#include <openssl/x509.h> X509 *d2i_X509_AUX(X509 **px, const unsigned char **in, long len); int i2d_X509_AUX(X509 *x, unsigned char **out); int i2d_re_X509_tbs(X509 *x, unsigned char **out); int i2d_re_X509_CRL_tbs(X509_CRL *crl, unsigned char **pp); int i2d_re_X509_REQ_tbs(X509_REQ *req, unsigned char **pp);
d2i_X509_AUX() is similar to d2i_X509(3) but the input is expected to consist of an X509 certificate followed by auxiliary trust information. This is used by the PEM routines to read ``TRUSTED CERTIFICATE'' objects. This function should not be called on untrusted input.
i2d_X509_AUX() is similar to i2d_X509(3), but the encoded output contains both the certificate and any auxiliary trust information. This is used by the PEM routines to write ``TRUSTED CERTIFICATE'' objects. Note that this is a non-standard OpenSSL-specific data format.
i2d_re_X509_tbs() is similar to i2d_X509(3) except it encodes only the TBSCertificate portion of the certificate. i2d_re_X509_CRL_tbs() and i2d_re_X509_REQ_tbs() are analogous for CRL and certificate request, respectively. The ``re'' in i2d_re_X509_tbs stands for ``re-encode'', and ensures that a fresh encoding is generated in case the object has been modified after creation (see the BUGS section).
The encoding of the TBSCertificate portion of a certificate is cached in the X509 structure internally to improve encoding performance and to ensure certificate signatures are verified correctly in some certificates with broken (non-DER) encodings.
If, after modification, the X509 object is re-signed with X509_sign(), the encoding is automatically renewed. Otherwise, the encoding of the TBSCertificate portion of the X509 can be manually renewed by calling i2d_re_X509_tbs().
i2d_X509_AUX() returns the length of encoded data or -1 on error.
Licensed under the OpenSSL license (the ``License''). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.