- i2d_X509_CERT_AUX,
- i2d_X509_CINF,
- i2d_X509_CRL,
- i2d_X509_CRL_INFO,
- i2d_X509_CRL_bio,
- i2d_X509_CRL_fp,
- i2d_X509_EXTENSION,
- i2d_X509_EXTENSIONS,
- i2d_X509_NAME,
- i2d_X509_NAME_ENTRY,
- i2d_X509_PUBKEY,
- i2d_X509_PUBKEY_bio,
- i2d_X509_PUBKEY_fp,
- i2d_X509_REQ,
- i2d_X509_REQ_INFO,
- i2d_X509_REQ_bio,
- i2d_X509_REQ_fp,
- i2d_X509_REVOKED,
- i2d_X509_SIG,
- i2d_X509_VAL,
- - convert objects from/to ASN.1/DER representation
- =head1 SYNOPSIS
- =for openssl generic
- TYPE *d2i_TYPE(TYPE **a, const unsigned char **ppin, long length);
- TYPE *d2i_TYPE_bio(BIO *bp, TYPE **a);
- TYPE *d2i_TYPE_fp(FILE *fp, TYPE **a);
- int i2d_TYPE(const TYPE *a, unsigned char **ppout);
- int i2d_TYPE(TYPE *a, unsigned char **ppout);
- int i2d_TYPE_fp(FILE *fp, const TYPE *a);
- int i2d_TYPE_fp(FILE *fp, TYPE *a);
- int i2d_TYPE_bio(BIO *bp, const TYPE *a);
- int i2d_TYPE_bio(BIO *bp, TYPE *a);
- =head1 DESCRIPTION
- In the description here, B<I<TYPE>> is used a placeholder
- for any of the OpenSSL datatypes, such as B<X509_CRL>.
- The function parameters I<ppin> and I<ppout> are generally
- either both named I<pp> in the headers, or I<in> and I<out>.
- These functions convert OpenSSL objects to and from their ASN.1/DER
- encoding. Unlike the C structures which can have pointers to sub-objects
- within, the DER is a serialized encoding, suitable for sending over the
- network, writing to a file, and so on.
- B<d2i_I<TYPE>>() attempts to decode I<len> bytes at I<*ppin>. If successful a
- pointer to the B<I<TYPE>> structure is returned and I<*ppin> is incremented to
- the byte following the parsed data. If I<a> is not NULL then a pointer
- to the returned structure is also written to I<*a>. If an error occurred
- then NULL is returned.
- On a successful return, if I<*a> is not NULL then it is assumed that I<*a>
- contains a valid B<I<TYPE>> structure and an attempt is made to reuse it. This
- "reuse" capability is present for historical compatibility but its use is
- B<strongly discouraged> (see BUGS below, and the discussion in the RETURN
- VALUES section).
- B<d2i_I<TYPE>_bio>() is similar to B<d2i_I<TYPE>>() except it attempts
- to parse data from BIO I<bp>.
- B<d2i_I<TYPE>_fp>() is similar to B<d2i_I<TYPE>>() except it attempts
- to parse data from FILE pointer I<fp>.
- B<i2d_I<TYPE>>() encodes the structure pointed to by I<a> into DER format.
- If I<ppout> is not NULL, it writes the DER encoded data to the buffer
- at I<*ppout>, and increments it to point after the data just written.
- If the return value is negative an error occurred, otherwise it
- returns the length of the encoded data.
- If I<*ppout> is NULL memory will be allocated for a buffer and the encoded
- data written to it. In this case I<*ppout> is not incremented and it points
- to the start of the data just written.
- B<i2d_I<TYPE>_bio>() is similar to B<i2d_I<TYPE>>() except it writes
- the encoding of the structure I<a> to BIO I<bp> and it
- returns 1 for success and 0 for failure.
- B<i2d_I<TYPE>_fp>() is similar to B<i2d_I<TYPE>>() except it writes
- the encoding of the structure I<a> to FILE pointer I<fp> and it
- returns 1 for success and 0 for failure.
- These routines do not encrypt private keys and therefore offer no
- security; use L<PEM_write_PrivateKey(3)> or similar for writing to files.
- =head1 NOTES
- The letters B<i> and B<d> in B<i2d_I<TYPE>>() stand for
- "internal" (that is, an internal C structure) and "DER" respectively.
- So B<i2d_I<TYPE>>() converts from internal to DER.
- The functions can also understand B<BER> forms.
- The actual TYPE structure passed to B<i2d_I<TYPE>>() must be a valid
- populated B<I<TYPE>> structure -- it B<cannot> simply be fed with an
- empty structure such as that returned by TYPE_new().
- The encoded data is in binary form and may contain embedded zeros.
- Therefore, any FILE pointers or BIOs should be opened in binary mode.
- Functions such as strlen() will B<not> return the correct length
- of the encoded structure.
- The ways that I<*ppin> and I<*ppout> are incremented after the operation
- can trap the unwary. See the B<WARNINGS> section for some common
- errors.
- The reason for this-auto increment behaviour is to reflect a typical
- usage of ASN1 functions: after one structure is encoded or decoded
- another will be processed after it.
- The following points about the data types might be useful:
- =over 4
- =item B<ASN1_OBJECT>
- Represents an ASN1 OBJECT IDENTIFIER.
- =item B<DHparams>
- Represents a PKCS#3 DH parameters structure.
- =item B<DHxparams>
- Represents an ANSI X9.42 DH parameters structure.
- =item B<ECDSA_SIG>
- Represents an ECDSA signature.
- =item B<X509_ALGOR>
- Represents an B<AlgorithmIdentifier> structure as used in IETF RFC 6960 and
- elsewhere.
- =item B<X509_Name>
- Represents a B<Name> type as used for subject and issuer names in
- IETF RFC 6960 and elsewhere.
- =item B<X509_REQ>
- Represents a PKCS#10 certificate request.
- =item B<X509_SIG>
- Represents the B<DigestInfo> structure defined in PKCS#1 and PKCS#7.
- =back
- =head1 RETURN VALUES
- B<d2i_I<TYPE>>(), B<d2i_I<TYPE>_bio>() and B<d2i_I<TYPE>_fp>() return a valid
- B<I<TYPE>> structure or NULL if an error occurs. If the "reuse" capability has
- been used with a valid structure being passed in via I<a>, then the object is
- freed in the event of error and I<*a> is set to NULL.
- B<i2d_I<TYPE>>() returns the number of bytes successfully encoded or a negative
- value if an error occurs.
- B<i2d_I<TYPE>_bio>() and B<i2d_I<TYPE>_fp>() return 1 for success and 0 if an
- error occurs.
- =head1 EXAMPLES
- Allocate and encode the DER encoding of an X509 structure:
- int len;
- unsigned char *buf;
- buf = NULL;
- len = i2d_X509(x, &buf);
- if (len < 0)
- /* error */
- Attempt to decode a buffer:
- X509 *x;
- unsigned char *buf;
- const unsigned char *p;
- int len;
- /* Set up buf and len to point to the input buffer. */
- p = buf;
- x = d2i_X509(NULL, &p, len);
- if (x == NULL)
- /* error */
- Alternative technique:
- X509 *x;
- unsigned char *buf;
- const unsigned char *p;
- int len;
- /* Set up buf and len to point to the input buffer. */
- p = buf;
- x = NULL;
- if (d2i_X509(&x, &p, len) == NULL)
- /* error */
- =head1 WARNINGS
- Using a temporary variable is mandatory. A common
- mistake is to attempt to use a buffer directly as follows:
- int len;
- unsigned char *buf;
- len = i2d_X509(x, NULL);
- buf = OPENSSL_malloc(len);
- ...
- i2d_X509(x, &buf);
- ...
- OPENSSL_free(buf);
- This code will result in I<buf> apparently containing garbage because
- it was incremented after the call to point after the data just written.
- Also I<buf> will no longer contain the pointer allocated by OPENSSL_malloc()
- and the subsequent call to OPENSSL_free() is likely to crash.
- Another trap to avoid is misuse of the I<a> argument to B<d2i_I<TYPE>>():
- X509 *x;
- if (d2i_X509(&x, &p, len) == NULL)
- /* error */
- This will probably crash somewhere in d2i_X509(). The reason for this
- is that the variable I<x> is uninitialized and an attempt will be made to
- interpret its (invalid) value as an B<X509> structure, typically causing
- a segmentation violation. If I<x> is set to NULL first then this will not
- happen.
- =head1 BUGS
- In some versions of OpenSSL the "reuse" behaviour of B<d2i_I<TYPE>>() when
- I<*a> is valid is broken and some parts of the reused structure may
- persist if they are not present in the new one. Additionally, in versions of
- OpenSSL prior to 1.1.0, when the "reuse" behaviour is used and an error occurs
- the behaviour is inconsistent. Some functions behaved as described here, while
- some did not free I<*a> on error and did not set I<*a> to NULL.
- As a result of the above issues the "reuse" behaviour is strongly discouraged.
- B<i2d_I<TYPE>>() will not return an error in many versions of OpenSSL,
- if mandatory fields are not initialized due to a programming error
- then the encoded structure may contain invalid data or omit the
- fields entirely and will not be parsed by B<d2i_I<TYPE>>(). This may be
- fixed in future so code should not assume that B<i2d_I<TYPE>>() will
- always succeed.
- Any function which encodes a structure (B<i2d_I<TYPE>>(),
- B<i2d_I<TYPE>>() or B<i2d_I<TYPE>>()) may return a stale encoding if the
- structure has been modified after deserialization or previous
- serialization. This is because some objects cache the encoding for
- efficiency reasons.
- =head1 COPYRIGHT
- Copyright 1998-2021 The OpenSSL Project Authors. All Rights Reserved.
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- L<https://www.openssl.org/source/license.html>.
- =cut
|