1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2 * All rights reserved.
3 *
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
7 *
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14 *
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
21 *
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
24 * are met:
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
51 *
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.] */
56
57 #include <openssl/asn1.h>
58 #include <openssl/buf.h>
59 #include <openssl/digest.h>
60 #include <openssl/dsa.h>
61 #include <openssl/evp.h>
62 #include <openssl/rsa.h>
63 #include <openssl/stack.h>
64 #include <openssl/x509.h>
65
66
X509_verify(X509 * a,EVP_PKEY * r)67 int X509_verify(X509 *a, EVP_PKEY *r)
68 {
69 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
70 return 0;
71 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg,
72 a->signature,a->cert_info,r));
73 }
74
X509_REQ_verify(X509_REQ * a,EVP_PKEY * r)75 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r)
76 {
77 return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO),
78 a->sig_alg,a->signature,a->req_info,r));
79 }
80
X509_sign(X509 * x,EVP_PKEY * pkey,const EVP_MD * md)81 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
82 {
83 x->cert_info->enc.modified = 1;
84 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
85 x->sig_alg, x->signature, x->cert_info,pkey,md));
86 }
87
X509_sign_ctx(X509 * x,EVP_MD_CTX * ctx)88 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx)
89 {
90 x->cert_info->enc.modified = 1;
91 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF),
92 x->cert_info->signature,
93 x->sig_alg, x->signature, x->cert_info, ctx);
94 }
95
X509_REQ_sign(X509_REQ * x,EVP_PKEY * pkey,const EVP_MD * md)96 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md)
97 {
98 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL,
99 x->signature, x->req_info,pkey,md));
100 }
101
X509_REQ_sign_ctx(X509_REQ * x,EVP_MD_CTX * ctx)102 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx)
103 {
104 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO),
105 x->sig_alg, NULL, x->signature, x->req_info, ctx);
106 }
107
X509_CRL_sign(X509_CRL * x,EVP_PKEY * pkey,const EVP_MD * md)108 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md)
109 {
110 x->crl->enc.modified = 1;
111 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg,
112 x->sig_alg, x->signature, x->crl,pkey,md));
113 }
114
X509_CRL_sign_ctx(X509_CRL * x,EVP_MD_CTX * ctx)115 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx)
116 {
117 x->crl->enc.modified = 1;
118 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO),
119 x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx);
120 }
121
NETSCAPE_SPKI_sign(NETSCAPE_SPKI * x,EVP_PKEY * pkey,const EVP_MD * md)122 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md)
123 {
124 return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL,
125 x->signature, x->spkac,pkey,md));
126 }
127
NETSCAPE_SPKI_verify(NETSCAPE_SPKI * x,EVP_PKEY * pkey)128 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *x, EVP_PKEY *pkey)
129 {
130 return (ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,
131 x->signature, x->spkac, pkey));
132 }
133
134 #ifndef OPENSSL_NO_FP_API
d2i_X509_fp(FILE * fp,X509 ** x509)135 X509 *d2i_X509_fp(FILE *fp, X509 **x509)
136 {
137 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509);
138 }
139
i2d_X509_fp(FILE * fp,X509 * x509)140 int i2d_X509_fp(FILE *fp, X509 *x509)
141 {
142 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509);
143 }
144 #endif
145
d2i_X509_bio(BIO * bp,X509 ** x509)146 X509 *d2i_X509_bio(BIO *bp, X509 **x509)
147 {
148 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509);
149 }
150
i2d_X509_bio(BIO * bp,X509 * x509)151 int i2d_X509_bio(BIO *bp, X509 *x509)
152 {
153 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509);
154 }
155
156 #ifndef OPENSSL_NO_FP_API
d2i_X509_CRL_fp(FILE * fp,X509_CRL ** crl)157 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl)
158 {
159 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
160 }
161
i2d_X509_CRL_fp(FILE * fp,X509_CRL * crl)162 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl)
163 {
164 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
165 }
166 #endif
167
d2i_X509_CRL_bio(BIO * bp,X509_CRL ** crl)168 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl)
169 {
170 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
171 }
172
i2d_X509_CRL_bio(BIO * bp,X509_CRL * crl)173 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl)
174 {
175 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
176 }
177
178 #ifndef OPENSSL_NO_FP_API
d2i_X509_REQ_fp(FILE * fp,X509_REQ ** req)179 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req)
180 {
181 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
182 }
183
i2d_X509_REQ_fp(FILE * fp,X509_REQ * req)184 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req)
185 {
186 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
187 }
188 #endif
189
d2i_X509_REQ_bio(BIO * bp,X509_REQ ** req)190 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req)
191 {
192 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
193 }
194
i2d_X509_REQ_bio(BIO * bp,X509_REQ * req)195 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req)
196 {
197 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
198 }
199
200
201 #ifndef OPENSSL_NO_FP_API
d2i_RSAPrivateKey_fp(FILE * fp,RSA ** rsa)202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
203 {
204 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa);
205 }
206
i2d_RSAPrivateKey_fp(FILE * fp,RSA * rsa)207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
208 {
209 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa);
210 }
211
d2i_RSAPublicKey_fp(FILE * fp,RSA ** rsa)212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa)
213 {
214 return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa);
215 }
216
d2i_RSA_PUBKEY_fp(FILE * fp,RSA ** rsa)217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa)
218 {
219 return ASN1_d2i_fp((void *(*)(void))
220 RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp,
221 (void **)rsa);
222 }
223
i2d_RSAPublicKey_fp(FILE * fp,RSA * rsa)224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa)
225 {
226 return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa);
227 }
228
i2d_RSA_PUBKEY_fp(FILE * fp,RSA * rsa)229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa)
230 {
231 return ASN1_i2d_fp((I2D_OF_const(void))i2d_RSA_PUBKEY,fp,rsa);
232 }
233 #endif
234
d2i_RSAPrivateKey_bio(BIO * bp,RSA ** rsa)235 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa)
236 {
237 return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPrivateKey, bp, rsa);
238 }
239
i2d_RSAPrivateKey_bio(BIO * bp,RSA * rsa)240 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa)
241 {
242 return ASN1_i2d_bio_of_const(RSA, i2d_RSAPrivateKey, bp, rsa);
243 }
244
d2i_RSAPublicKey_bio(BIO * bp,RSA ** rsa)245 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa)
246 {
247 return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPublicKey, bp, rsa);
248 }
249
250
d2i_RSA_PUBKEY_bio(BIO * bp,RSA ** rsa)251 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa)
252 {
253 return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa);
254 }
255
i2d_RSAPublicKey_bio(BIO * bp,RSA * rsa)256 int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa)
257 {
258 return ASN1_i2d_bio_of_const(RSA, i2d_RSAPublicKey, bp, rsa);
259 }
260
i2d_RSA_PUBKEY_bio(BIO * bp,RSA * rsa)261 int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa)
262 {
263 return ASN1_i2d_bio_of_const(RSA,i2d_RSA_PUBKEY,bp,rsa);
264 }
265
266 #ifndef OPENSSL_NO_DSA
267 #ifndef OPENSSL_NO_FP_API
d2i_DSAPrivateKey_fp(FILE * fp,DSA ** dsa)268 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
269 {
270 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
271 }
272
i2d_DSAPrivateKey_fp(FILE * fp,DSA * dsa)273 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
274 {
275 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
276 }
277
d2i_DSA_PUBKEY_fp(FILE * fp,DSA ** dsa)278 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa)
279 {
280 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa);
281 }
282
i2d_DSA_PUBKEY_fp(FILE * fp,DSA * dsa)283 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa)
284 {
285 return ASN1_i2d_fp_of_const(DSA,i2d_DSA_PUBKEY,fp,dsa);
286 }
287 #endif
288
d2i_DSAPrivateKey_bio(BIO * bp,DSA ** dsa)289 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa)
290 {
291 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa
292 );
293 }
294
i2d_DSAPrivateKey_bio(BIO * bp,DSA * dsa)295 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa)
296 {
297 return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa);
298 }
299
d2i_DSA_PUBKEY_bio(BIO * bp,DSA ** dsa)300 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa)
301 {
302 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa);
303 }
304
i2d_DSA_PUBKEY_bio(BIO * bp,DSA * dsa)305 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa)
306 {
307 return ASN1_i2d_bio_of_const(DSA,i2d_DSA_PUBKEY,bp,dsa);
308 }
309
310 #endif
311
312 #ifndef OPENSSL_NO_FP_API
d2i_EC_PUBKEY_fp(FILE * fp,EC_KEY ** eckey)313 EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey)
314 {
315 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey);
316 }
317
i2d_EC_PUBKEY_fp(FILE * fp,EC_KEY * eckey)318 int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey)
319 {
320 return ASN1_i2d_fp_of_const(EC_KEY,i2d_EC_PUBKEY,fp,eckey);
321 }
322
d2i_ECPrivateKey_fp(FILE * fp,EC_KEY ** eckey)323 EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey)
324 {
325 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey);
326 }
327
i2d_ECPrivateKey_fp(FILE * fp,EC_KEY * eckey)328 int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey)
329 {
330 return ASN1_i2d_fp_of_const(EC_KEY,i2d_ECPrivateKey,fp,eckey);
331 }
332 #endif
d2i_EC_PUBKEY_bio(BIO * bp,EC_KEY ** eckey)333 EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey)
334 {
335 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey);
336 }
337
i2d_EC_PUBKEY_bio(BIO * bp,EC_KEY * ecdsa)338 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa)
339 {
340 return ASN1_i2d_bio_of_const(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa);
341 }
342
d2i_ECPrivateKey_bio(BIO * bp,EC_KEY ** eckey)343 EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey)
344 {
345 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey);
346 }
347
i2d_ECPrivateKey_bio(BIO * bp,EC_KEY * eckey)348 int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey)
349 {
350 return ASN1_i2d_bio_of_const(EC_KEY,i2d_ECPrivateKey,bp,eckey);
351 }
352
353
X509_pubkey_digest(const X509 * data,const EVP_MD * type,unsigned char * md,unsigned int * len)354 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
355 unsigned int *len)
356 {
357 ASN1_BIT_STRING *key;
358 key = X509_get0_pubkey_bitstr(data);
359 if(!key) return 0;
360 return EVP_Digest(key->data, key->length, md, len, type, NULL);
361 }
362
X509_digest(const X509 * data,const EVP_MD * type,unsigned char * md,unsigned int * len)363 int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
364 unsigned int *len)
365 {
366 return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len));
367 }
368
X509_CRL_digest(const X509_CRL * data,const EVP_MD * type,unsigned char * md,unsigned int * len)369 int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md,
370 unsigned int *len)
371 {
372 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len));
373 }
374
X509_REQ_digest(const X509_REQ * data,const EVP_MD * type,unsigned char * md,unsigned int * len)375 int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md,
376 unsigned int *len)
377 {
378 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len));
379 }
380
X509_NAME_digest(const X509_NAME * data,const EVP_MD * type,unsigned char * md,unsigned int * len)381 int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md,
382 unsigned int *len)
383 {
384 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len));
385 }
386
387 #ifndef OPENSSL_NO_FP_API
d2i_PKCS8_fp(FILE * fp,X509_SIG ** p8)388 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8)
389 {
390 return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8);
391 }
392
i2d_PKCS8_fp(FILE * fp,X509_SIG * p8)393 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8)
394 {
395 return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8);
396 }
397 #endif
398
d2i_PKCS8_bio(BIO * bp,X509_SIG ** p8)399 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8)
400 {
401 return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8);
402 }
403
i2d_PKCS8_bio(BIO * bp,X509_SIG * p8)404 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8)
405 {
406 return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8);
407 }
408
409 #ifndef OPENSSL_NO_FP_API
d2i_PKCS8_PRIV_KEY_INFO_fp(FILE * fp,PKCS8_PRIV_KEY_INFO ** p8inf)410 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,
411 PKCS8_PRIV_KEY_INFO **p8inf)
412 {
413 return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
414 d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf);
415 }
416
i2d_PKCS8_PRIV_KEY_INFO_fp(FILE * fp,PKCS8_PRIV_KEY_INFO * p8inf)417 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf)
418 {
419 return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp,
420 p8inf);
421 }
422
i2d_PKCS8PrivateKeyInfo_fp(FILE * fp,EVP_PKEY * key)423 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key)
424 {
425 PKCS8_PRIV_KEY_INFO *p8inf;
426 int ret;
427 p8inf = EVP_PKEY2PKCS8(key);
428 if(!p8inf) return 0;
429 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf);
430 PKCS8_PRIV_KEY_INFO_free(p8inf);
431 return ret;
432 }
433
i2d_PrivateKey_fp(FILE * fp,EVP_PKEY * pkey)434 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey)
435 {
436 return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PrivateKey,fp,pkey);
437 }
438
d2i_PrivateKey_fp(FILE * fp,EVP_PKEY ** a)439 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a)
440 {
441 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a);
442 }
443
i2d_PUBKEY_fp(FILE * fp,EVP_PKEY * pkey)444 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey)
445 {
446 return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PUBKEY,fp,pkey);
447 }
448
d2i_PUBKEY_fp(FILE * fp,EVP_PKEY ** a)449 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a)
450 {
451 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a);
452 }
453
d2i_PKCS8_PRIV_KEY_INFO_bio(BIO * bp,PKCS8_PRIV_KEY_INFO ** p8inf)454 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,
455 PKCS8_PRIV_KEY_INFO **p8inf)
456 {
457 return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
458 d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf);
459 }
460
i2d_PKCS8_PRIV_KEY_INFO_bio(BIO * bp,PKCS8_PRIV_KEY_INFO * p8inf)461 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf)
462 {
463 return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp,
464 p8inf);
465 }
466
i2d_PKCS8PrivateKeyInfo_bio(BIO * bp,EVP_PKEY * key)467 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key)
468 {
469 PKCS8_PRIV_KEY_INFO *p8inf;
470 int ret;
471 p8inf = EVP_PKEY2PKCS8(key);
472 if(!p8inf) return 0;
473 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf);
474 PKCS8_PRIV_KEY_INFO_free(p8inf);
475 return ret;
476 }
477 #endif
478
i2d_PrivateKey_bio(BIO * bp,EVP_PKEY * pkey)479 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey)
480 {
481 return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PrivateKey,bp,pkey);
482 }
483
d2i_PrivateKey_bio(BIO * bp,EVP_PKEY ** a)484 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a)
485 {
486 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a);
487 }
488
i2d_PUBKEY_bio(BIO * bp,EVP_PKEY * pkey)489 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey)
490 {
491 return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PUBKEY,bp,pkey);
492 }
493
d2i_PUBKEY_bio(BIO * bp,EVP_PKEY ** a)494 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a)
495 {
496 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a);
497 }
498