aboutsummaryrefslogtreecommitdiffstats
path: root/FAQ
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2004-03-02 13:39:23 +0000
committerDr. Stephen Henson <steve@openssl.org>2004-03-02 13:39:23 +0000
commitec7c9ee8b8715f60c5f1f315ce2f8a5022a01473 (patch)
tree65c1db32dcccd5589ec1dc140472b4c7e9e3f603 /FAQ
parentf82bb9cb9c50a9b998143218a88d2a5b53b70be6 (diff)
downloadopenssl-ec7c9ee8b8715f60c5f1f315ce2f8a5022a01473.tar.gz
Indent some of the code examples.
Diffstat (limited to 'FAQ')
-rw-r--r--FAQ22
1 files changed, 11 insertions, 11 deletions
diff --git a/FAQ b/FAQ
index ca5683def7..bd40bcd243 100644
--- a/FAQ
+++ b/FAQ
@@ -646,26 +646,26 @@ built OpenSSL with /MD your application must use /MD and cannot use /MDd.
* How do I read or write a DER encoded buffer using the ASN1 functions?
You have two options. You can either use a memory BIO in conjunction
-with the i2d_XXX_bio() or d2i_XXX_bio() functions or you can use the
-i2d_XXX(), d2i_XXX() functions directly. Since these are often the
+with the i2d_*_bio() or d2i_*_bio() functions or you can use the
+i2d_*(), d2i_*() functions directly. Since these are often the
cause of grief here are some code fragments using PKCS7 as an example:
-unsigned char *buf, *p;
-int len;
+ unsigned char *buf, *p;
+ int len;
-len = i2d_PKCS7(p7, NULL);
-buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
-p = buf;
-i2d_PKCS7(p7, &p);
+ len = i2d_PKCS7(p7, NULL);
+ buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
+ p = buf;
+ i2d_PKCS7(p7, &p);
At this point buf contains the len bytes of the DER encoding of
p7.
The opposite assumes we already have len bytes in buf:
-unsigned char *p;
-p = buf;
-p7 = d2i_PKCS7(NULL, &p, len);
+ unsigned char *p;
+ p = buf;
+ p7 = d2i_PKCS7(NULL, &p, len);
At this point p7 contains a valid PKCS7 structure of NULL if an error
occurred. If an error occurred ERR_print_errors(bio) should give more