|  | =pod | 
|  |  | 
|  | =head1 NAME | 
|  |  | 
|  | EVP_PKEY_ASN1_METHOD, | 
|  | EVP_PKEY_asn1_new, | 
|  | EVP_PKEY_asn1_copy, | 
|  | EVP_PKEY_asn1_free, | 
|  | EVP_PKEY_asn1_add0, | 
|  | EVP_PKEY_asn1_add_alias, | 
|  | EVP_PKEY_asn1_set_public, | 
|  | EVP_PKEY_asn1_set_private, | 
|  | EVP_PKEY_asn1_set_param, | 
|  | EVP_PKEY_asn1_set_free, | 
|  | EVP_PKEY_asn1_set_ctrl, | 
|  | EVP_PKEY_asn1_set_item, | 
|  | EVP_PKEY_asn1_set_siginf, | 
|  | EVP_PKEY_asn1_set_check, | 
|  | EVP_PKEY_asn1_set_public_check, | 
|  | EVP_PKEY_asn1_set_param_check, | 
|  | EVP_PKEY_asn1_set_security_bits, | 
|  | EVP_PKEY_asn1_set_set_priv_key, | 
|  | EVP_PKEY_asn1_set_set_pub_key, | 
|  | EVP_PKEY_asn1_set_get_priv_key, | 
|  | EVP_PKEY_asn1_set_get_pub_key, | 
|  | EVP_PKEY_get0_asn1 | 
|  | - manipulating and registering EVP_PKEY_ASN1_METHOD structure | 
|  |  | 
|  | =head1 SYNOPSIS | 
|  |  | 
|  | #include <openssl/evp.h> | 
|  |  | 
|  | typedef struct evp_pkey_asn1_method_st EVP_PKEY_ASN1_METHOD; | 
|  |  | 
|  | EVP_PKEY_ASN1_METHOD *EVP_PKEY_asn1_new(int id, int flags, | 
|  | const char *pem_str, | 
|  | const char *info); | 
|  | void EVP_PKEY_asn1_copy(EVP_PKEY_ASN1_METHOD *dst, | 
|  | const EVP_PKEY_ASN1_METHOD *src); | 
|  | void EVP_PKEY_asn1_free(EVP_PKEY_ASN1_METHOD *ameth); | 
|  | int EVP_PKEY_asn1_add0(const EVP_PKEY_ASN1_METHOD *ameth); | 
|  | int EVP_PKEY_asn1_add_alias(int to, int from); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_public(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*pub_decode) (EVP_PKEY *pk, | 
|  | const X509_PUBKEY *pub), | 
|  | int (*pub_encode) (X509_PUBKEY *pub, | 
|  | const EVP_PKEY *pk), | 
|  | int (*pub_cmp) (const EVP_PKEY *a, | 
|  | const EVP_PKEY *b), | 
|  | int (*pub_print) (BIO *out, | 
|  | const EVP_PKEY *pkey, | 
|  | int indent, ASN1_PCTX *pctx), | 
|  | int (*pkey_size) (const EVP_PKEY *pk), | 
|  | int (*pkey_bits) (const EVP_PKEY *pk)); | 
|  | void EVP_PKEY_asn1_set_private(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*priv_decode) (EVP_PKEY *pk, | 
|  | const PKCS8_PRIV_KEY_INFO | 
|  | *p8inf), | 
|  | int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, | 
|  | const EVP_PKEY *pk), | 
|  | int (*priv_print) (BIO *out, | 
|  | const EVP_PKEY *pkey, | 
|  | int indent, | 
|  | ASN1_PCTX *pctx)); | 
|  | void EVP_PKEY_asn1_set_param(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*param_decode) (EVP_PKEY *pkey, | 
|  | const unsigned char **pder, | 
|  | int derlen), | 
|  | int (*param_encode) (const EVP_PKEY *pkey, | 
|  | unsigned char **pder), | 
|  | int (*param_missing) (const EVP_PKEY *pk), | 
|  | int (*param_copy) (EVP_PKEY *to, | 
|  | const EVP_PKEY *from), | 
|  | int (*param_cmp) (const EVP_PKEY *a, | 
|  | const EVP_PKEY *b), | 
|  | int (*param_print) (BIO *out, | 
|  | const EVP_PKEY *pkey, | 
|  | int indent, | 
|  | ASN1_PCTX *pctx)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_free(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | void (*pkey_free) (EVP_PKEY *pkey)); | 
|  | void EVP_PKEY_asn1_set_ctrl(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*pkey_ctrl) (EVP_PKEY *pkey, int op, | 
|  | long arg1, void *arg2)); | 
|  | void EVP_PKEY_asn1_set_item(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*item_verify) (EVP_MD_CTX *ctx, | 
|  | const ASN1_ITEM *it, | 
|  | void *asn, | 
|  | X509_ALGOR *a, | 
|  | ASN1_BIT_STRING *sig, | 
|  | EVP_PKEY *pkey), | 
|  | int (*item_sign) (EVP_MD_CTX *ctx, | 
|  | const ASN1_ITEM *it, | 
|  | void *asn, | 
|  | X509_ALGOR *alg1, | 
|  | X509_ALGOR *alg2, | 
|  | ASN1_BIT_STRING *sig)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_siginf(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*siginf_set) (X509_SIG_INFO *siginf, | 
|  | const X509_ALGOR *alg, | 
|  | const ASN1_STRING *sig)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_check(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*pkey_check) (const EVP_PKEY *pk)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_public_check(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*pkey_pub_check) (const EVP_PKEY *pk)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_param_check(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*pkey_param_check) (const EVP_PKEY *pk)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_security_bits(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*pkey_security_bits) (const EVP_PKEY | 
|  | *pk)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_set_priv_key(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*set_priv_key) (EVP_PKEY *pk, | 
|  | const unsigned char | 
|  | *priv, | 
|  | size_t len)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_set_pub_key(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*set_pub_key) (EVP_PKEY *pk, | 
|  | const unsigned char *pub, | 
|  | size_t len)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_get_priv_key(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*get_priv_key) (const EVP_PKEY *pk, | 
|  | unsigned char *priv, | 
|  | size_t *len)); | 
|  |  | 
|  | void EVP_PKEY_asn1_set_get_pub_key(EVP_PKEY_ASN1_METHOD *ameth, | 
|  | int (*get_pub_key) (const EVP_PKEY *pk, | 
|  | unsigned char *pub, | 
|  | size_t *len)); | 
|  |  | 
|  | const EVP_PKEY_ASN1_METHOD *EVP_PKEY_get0_asn1(const EVP_PKEY *pkey); | 
|  |  | 
|  | =head1 DESCRIPTION | 
|  |  | 
|  | B<EVP_PKEY_ASN1_METHOD> is a structure which holds a set of ASN.1 | 
|  | conversion, printing and information methods for a specific public key | 
|  | algorithm. | 
|  |  | 
|  | There are two places where the B<EVP_PKEY_ASN1_METHOD> objects are | 
|  | stored: one is a built-in array representing the standard methods for | 
|  | different algorithms, and the other one is a stack of user-defined | 
|  | application-specific methods, which can be manipulated by using | 
|  | L<EVP_PKEY_asn1_add0(3)>. | 
|  |  | 
|  | =head2 Methods | 
|  |  | 
|  | The methods are the underlying implementations of a particular public | 
|  | key algorithm present by the B<EVP_PKEY> object. | 
|  |  | 
|  | int (*pub_decode) (EVP_PKEY *pk, const X509_PUBKEY *pub); | 
|  | int (*pub_encode) (X509_PUBKEY *pub, const EVP_PKEY *pk); | 
|  | int (*pub_cmp) (const EVP_PKEY *a, const EVP_PKEY *b); | 
|  | int (*pub_print) (BIO *out, const EVP_PKEY *pkey, int indent, | 
|  | ASN1_PCTX *pctx); | 
|  |  | 
|  | The pub_decode() and pub_encode() methods are called to decode / | 
|  | encode B<X509_PUBKEY> ASN.1 parameters to / from B<pk>. | 
|  | They MUST return 0 on error, 1 on success. | 
|  | They're called by L<X509_PUBKEY_get0(3)> and L<X509_PUBKEY_set(3)>. | 
|  |  | 
|  | The pub_cmp() method is called when two public keys are to be | 
|  | compared. | 
|  | It MUST return 1 when the keys are equal, 0 otherwise. | 
|  | It's called by L<EVP_PKEY_eq(3)>. | 
|  |  | 
|  | The pub_print() method is called to print a public key in humanly | 
|  | readable text to B<out>, indented B<indent> spaces. | 
|  | It MUST return 0 on error, 1 on success. | 
|  | It's called by L<EVP_PKEY_print_public(3)>. | 
|  |  | 
|  | int (*priv_decode) (EVP_PKEY *pk, const PKCS8_PRIV_KEY_INFO *p8inf); | 
|  | int (*priv_encode) (PKCS8_PRIV_KEY_INFO *p8, const EVP_PKEY *pk); | 
|  | int (*priv_print) (BIO *out, const EVP_PKEY *pkey, int indent, | 
|  | ASN1_PCTX *pctx); | 
|  |  | 
|  | The priv_decode() and priv_encode() methods are called to decode / | 
|  | encode B<PKCS8_PRIV_KEY_INFO> form private key to / from B<pk>. | 
|  | They MUST return 0 on error, 1 on success. | 
|  | They're called by L<EVP_PKCS82PKEY(3)> and L<EVP_PKEY2PKCS8(3)>. | 
|  |  | 
|  | The priv_print() method is called to print a private key in humanly | 
|  | readable text to B<out>, indented B<indent> spaces. | 
|  | It MUST return 0 on error, 1 on success. | 
|  | It's called by L<EVP_PKEY_print_private(3)>. | 
|  |  | 
|  | int (*pkey_size) (const EVP_PKEY *pk); | 
|  | int (*pkey_bits) (const EVP_PKEY *pk); | 
|  | int (*pkey_security_bits) (const EVP_PKEY *pk); | 
|  |  | 
|  | The pkey_size() method returns the key size in bytes. | 
|  | It's called by L<EVP_PKEY_get_size(3)>. | 
|  |  | 
|  | The pkey_bits() method returns the key size in bits. | 
|  | It's called by L<EVP_PKEY_get_bits(3)>. | 
|  |  | 
|  | int (*param_decode) (EVP_PKEY *pkey, | 
|  | const unsigned char **pder, int derlen); | 
|  | int (*param_encode) (const EVP_PKEY *pkey, unsigned char **pder); | 
|  | int (*param_missing) (const EVP_PKEY *pk); | 
|  | int (*param_copy) (EVP_PKEY *to, const EVP_PKEY *from); | 
|  | int (*param_cmp) (const EVP_PKEY *a, const EVP_PKEY *b); | 
|  | int (*param_print) (BIO *out, const EVP_PKEY *pkey, int indent, | 
|  | ASN1_PCTX *pctx); | 
|  |  | 
|  | The param_decode() and param_encode() methods are called to decode / | 
|  | encode DER formatted parameters to / from B<pk>. | 
|  | They MUST return 0 on error, 1 on success. | 
|  | They're called by L<PEM_read_bio_Parameters(3)> and the B<file:> | 
|  | L<OSSL_STORE_LOADER(3)>. | 
|  |  | 
|  | The param_missing() method returns 0 if a key parameter is missing, | 
|  | otherwise 1. | 
|  | It's called by L<EVP_PKEY_missing_parameters(3)>. | 
|  |  | 
|  | The param_copy() method copies key parameters from B<from> to B<to>. | 
|  | It MUST return 0 on error, 1 on success. | 
|  | It's called by L<EVP_PKEY_copy_parameters(3)>. | 
|  |  | 
|  | The param_cmp() method compares the parameters of keys B<a> and B<b>. | 
|  | It MUST return 1 when the keys are equal, 0 when not equal, or a | 
|  | negative number on error. | 
|  | It's called by L<EVP_PKEY_parameters_eq(3)>. | 
|  |  | 
|  | The param_print() method prints the private key parameters in humanly | 
|  | readable text to B<out>, indented B<indent> spaces. | 
|  | It MUST return 0 on error, 1 on success. | 
|  | It's called by L<EVP_PKEY_print_params(3)>. | 
|  |  | 
|  | int (*sig_print) (BIO *out, | 
|  | const X509_ALGOR *sigalg, const ASN1_STRING *sig, | 
|  | int indent, ASN1_PCTX *pctx); | 
|  |  | 
|  | The sig_print() method prints a signature in humanly readable text to | 
|  | B<out>, indented B<indent> spaces. | 
|  | B<sigalg> contains the exact signature algorithm. | 
|  | If the signature in B<sig> doesn't correspond to what this method | 
|  | expects, X509_signature_dump() must be used as a last resort. | 
|  | It MUST return 0 on error, 1 on success. | 
|  | It's called by L<X509_signature_print(3)>. | 
|  |  | 
|  | void (*pkey_free) (EVP_PKEY *pkey); | 
|  |  | 
|  | The pkey_free() method helps freeing the internals of B<pkey>. | 
|  | It's called by L<EVP_PKEY_free(3)>, L<EVP_PKEY_set_type(3)>, | 
|  | L<EVP_PKEY_set_type_str(3)>, and L<EVP_PKEY_assign(3)>. | 
|  |  | 
|  | int (*pkey_ctrl) (EVP_PKEY *pkey, int op, long arg1, void *arg2); | 
|  |  | 
|  | The pkey_ctrl() method adds extra algorithm specific control. | 
|  | It's called by L<EVP_PKEY_get_default_digest_nid(3)>, | 
|  | L<EVP_PKEY_set1_encoded_public_key(3)>, | 
|  | L<EVP_PKEY_get1_encoded_public_key(3)>, L<PKCS7_SIGNER_INFO_set(3)>, | 
|  | L<PKCS7_RECIP_INFO_set(3)>, ... | 
|  |  | 
|  | int (*old_priv_decode) (EVP_PKEY *pkey, | 
|  | const unsigned char **pder, int derlen); | 
|  | int (*old_priv_encode) (const EVP_PKEY *pkey, unsigned char **pder); | 
|  |  | 
|  | The old_priv_decode() and old_priv_encode() methods decode / encode | 
|  | they private key B<pkey> from / to a DER formatted array. | 
|  | These are exclusively used to help decoding / encoding older (pre | 
|  | PKCS#8) PEM formatted encrypted private keys. | 
|  | old_priv_decode() MUST return 0 on error, 1 on success. | 
|  | old_priv_encode() MUST the return same kind of values as | 
|  | i2d_PrivateKey(). | 
|  | They're called by L<d2i_PrivateKey(3)> and L<i2d_PrivateKey(3)>. | 
|  |  | 
|  | int (*item_verify) (EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, | 
|  | X509_ALGOR *a, ASN1_BIT_STRING *sig, EVP_PKEY *pkey); | 
|  | int (*item_sign) (EVP_MD_CTX *ctx, const ASN1_ITEM *it, void *asn, | 
|  | X509_ALGOR *alg1, X509_ALGOR *alg2, | 
|  | ASN1_BIT_STRING *sig); | 
|  |  | 
|  | The item_sign() and  item_verify() methods make it possible to have | 
|  | algorithm specific signatures and verification of them. | 
|  |  | 
|  | item_sign() MUST return one of: | 
|  |  | 
|  | =over 4 | 
|  |  | 
|  | =item <=0 | 
|  |  | 
|  | error | 
|  |  | 
|  | =item Z<>1 | 
|  |  | 
|  | item_sign() did everything, OpenSSL internals just needs to pass the | 
|  | signature length back. | 
|  |  | 
|  | =item Z<>2 | 
|  |  | 
|  | item_sign() did nothing, OpenSSL internal standard routines are | 
|  | expected to continue with the default signature production. | 
|  |  | 
|  | =item Z<>3 | 
|  |  | 
|  | item_sign() set the algorithm identifier B<algor1> and B<algor2>, | 
|  | OpenSSL internals should just sign using those algorithms. | 
|  |  | 
|  | =back | 
|  |  | 
|  | item_verify() MUST return one of: | 
|  |  | 
|  | =over 4 | 
|  |  | 
|  | =item <=0 | 
|  |  | 
|  | error | 
|  |  | 
|  | =item Z<>1 | 
|  |  | 
|  | item_sign() did everything, OpenSSL internals just needs to pass the | 
|  | signature length back. | 
|  |  | 
|  | =item Z<>2 | 
|  |  | 
|  | item_sign() did nothing, OpenSSL internal standard routines are | 
|  | expected to continue with the default signature production. | 
|  |  | 
|  | =back | 
|  |  | 
|  | item_verify() and item_sign() are called by L<ASN1_item_verify(3)> and | 
|  | L<ASN1_item_sign(3)>, and by extension, L<X509_verify(3)>, | 
|  | L<X509_REQ_verify(3)>, L<X509_sign(3)>, L<X509_REQ_sign(3)>, ... | 
|  |  | 
|  | int (*siginf_set) (X509_SIG_INFO *siginf, const X509_ALGOR *alg, | 
|  | const ASN1_STRING *sig); | 
|  |  | 
|  | The siginf_set() method is used to set custom B<X509_SIG_INFO> | 
|  | parameters. | 
|  | It MUST return 0 on error, or 1 on success. | 
|  | It's called as part of L<X509_check_purpose(3)>, L<X509_check_ca(3)> | 
|  | and L<X509_check_issued(3)>. | 
|  |  | 
|  | int (*pkey_check) (const EVP_PKEY *pk); | 
|  | int (*pkey_public_check) (const EVP_PKEY *pk); | 
|  | int (*pkey_param_check) (const EVP_PKEY *pk); | 
|  |  | 
|  | The pkey_check(), pkey_public_check() and pkey_param_check() methods are used | 
|  | to check the validity of B<pk> for key-pair, public component and parameters, | 
|  | respectively. | 
|  | They MUST return 0 for an invalid key, or 1 for a valid key. | 
|  | They are called by L<EVP_PKEY_check(3)>, L<EVP_PKEY_public_check(3)> and | 
|  | L<EVP_PKEY_param_check(3)> respectively. | 
|  |  | 
|  | int (*set_priv_key) (EVP_PKEY *pk, const unsigned char *priv, size_t len); | 
|  | int (*set_pub_key) (EVP_PKEY *pk, const unsigned char *pub, size_t len); | 
|  |  | 
|  | The set_priv_key() and set_pub_key() methods are used to set the raw private and | 
|  | public key data for an EVP_PKEY. They MUST return 0 on error, or 1 on success. | 
|  | They are called by L<EVP_PKEY_new_raw_private_key(3)>, and | 
|  | L<EVP_PKEY_new_raw_public_key(3)> respectively. | 
|  |  | 
|  | size_t (*dirty) (const EVP_PKEY *pk); | 
|  | void *(*export_to) (const EVP_PKEY *pk, EVP_KEYMGMT *keymgmt); | 
|  |  | 
|  | dirty_cnt() returns the internal key's dirty count. | 
|  | This can be used to synchronise different copies of the same keys. | 
|  |  | 
|  | The export_to() method exports the key material from the given key to | 
|  | a provider, through the L<EVP_KEYMGMT(3)> interface, if that provider | 
|  | supports importing key material. | 
|  |  | 
|  | =head2 Functions | 
|  |  | 
|  | EVP_PKEY_asn1_new() creates and returns a new B<EVP_PKEY_ASN1_METHOD> | 
|  | object, and associates the given B<id>, B<flags>, B<pem_str> and | 
|  | B<info>. | 
|  | B<id> is a NID, B<pem_str> is the PEM type string, B<info> is a | 
|  | descriptive string. | 
|  | The following B<flags> are supported: | 
|  |  | 
|  | ASN1_PKEY_SIGPARAM_NULL | 
|  |  | 
|  | If B<ASN1_PKEY_SIGPARAM_NULL> is set, then the signature algorithm | 
|  | parameters are given the type B<V_ASN1_NULL> by default, otherwise | 
|  | they will be given the type B<V_ASN1_UNDEF> (i.e. the parameter is | 
|  | omitted). | 
|  | See L<X509_ALGOR_set0(3)> for more information. | 
|  |  | 
|  | EVP_PKEY_asn1_copy() copies an B<EVP_PKEY_ASN1_METHOD> object from | 
|  | B<src> to B<dst>. | 
|  | This function is not thread safe, it's recommended to only use this | 
|  | when initializing the application. | 
|  |  | 
|  | EVP_PKEY_asn1_free() frees an existing B<EVP_PKEY_ASN1_METHOD> pointed | 
|  | by B<ameth>. | 
|  |  | 
|  | EVP_PKEY_asn1_add0() adds B<ameth> to the user defined stack of | 
|  | methods unless another B<EVP_PKEY_ASN1_METHOD> with the same NID is | 
|  | already there. | 
|  | This function is not thread safe, it's recommended to only use this | 
|  | when initializing the application. | 
|  |  | 
|  | EVP_PKEY_asn1_add_alias() creates an alias with the NID B<to> for the | 
|  | B<EVP_PKEY_ASN1_METHOD> with NID B<from> unless another | 
|  | B<EVP_PKEY_ASN1_METHOD> with the same NID is already added. | 
|  | This function is not thread safe, it's recommended to only use this | 
|  | when initializing the application. | 
|  |  | 
|  | EVP_PKEY_asn1_set_public(), EVP_PKEY_asn1_set_private(), | 
|  | EVP_PKEY_asn1_set_param(), EVP_PKEY_asn1_set_free(), | 
|  | EVP_PKEY_asn1_set_ctrl(), EVP_PKEY_asn1_set_item(), | 
|  | EVP_PKEY_asn1_set_siginf(), EVP_PKEY_asn1_set_check(), | 
|  | EVP_PKEY_asn1_set_public_check(), EVP_PKEY_asn1_set_param_check(), | 
|  | EVP_PKEY_asn1_set_security_bits(), EVP_PKEY_asn1_set_set_priv_key(), | 
|  | EVP_PKEY_asn1_set_set_pub_key(), EVP_PKEY_asn1_set_get_priv_key() and | 
|  | EVP_PKEY_asn1_set_get_pub_key() set the diverse methods of the given | 
|  | B<EVP_PKEY_ASN1_METHOD> object. | 
|  |  | 
|  | EVP_PKEY_get0_asn1() finds the B<EVP_PKEY_ASN1_METHOD> associated | 
|  | with the key B<pkey>. | 
|  |  | 
|  | =head1 RETURN VALUES | 
|  |  | 
|  | EVP_PKEY_asn1_new() returns NULL on error, or a pointer to an | 
|  | B<EVP_PKEY_ASN1_METHOD> object otherwise. | 
|  |  | 
|  | EVP_PKEY_asn1_add0() and EVP_PKEY_asn1_add_alias() return 0 on error, | 
|  | or 1 on success. | 
|  |  | 
|  | EVP_PKEY_get0_asn1() returns NULL on error, or a pointer to a constant | 
|  | B<EVP_PKEY_ASN1_METHOD> object otherwise. | 
|  |  | 
|  | =head1 HISTORY | 
|  |  | 
|  | The signature of the I<pub_decode> functional argument of | 
|  | EVP_PKEY_asn1_set_public() has changed in OpenSSL 3.0 so its I<pub> | 
|  | parameter is now constified. | 
|  |  | 
|  | =head1 COPYRIGHT | 
|  |  | 
|  | Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved. | 
|  |  | 
|  | Licensed under the Apache License 2.0 (the "License").  You may not use | 
|  | this file except in compliance with the License.  You can obtain a copy | 
|  | in the file LICENSE in the source distribution or at | 
|  | L<https://www.openssl.org/source/license.html>. | 
|  |  | 
|  | =cut |