xref: /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/DEFINE_STACK_OF.pod (revision 4724848cf0da353df257f730694b7882798e5daf)
1*4724848cSchristos=pod
2*4724848cSchristos
3*4724848cSchristos=head1 NAME
4*4724848cSchristos
5*4724848cSchristosDEFINE_STACK_OF, DEFINE_STACK_OF_CONST, DEFINE_SPECIAL_STACK_OF,
6*4724848cSchristosDEFINE_SPECIAL_STACK_OF_CONST,
7*4724848cSchristossk_TYPE_num, sk_TYPE_value, sk_TYPE_new, sk_TYPE_new_null,
8*4724848cSchristossk_TYPE_reserve, sk_TYPE_free, sk_TYPE_zero, sk_TYPE_delete,
9*4724848cSchristossk_TYPE_delete_ptr, sk_TYPE_push, sk_TYPE_unshift, sk_TYPE_pop,
10*4724848cSchristossk_TYPE_shift, sk_TYPE_pop_free, sk_TYPE_insert, sk_TYPE_set,
11*4724848cSchristossk_TYPE_find, sk_TYPE_find_ex, sk_TYPE_sort, sk_TYPE_is_sorted,
12*4724848cSchristossk_TYPE_dup, sk_TYPE_deep_copy, sk_TYPE_set_cmp_func, sk_TYPE_new_reserve
13*4724848cSchristos- stack container
14*4724848cSchristos
15*4724848cSchristos=head1 SYNOPSIS
16*4724848cSchristos
17*4724848cSchristos=for comment generic
18*4724848cSchristos
19*4724848cSchristos #include <openssl/safestack.h>
20*4724848cSchristos
21*4724848cSchristos STACK_OF(TYPE)
22*4724848cSchristos DEFINE_STACK_OF(TYPE)
23*4724848cSchristos DEFINE_STACK_OF_CONST(TYPE)
24*4724848cSchristos DEFINE_SPECIAL_STACK_OF(FUNCTYPE, TYPE)
25*4724848cSchristos DEFINE_SPECIAL_STACK_OF_CONST(FUNCTYPE, TYPE)
26*4724848cSchristos
27*4724848cSchristos typedef int (*sk_TYPE_compfunc)(const TYPE *const *a, const TYPE *const *b);
28*4724848cSchristos typedef TYPE * (*sk_TYPE_copyfunc)(const TYPE *a);
29*4724848cSchristos typedef void (*sk_TYPE_freefunc)(TYPE *a);
30*4724848cSchristos
31*4724848cSchristos int sk_TYPE_num(const STACK_OF(TYPE) *sk);
32*4724848cSchristos TYPE *sk_TYPE_value(const STACK_OF(TYPE) *sk, int idx);
33*4724848cSchristos STACK_OF(TYPE) *sk_TYPE_new(sk_TYPE_compfunc compare);
34*4724848cSchristos STACK_OF(TYPE) *sk_TYPE_new_null(void);
35*4724848cSchristos int sk_TYPE_reserve(STACK_OF(TYPE) *sk, int n);
36*4724848cSchristos void sk_TYPE_free(const STACK_OF(TYPE) *sk);
37*4724848cSchristos void sk_TYPE_zero(const STACK_OF(TYPE) *sk);
38*4724848cSchristos TYPE *sk_TYPE_delete(STACK_OF(TYPE) *sk, int i);
39*4724848cSchristos TYPE *sk_TYPE_delete_ptr(STACK_OF(TYPE) *sk, TYPE *ptr);
40*4724848cSchristos int sk_TYPE_push(STACK_OF(TYPE) *sk, const TYPE *ptr);
41*4724848cSchristos int sk_TYPE_unshift(STACK_OF(TYPE) *sk, const TYPE *ptr);
42*4724848cSchristos TYPE *sk_TYPE_pop(STACK_OF(TYPE) *sk);
43*4724848cSchristos TYPE *sk_TYPE_shift(STACK_OF(TYPE) *sk);
44*4724848cSchristos void sk_TYPE_pop_free(STACK_OF(TYPE) *sk, sk_TYPE_freefunc freefunc);
45*4724848cSchristos int sk_TYPE_insert(STACK_OF(TYPE) *sk, TYPE *ptr, int idx);
46*4724848cSchristos TYPE *sk_TYPE_set(STACK_OF(TYPE) *sk, int idx, const TYPE *ptr);
47*4724848cSchristos int sk_TYPE_find(STACK_OF(TYPE) *sk, TYPE *ptr);
48*4724848cSchristos int sk_TYPE_find_ex(STACK_OF(TYPE) *sk, TYPE *ptr);
49*4724848cSchristos void sk_TYPE_sort(const STACK_OF(TYPE) *sk);
50*4724848cSchristos int sk_TYPE_is_sorted(const STACK_OF(TYPE) *sk);
51*4724848cSchristos STACK_OF(TYPE) *sk_TYPE_dup(const STACK_OF(TYPE) *sk);
52*4724848cSchristos STACK_OF(TYPE) *sk_TYPE_deep_copy(const STACK_OF(TYPE) *sk,
53*4724848cSchristos                                   sk_TYPE_copyfunc copyfunc,
54*4724848cSchristos                                   sk_TYPE_freefunc freefunc);
55*4724848cSchristos sk_TYPE_compfunc (*sk_TYPE_set_cmp_func(STACK_OF(TYPE) *sk,
56*4724848cSchristos                                         sk_TYPE_compfunc compare));
57*4724848cSchristos STACK_OF(TYPE) *sk_TYPE_new_reserve(sk_TYPE_compfunc compare, int n);
58*4724848cSchristos
59*4724848cSchristos=head1 DESCRIPTION
60*4724848cSchristos
61*4724848cSchristosApplications can create and use their own stacks by placing any of the macros
62*4724848cSchristosdescribed below in a header file. These macros define typesafe inline
63*4724848cSchristosfunctions that wrap around the utility B<OPENSSL_sk_> API.
64*4724848cSchristosIn the description here, I<TYPE> is used
65*4724848cSchristosas a placeholder for any of the OpenSSL datatypes, such as I<X509>.
66*4724848cSchristos
67*4724848cSchristosSTACK_OF() returns the name for a stack of the specified B<TYPE>.
68*4724848cSchristosDEFINE_STACK_OF() creates set of functions for a stack of B<TYPE>. This
69*4724848cSchristoswill mean that type B<TYPE> is stored in each stack, the type is referenced by
70*4724848cSchristosSTACK_OF(TYPE) and each function name begins with I<sk_TYPE_>. For example:
71*4724848cSchristos
72*4724848cSchristos TYPE *sk_TYPE_value(STACK_OF(TYPE) *sk, int idx);
73*4724848cSchristos
74*4724848cSchristosDEFINE_STACK_OF_CONST() is identical to DEFINE_STACK_OF() except
75*4724848cSchristoseach element is constant. For example:
76*4724848cSchristos
77*4724848cSchristos const TYPE *sk_TYPE_value(STACK_OF(TYPE) *sk, int idx);
78*4724848cSchristos
79*4724848cSchristosDEFINE_SPECIAL_STACK_OF() defines a stack of B<TYPE> but
80*4724848cSchristoseach function uses B<FUNCNAME> in the function name. For example:
81*4724848cSchristos
82*4724848cSchristos TYPE *sk_FUNCNAME_value(STACK_OF(TYPE) *sk, int idx);
83*4724848cSchristos
84*4724848cSchristosDEFINE_SPECIAL_STACK_OF_CONST() is similar except that each element is
85*4724848cSchristosconstant:
86*4724848cSchristos
87*4724848cSchristos const TYPE *sk_FUNCNAME_value(STACK_OF(TYPE) *sk, int idx);
88*4724848cSchristos
89*4724848cSchristossk_TYPE_num() returns the number of elements in B<sk> or -1 if B<sk> is
90*4724848cSchristosB<NULL>.
91*4724848cSchristos
92*4724848cSchristossk_TYPE_value() returns element B<idx> in B<sk>, where B<idx> starts at
93*4724848cSchristoszero. If B<idx> is out of range then B<NULL> is returned.
94*4724848cSchristos
95*4724848cSchristossk_TYPE_new() allocates a new empty stack using comparison function B<compare>.
96*4724848cSchristosIf B<compare> is B<NULL> then no comparison function is used. This function is
97*4724848cSchristosequivalent to sk_TYPE_new_reserve(compare, 0).
98*4724848cSchristos
99*4724848cSchristossk_TYPE_new_null() allocates a new empty stack with no comparison function. This
100*4724848cSchristosfunction is equivalent to sk_TYPE_new_reserve(NULL, 0).
101*4724848cSchristos
102*4724848cSchristossk_TYPE_reserve() allocates additional memory in the B<sk> structure
103*4724848cSchristossuch that the next B<n> calls to sk_TYPE_insert(), sk_TYPE_push()
104*4724848cSchristosor sk_TYPE_unshift() will not fail or cause memory to be allocated
105*4724848cSchristosor reallocated. If B<n> is zero, any excess space allocated in the
106*4724848cSchristosB<sk> structure is freed. On error B<sk> is unchanged.
107*4724848cSchristos
108*4724848cSchristossk_TYPE_new_reserve() allocates a new stack. The new stack will have additional
109*4724848cSchristosmemory allocated to hold B<n> elements if B<n> is positive. The next B<n> calls
110*4724848cSchristosto sk_TYPE_insert(), sk_TYPE_push() or sk_TYPE_unshift() will not fail or cause
111*4724848cSchristosmemory to be allocated or reallocated. If B<n> is zero or less than zero, no
112*4724848cSchristosmemory is allocated. sk_TYPE_new_reserve() also sets the comparison function
113*4724848cSchristosB<compare> to the newly created stack. If B<compare> is B<NULL> then no
114*4724848cSchristoscomparison function is used.
115*4724848cSchristos
116*4724848cSchristossk_TYPE_set_cmp_func() sets the comparison function of B<sk> to B<compare>.
117*4724848cSchristosThe previous comparison function is returned or B<NULL> if there was
118*4724848cSchristosno previous comparison function.
119*4724848cSchristos
120*4724848cSchristossk_TYPE_free() frees up the B<sk> structure. It does B<not> free up any
121*4724848cSchristoselements of B<sk>. After this call B<sk> is no longer valid.
122*4724848cSchristos
123*4724848cSchristossk_TYPE_zero() sets the number of elements in B<sk> to zero. It does not free
124*4724848cSchristosB<sk> so after this call B<sk> is still valid.
125*4724848cSchristos
126*4724848cSchristossk_TYPE_pop_free() frees up all elements of B<sk> and B<sk> itself. The
127*4724848cSchristosfree function freefunc() is called on each element to free it.
128*4724848cSchristos
129*4724848cSchristossk_TYPE_delete() deletes element B<i> from B<sk>. It returns the deleted
130*4724848cSchristoselement or B<NULL> if B<i> is out of range.
131*4724848cSchristos
132*4724848cSchristossk_TYPE_delete_ptr() deletes element matching B<ptr> from B<sk>. It returns
133*4724848cSchristosthe deleted element or B<NULL> if no element matching B<ptr> was found.
134*4724848cSchristos
135*4724848cSchristossk_TYPE_insert() inserts B<ptr> into B<sk> at position B<idx>. Any existing
136*4724848cSchristoselements at or after B<idx> are moved downwards. If B<idx> is out of range
137*4724848cSchristosthe new element is appended to B<sk>. sk_TYPE_insert() either returns the
138*4724848cSchristosnumber of elements in B<sk> after the new element is inserted or zero if
139*4724848cSchristosan error (such as memory allocation failure) occurred.
140*4724848cSchristos
141*4724848cSchristossk_TYPE_push() appends B<ptr> to B<sk> it is equivalent to:
142*4724848cSchristos
143*4724848cSchristos sk_TYPE_insert(sk, ptr, -1);
144*4724848cSchristos
145*4724848cSchristossk_TYPE_unshift() inserts B<ptr> at the start of B<sk> it is equivalent to:
146*4724848cSchristos
147*4724848cSchristos sk_TYPE_insert(sk, ptr, 0);
148*4724848cSchristos
149*4724848cSchristossk_TYPE_pop() returns and removes the last element from B<sk>.
150*4724848cSchristos
151*4724848cSchristossk_TYPE_shift() returns and removes the first element from B<sk>.
152*4724848cSchristos
153*4724848cSchristossk_TYPE_set() sets element B<idx> of B<sk> to B<ptr> replacing the current
154*4724848cSchristoselement. The new element value is returned or B<NULL> if an error occurred:
155*4724848cSchristosthis will only happen if B<sk> is B<NULL> or B<idx> is out of range.
156*4724848cSchristos
157*4724848cSchristossk_TYPE_find() searches B<sk> for the element B<ptr>.  In the case
158*4724848cSchristoswhere no comparison function has been specified, the function performs
159*4724848cSchristosa linear search for a pointer equal to B<ptr>. The index of the first
160*4724848cSchristosmatching element is returned or B<-1> if there is no match. In the case
161*4724848cSchristoswhere a comparison function has been specified, B<sk> is sorted then
162*4724848cSchristossk_TYPE_find() returns the index of a matching element or B<-1> if there
163*4724848cSchristosis no match. Note that, in this case, the matching element returned is
164*4724848cSchristosnot guaranteed to be the first; the comparison function will usually
165*4724848cSchristoscompare the values pointed to rather than the pointers themselves and
166*4724848cSchristosthe order of elements in B<sk> could change.
167*4724848cSchristos
168*4724848cSchristossk_TYPE_find_ex() operates like sk_TYPE_find() except when a comparison
169*4724848cSchristosfunction has been specified and no matching element is found. Instead
170*4724848cSchristosof returning B<-1>, sk_TYPE_find_ex() returns the index of the element
171*4724848cSchristoseither before or after the location where B<ptr> would be if it were
172*4724848cSchristospresent in B<sk>.
173*4724848cSchristos
174*4724848cSchristossk_TYPE_sort() sorts B<sk> using the supplied comparison function.
175*4724848cSchristos
176*4724848cSchristossk_TYPE_is_sorted() returns B<1> if B<sk> is sorted and B<0> otherwise.
177*4724848cSchristos
178*4724848cSchristossk_TYPE_dup() returns a copy of B<sk>. Note the pointers in the copy
179*4724848cSchristosare identical to the original.
180*4724848cSchristos
181*4724848cSchristossk_TYPE_deep_copy() returns a new stack where each element has been copied.
182*4724848cSchristosCopying is performed by the supplied copyfunc() and freeing by freefunc(). The
183*4724848cSchristosfunction freefunc() is only called if an error occurs.
184*4724848cSchristos
185*4724848cSchristos=head1 NOTES
186*4724848cSchristos
187*4724848cSchristosCare should be taken when accessing stacks in multi-threaded environments.
188*4724848cSchristosAny operation which increases the size of a stack such as sk_TYPE_insert() or
189*4724848cSchristossk_push() can "grow" the size of an internal array and cause race conditions
190*4724848cSchristosif the same stack is accessed in a different thread. Operations such as
191*4724848cSchristossk_find() and sk_sort() can also reorder the stack.
192*4724848cSchristos
193*4724848cSchristosAny comparison function supplied should use a metric suitable
194*4724848cSchristosfor use in a binary search operation. That is it should return zero, a
195*4724848cSchristospositive or negative value if B<a> is equal to, greater than
196*4724848cSchristosor less than B<b> respectively.
197*4724848cSchristos
198*4724848cSchristosCare should be taken when checking the return values of the functions
199*4724848cSchristossk_TYPE_find() and sk_TYPE_find_ex(). They return an index to the
200*4724848cSchristosmatching element. In particular B<0> indicates a matching first element.
201*4724848cSchristosA failed search is indicated by a B<-1> return value.
202*4724848cSchristos
203*4724848cSchristosSTACK_OF(), DEFINE_STACK_OF(), DEFINE_STACK_OF_CONST(), and
204*4724848cSchristosDEFINE_SPECIAL_STACK_OF() are implemented as macros.
205*4724848cSchristos
206*4724848cSchristosThe underlying utility B<OPENSSL_sk_> API should not be used directly.
207*4724848cSchristosIt defines these functions: OPENSSL_sk_deep_copy(),
208*4724848cSchristosOPENSSL_sk_delete(), OPENSSL_sk_delete_ptr(), OPENSSL_sk_dup(),
209*4724848cSchristosOPENSSL_sk_find(), OPENSSL_sk_find_ex(), OPENSSL_sk_free(),
210*4724848cSchristosOPENSSL_sk_insert(), OPENSSL_sk_is_sorted(), OPENSSL_sk_new(),
211*4724848cSchristosOPENSSL_sk_new_null(), OPENSSL_sk_num(), OPENSSL_sk_pop(),
212*4724848cSchristosOPENSSL_sk_pop_free(), OPENSSL_sk_push(), OPENSSL_sk_reserve(),
213*4724848cSchristosOPENSSL_sk_set(), OPENSSL_sk_set_cmp_func(), OPENSSL_sk_shift(),
214*4724848cSchristosOPENSSL_sk_sort(), OPENSSL_sk_unshift(), OPENSSL_sk_value(),
215*4724848cSchristosOPENSSL_sk_zero().
216*4724848cSchristos
217*4724848cSchristos=head1 RETURN VALUES
218*4724848cSchristos
219*4724848cSchristossk_TYPE_num() returns the number of elements in the stack or B<-1> if the
220*4724848cSchristospassed stack is B<NULL>.
221*4724848cSchristos
222*4724848cSchristossk_TYPE_value() returns a pointer to a stack element or B<NULL> if the
223*4724848cSchristosindex is out of range.
224*4724848cSchristos
225*4724848cSchristossk_TYPE_new(), sk_TYPE_new_null() and sk_TYPE_new_reserve() return an empty
226*4724848cSchristosstack or B<NULL> if an error occurs.
227*4724848cSchristos
228*4724848cSchristossk_TYPE_reserve() returns B<1> on successful allocation of the required memory
229*4724848cSchristosor B<0> on error.
230*4724848cSchristos
231*4724848cSchristossk_TYPE_set_cmp_func() returns the old comparison function or B<NULL> if
232*4724848cSchristosthere was no old comparison function.
233*4724848cSchristos
234*4724848cSchristossk_TYPE_free(), sk_TYPE_zero(), sk_TYPE_pop_free() and sk_TYPE_sort() do
235*4724848cSchristosnot return values.
236*4724848cSchristos
237*4724848cSchristossk_TYPE_pop(), sk_TYPE_shift(), sk_TYPE_delete() and sk_TYPE_delete_ptr()
238*4724848cSchristosreturn a pointer to the deleted element or B<NULL> on error.
239*4724848cSchristos
240*4724848cSchristossk_TYPE_insert(), sk_TYPE_push() and sk_TYPE_unshift() return the total
241*4724848cSchristosnumber of elements in the stack and 0 if an error occurred. sk_TYPE_push()
242*4724848cSchristosfurther returns -1 if B<sk> is B<NULL>.
243*4724848cSchristos
244*4724848cSchristossk_TYPE_set() returns a pointer to the replacement element or B<NULL> on
245*4724848cSchristoserror.
246*4724848cSchristos
247*4724848cSchristossk_TYPE_find() and sk_TYPE_find_ex() return an index to the found element
248*4724848cSchristosor B<-1> on error.
249*4724848cSchristos
250*4724848cSchristossk_TYPE_is_sorted() returns B<1> if the stack is sorted and B<0> if it is
251*4724848cSchristosnot.
252*4724848cSchristos
253*4724848cSchristossk_TYPE_dup() and sk_TYPE_deep_copy() return a pointer to the copy of the
254*4724848cSchristosstack.
255*4724848cSchristos
256*4724848cSchristos=head1 HISTORY
257*4724848cSchristos
258*4724848cSchristosBefore OpenSSL 1.1.0, this was implemented via macros and not inline functions
259*4724848cSchristosand was not a public API.
260*4724848cSchristos
261*4724848cSchristossk_TYPE_reserve() and sk_TYPE_new_reserve() were added in OpenSSL 1.1.1.
262*4724848cSchristos
263*4724848cSchristos=head1 COPYRIGHT
264*4724848cSchristos
265*4724848cSchristosCopyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.
266*4724848cSchristos
267*4724848cSchristosLicensed under the OpenSSL license (the "License").  You may not use
268*4724848cSchristosthis file except in compliance with the License.  You can obtain a copy
269*4724848cSchristosin the file LICENSE in the source distribution or at
270*4724848cSchristosL<https://www.openssl.org/source/license.html>.
271*4724848cSchristos
272*4724848cSchristos=cut
273