Lines Matching refs:I
422 In the description here, B<I<TYPE>> is used a placeholder
424 The function parameters I<ppin> and I<ppout> are generally
425 either both named I<pp> in the headers, or I<in> and I<out>.
432 B<d2i_I<TYPE>>() attempts to decode I<len> bytes at I<*ppin>. If successful a
433 pointer to the B<I<TYPE>> structure is returned and I<*ppin> is incremented to
434 the byte following the parsed data. If I<a> is not NULL then a pointer
435 to the returned structure is also written to I<*a>. If an error occurred
440 On a successful return, if I<*a> is not NULL then it is assumed that I<*a>
441 contains a valid B<I<TYPE>> structure and an attempt is made to reuse it.
442 For B<I<TYPE>> structures where it matters it is possible to set up a library
449 to parse data from BIO I<bp>.
452 to parse data from FILE pointer I<fp>.
454 B<i2d_I<TYPE>>() encodes the structure pointed to by I<a> into DER format.
455 If I<ppout> is not NULL, it writes the DER encoded data to the buffer
456 at I<*ppout>, and increments it to point after the data just written.
460 If I<*ppout> is NULL memory will be allocated for a buffer and the encoded
461 data written to it. In this case I<*ppout> is not incremented and it points
465 the encoding of the structure I<a> to BIO I<bp> and it
469 the encoding of the structure I<a> to FILE pointer I<fp> and it
484 populated B<I<TYPE>> structure -- it B<cannot> simply be fed with an
492 The ways that I<*ppin> and I<*ppout> are incremented after the operation
542 B<I<TYPE>> structure or NULL if an error occurs. If the "reuse" capability has
543 been used with a valid structure being passed in via I<a>, then the object is
544 freed in the event of error and I<*a> is set to NULL.
622 This code will result in I<buf> apparently containing garbage because
624 Also I<buf> will no longer contain the pointer allocated by OPENSSL_malloc()
627 Another trap to avoid is misuse of the I<a> argument to B<d2i_I<TYPE>>():
635 is that the variable I<x> is uninitialized and an attempt will be made to
637 a segmentation violation. If I<x> is set to NULL first then this will not
643 I<*a> is valid is broken and some parts of the reused structure may
647 some did not free I<*a> on error and did not set I<*a> to NULL.