/openssl/crypto/pem/ |
H A D | pem_info.c | 66 d2i_of_void *d2i = 0; in STACK_OF() local 105 d2i = (D2I_OF(void)) d2i_X509_AUX; in STACK_OF() 107 d2i = (D2I_OF(void)) d2i_X509; in STACK_OF() 113 d2i = (D2I_OF(void)) d2i_X509_CRL; in STACK_OF() 140 d2i = (D2I_OF(void)) d2i_AutoPrivateKey; in STACK_OF() 149 d2i = NULL; in STACK_OF() 153 if (d2i != NULL) { in STACK_OF() 168 } else if (d2i(pp, &p, len) == NULL) { in STACK_OF()
|
H A D | pem_oth.c | 20 void *PEM_ASN1_read_bio(d2i_of_void *d2i, const char *name, BIO *bp, void **x, in PEM_ASN1_read_bio() argument 31 ret = d2i(x, &p, len); in PEM_ASN1_read_bio()
|
H A D | pem_lib.c | 109 void *PEM_ASN1_read(d2i_of_void *d2i, const char *name, FILE *fp, void **x, in PEM_ASN1_read() argument 120 ret = PEM_ASN1_read_bio(d2i, name, b, x, cb, u); in PEM_ASN1_read()
|
/openssl/crypto/asn1/ |
H A D | a_d2i_fp.c | 22 void *ASN1_d2i_fp(void *(*xnew) (void), d2i_of_void *d2i, FILE *in, void **x) in ASN1_d2i_fp() argument 32 ret = ASN1_d2i_bio(xnew, d2i, b, x); in ASN1_d2i_fp() 38 void *ASN1_d2i_bio(void *(*xnew) (void), d2i_of_void *d2i, BIO *in, void **x) in ASN1_d2i_bio() argument 50 ret = d2i(x, &p, len); in ASN1_d2i_bio()
|
H A D | a_dup.c | 16 void *ASN1_dup(i2d_of_void *i2d, d2i_of_void *d2i, const void *x) in ASN1_dup() argument 38 ret = d2i(NULL, &p2, i); in ASN1_dup()
|
/openssl/test/ |
H A D | x509aux.c | 39 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs() local 55 cert = d2i(NULL, &p, len); in test_certs() 95 reuse = d2i(NULL, &p, enclen); in test_certs()
|
H A D | endecoder_legacy_test.c | 434 const void *legacy_key, i2d_of_void *i2d, d2i_of_void *d2i, in test_DER() argument 465 if (d2i != NULL) { in test_DER() 479 decoded_legacy_key = d2i(NULL, &pder_legacy, in test_DER()
|
H A D | asn1_encode_test.c | 167 d2i_fn *d2i; member 493 enctst = package->d2i(NULL, &bytes, nbytes); in do_decode()
|
/openssl/fuzz/corpora/conf/ |
H A D | 693dc8f5384fe4d89d2b8599757233d01480667f | 1 .include d2i
|
/openssl/include/openssl/ |
H A D | asn1.h.in | 310 # define CHECKED_D2I_OF(type, d2i) \ argument 311 ((d2i_of_void*) (1 ? d2i : ((D2I_OF(type))0))) 740 void *ASN1_dup(i2d_of_void *i2d, d2i_of_void *d2i, const void *x); 742 # define ASN1_dup_of(type,i2d,d2i,x) \ argument 744 CHECKED_D2I_OF(type, d2i), \ 765 void *ASN1_d2i_fp(void *(*xnew) (void), d2i_of_void *d2i, FILE *in, void **x); 767 # define ASN1_d2i_fp_of(type,xnew,d2i,in,x) \ argument 769 CHECKED_D2I_OF(type, d2i), \ 791 # define ASN1_d2i_bio_of(type,xnew,d2i,in,x) \ argument 793 CHECKED_D2I_OF(type, d2i), \ [all …]
|
H A D | pem.h | 392 void *PEM_ASN1_read_bio(d2i_of_void *d2i, const char *name, BIO *bp, void **x, 415 void *PEM_ASN1_read(d2i_of_void *d2i, const char *name, FILE *fp, void **x,
|
H A D | asn1t.h.in | 63 * The EXTERN type uses a new style d2i/i2d. 65 * because it avoids things like the d2i IMPLICIT
|
H A D | x509v3.h.in | 72 X509V3_EXT_D2I d2i; member
|
/openssl/doc/man3/ |
H A D | o2i_SCT_LIST.pod | 20 The SCT_LIST and SCT functions are very similar to the i2d and d2i family of
|
H A D | ASN1_item_sign.pod | 129 /* new, free, d2i & i2d functions for MySignInfoObject */ 139 /* new, free, d2i & i2d functions for MyObject */
|
H A D | ASN1_aux_cb.pod | 144 immediately before a "d2i" operation for the B<ASN1_VALUE>. 149 immediately after a "d2i" operation for the B<ASN1_VALUE>.
|
H A D | d2i_RSAPrivateKey.pod | 5 Any deprecated keypair/params d2i or i2d functions are collected on this page. 118 instead of the B<d2i> functions and L<OSSL_ENCODER(3)> instead of the B<i2d>
|
H A D | d2i_PrivateKey.pod | 90 after a successful operation, just like the other d2i and i2d functions;
|
H A D | PEM_read.pod | 51 the B<d2i> function appropriate to the type B<name>; see L<d2i_X509(3)>
|
H A D | ASN1_EXTERN_FUNCS.pod | 93 A "d2i" function responsible for converting DER data with the tag I<tag> and
|
/openssl/crypto/x509/ |
H A D | v3_lib.c | 143 return method->d2i(NULL, &p, extlen); in X509V3_EXT_d2i()
|
H A D | v3_prn.c | 91 ext_str = method->d2i(NULL, &p, extlen); in X509V3_EXT_print()
|
/openssl/doc/internal/man7/ |
H A D | DERlib.pod | 10 as an alternative to the publicly known i2d and d2i functions. It's
|
/openssl/doc/man7/ |
H A D | migration_guide.pod | 989 =head4 Deprecated i2d and d2i functions for low-level key types 991 Any i2d and d2i functions such as d2i_DHparams() that take a low-level key type 1279 See L</Deprecated i2d and d2i functions for low-level key types>
|
/openssl/ |
H A D | CHANGES.md | 1272 and d2i functions do, but with support for methods supplied by 1938 OpenSSL's own "d2i" functions (and other similar parsing functions) as 5394 Any application parsing untrusted data through d2i BIO functions is 6596 Any application parsing untrusted data through d2i BIO functions is 9747 * Add compression id to {d2i,i2d}_SSL_SESSION so it is correctly saved 10801 * Constify all or almost all d2i, c2i, s2i and r2i functions, along with 13839 the ASN1 module. Compatibility with the existing ASN1 API (i2d,d2i) is 16555 things. Some of these need some d2i or i2d and print functionality 16735 * Add d2i,i2d bio/fp functions for PrivateKey: these convert the 18965 * Beginning of support for GeneralizedTime. d2i, i2d, check and print
|