Deleted Added
full compact
d2i_SSL_SESSION.pod (76866) d2i_SSL_SESSION.pod (89837)
1=pod
2
3=head1 NAME
4
5d2i_SSL_SESSION, i2d_SSL_SESSION - convert SSL_SESSION object from/to ASN1 representation
6
7=head1 SYNOPSIS
8

--- 16 unchanged lines hidden (view full) ---

25=head1 NOTES
26
27The SSL_SESSION object is built from several malloc()ed parts, it can
28therefore not be moved, copied or stored directly. In order to store
29session data on disk or into a database, it must be transformed into
30a binary ASN1 representation.
31
32When using d2i_SSL_SESSION(), the SSL_SESSION object is automatically
1=pod
2
3=head1 NAME
4
5d2i_SSL_SESSION, i2d_SSL_SESSION - convert SSL_SESSION object from/to ASN1 representation
6
7=head1 SYNOPSIS
8

--- 16 unchanged lines hidden (view full) ---

25=head1 NOTES
26
27The SSL_SESSION object is built from several malloc()ed parts, it can
28therefore not be moved, copied or stored directly. In order to store
29session data on disk or into a database, it must be transformed into
30a binary ASN1 representation.
31
32When using d2i_SSL_SESSION(), the SSL_SESSION object is automatically
33allocated.
33allocated. The reference count is 1, so that the session must be
34explicitly removed using L<SSL_SESSION_free(3)|SSL_SESSION_free(3)>,
35unless the SSL_SESSION object is completely taken over, when being called
36inside the get_session_cb() (see
37L<SSL_CTX_sess_set_get_cb(3)|SSL_CTX_sess_set_get_cb(3)>).
34
38
39SSL_SESSION objects keep internal link information about the session cache
40list, when being inserted into one SSL_CTX object's session cache.
41One SSL_SESSION object, regardless of its reference count, must therefore
42only be used with one SSL_CTX object (and the SSL objects created
43from this SSL_CTX object).
44
35When using i2d_SSL_SESSION(), the memory location pointed to by B<pp> must be
36large enough to hold the binary representation of the session. There is no
37known limit on the size of the created ASN1 representation, so the necessary
38amount of space should be obtained by first calling i2d_SSL_SESSION() with
39B<pp=NULL>, and obtain the size needed, then allocate the memory and
40call i2d_SSL_SESSION() again.
41
42=head1 RETURN VALUES
43
44d2i_SSL_SESSION() returns a pointer to the newly allocated SSL_SESSION
45object. In case of failure the NULL-pointer is returned and the error message
46can be retrieved from the error stack.
47
48i2d_SSL_SESSION() returns the size of the ASN1 representation in bytes.
49When the session is not valid, B<0> is returned and no operation is performed.
50
51=head1 SEE ALSO
52
45When using i2d_SSL_SESSION(), the memory location pointed to by B<pp> must be
46large enough to hold the binary representation of the session. There is no
47known limit on the size of the created ASN1 representation, so the necessary
48amount of space should be obtained by first calling i2d_SSL_SESSION() with
49B<pp=NULL>, and obtain the size needed, then allocate the memory and
50call i2d_SSL_SESSION() again.
51
52=head1 RETURN VALUES
53
54d2i_SSL_SESSION() returns a pointer to the newly allocated SSL_SESSION
55object. In case of failure the NULL-pointer is returned and the error message
56can be retrieved from the error stack.
57
58i2d_SSL_SESSION() returns the size of the ASN1 representation in bytes.
59When the session is not valid, B<0> is returned and no operation is performed.
60
61=head1 SEE ALSO
62
53L,
63L<ssl(3)|ssl(3)>, L<SSL_SESSION_free(3)|SSL_SESSION_free(3)>,
54L<SSL_CTX_sess_set_get_cb(3)|SSL_CTX_sess_set_get_cb(3)>
55
56=cut
64L<SSL_CTX_sess_set_get_cb(3)|SSL_CTX_sess_set_get_cb(3)>
65
66=cut