• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
2  * All rights reserved.
3  *
4  * This package is an SSL implementation written
5  * by Eric Young (eay@cryptsoft.com).
6  * The implementation was written so as to conform with Netscapes SSL.
7  *
8  * This library is free for commercial and non-commercial use as long as
9  * the following conditions are aheared to.  The following conditions
10  * apply to all code found in this distribution, be it the RC4, RSA,
11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
12  * included with this distribution is covered by the same copyright terms
13  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14  *
15  * Copyright remains Eric Young's, and as such any Copyright notices in
16  * the code are not to be removed.
17  * If this package is used in a product, Eric Young should be given attribution
18  * as the author of the parts of the library used.
19  * This can be in the form of a textual message at program startup or
20  * in documentation (online or textual) provided with the package.
21  *
22  * Redistribution and use in source and binary forms, with or without
23  * modification, are permitted provided that the following conditions
24  * are met:
25  * 1. Redistributions of source code must retain the copyright
26  *    notice, this list of conditions and the following disclaimer.
27  * 2. Redistributions in binary form must reproduce the above copyright
28  *    notice, this list of conditions and the following disclaimer in the
29  *    documentation and/or other materials provided with the distribution.
30  * 3. All advertising materials mentioning features or use of this software
31  *    must display the following acknowledgement:
32  *    "This product includes cryptographic software written by
33  *     Eric Young (eay@cryptsoft.com)"
34  *    The word 'cryptographic' can be left out if the rouines from the library
35  *    being used are not cryptographic related :-).
36  * 4. If you include any Windows specific code (or a derivative thereof) from
37  *    the apps directory (application code) you must include an acknowledgement:
38  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39  *
40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50  * SUCH DAMAGE.
51  *
52  * The licence and distribution terms for any publically available version or
53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
54  * copied and put under another distribution licence
55  * [including the GNU Public Licence.] */
56 
57 #include <openssl/asn1.h>
58 #include <openssl/buf.h>
59 #include <openssl/digest.h>
60 #include <openssl/dsa.h>
61 #include <openssl/evp.h>
62 #include <openssl/rsa.h>
63 #include <openssl/stack.h>
64 #include <openssl/x509.h>
65 
66 
X509_verify(X509 * a,EVP_PKEY * r)67 int X509_verify(X509 *a, EVP_PKEY *r)
68 	{
69 	if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
70 		return 0;
71 	return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg,
72 		a->signature,a->cert_info,r));
73 	}
74 
X509_REQ_verify(X509_REQ * a,EVP_PKEY * r)75 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r)
76 	{
77 	return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO),
78 		a->sig_alg,a->signature,a->req_info,r));
79 	}
80 
X509_sign(X509 * x,EVP_PKEY * pkey,const EVP_MD * md)81 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
82 	{
83 	x->cert_info->enc.modified = 1;
84 	return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
85 		x->sig_alg, x->signature, x->cert_info,pkey,md));
86 	}
87 
X509_sign_ctx(X509 * x,EVP_MD_CTX * ctx)88 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx)
89 	{
90 	x->cert_info->enc.modified = 1;
91 	return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF),
92 		x->cert_info->signature,
93 		x->sig_alg, x->signature, x->cert_info, ctx);
94 	}
95 
X509_REQ_sign(X509_REQ * x,EVP_PKEY * pkey,const EVP_MD * md)96 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md)
97 	{
98 	return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL,
99 		x->signature, x->req_info,pkey,md));
100 	}
101 
X509_REQ_sign_ctx(X509_REQ * x,EVP_MD_CTX * ctx)102 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx)
103 	{
104 	return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO),
105 		x->sig_alg, NULL, x->signature, x->req_info, ctx);
106 	}
107 
X509_CRL_sign(X509_CRL * x,EVP_PKEY * pkey,const EVP_MD * md)108 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md)
109 	{
110 	x->crl->enc.modified = 1;
111 	return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg,
112 		x->sig_alg, x->signature, x->crl,pkey,md));
113 	}
114 
X509_CRL_sign_ctx(X509_CRL * x,EVP_MD_CTX * ctx)115 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx)
116 	{
117 	x->crl->enc.modified = 1;
118 	return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO),
119 		x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx);
120 	}
121 
NETSCAPE_SPKI_sign(NETSCAPE_SPKI * x,EVP_PKEY * pkey,const EVP_MD * md)122 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md)
123 	{
124 	return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL,
125 		x->signature, x->spkac,pkey,md));
126 	}
127 
NETSCAPE_SPKI_verify(NETSCAPE_SPKI * x,EVP_PKEY * pkey)128 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *x, EVP_PKEY *pkey)
129 	{
130 	return (ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,
131 		x->signature, x->spkac, pkey));
132 	}
133 
134 #ifndef OPENSSL_NO_FP_API
d2i_X509_fp(FILE * fp,X509 ** x509)135 X509 *d2i_X509_fp(FILE *fp, X509 **x509)
136 	{
137 	return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509);
138 	}
139 
i2d_X509_fp(FILE * fp,X509 * x509)140 int i2d_X509_fp(FILE *fp, X509 *x509)
141 	{
142 	return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509);
143 	}
144 #endif
145 
d2i_X509_bio(BIO * bp,X509 ** x509)146 X509 *d2i_X509_bio(BIO *bp, X509 **x509)
147 	{
148 	return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509);
149 	}
150 
i2d_X509_bio(BIO * bp,X509 * x509)151 int i2d_X509_bio(BIO *bp, X509 *x509)
152 	{
153 	return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509);
154 	}
155 
156 #ifndef OPENSSL_NO_FP_API
d2i_X509_CRL_fp(FILE * fp,X509_CRL ** crl)157 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl)
158 	{
159 	return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
160 	}
161 
i2d_X509_CRL_fp(FILE * fp,X509_CRL * crl)162 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl)
163 	{
164 	return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
165 	}
166 #endif
167 
d2i_X509_CRL_bio(BIO * bp,X509_CRL ** crl)168 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl)
169 	{
170 	return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
171 	}
172 
i2d_X509_CRL_bio(BIO * bp,X509_CRL * crl)173 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl)
174 	{
175 	return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
176 	}
177 
178 #ifndef OPENSSL_NO_FP_API
d2i_X509_REQ_fp(FILE * fp,X509_REQ ** req)179 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req)
180 	{
181 	return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
182 	}
183 
i2d_X509_REQ_fp(FILE * fp,X509_REQ * req)184 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req)
185 	{
186 	return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
187 	}
188 #endif
189 
d2i_X509_REQ_bio(BIO * bp,X509_REQ ** req)190 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req)
191 	{
192 	return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
193 	}
194 
i2d_X509_REQ_bio(BIO * bp,X509_REQ * req)195 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req)
196 	{
197 	return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
198 	}
199 
200 
201 #ifndef OPENSSL_NO_FP_API
d2i_RSAPrivateKey_fp(FILE * fp,RSA ** rsa)202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
203 	{
204 	return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa);
205 	}
206 
i2d_RSAPrivateKey_fp(FILE * fp,RSA * rsa)207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
208 	{
209 	return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa);
210 	}
211 
d2i_RSAPublicKey_fp(FILE * fp,RSA ** rsa)212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa)
213 	{
214 	return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa);
215 	}
216 
d2i_RSA_PUBKEY_fp(FILE * fp,RSA ** rsa)217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa)
218 	{
219 	return ASN1_d2i_fp((void *(*)(void))
220 			   RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp,
221 			   (void **)rsa);
222 	}
223 
i2d_RSAPublicKey_fp(FILE * fp,RSA * rsa)224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa)
225 	{
226 	return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa);
227 	}
228 
i2d_RSA_PUBKEY_fp(FILE * fp,RSA * rsa)229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa)
230 	{
231 	return ASN1_i2d_fp((I2D_OF_const(void))i2d_RSA_PUBKEY,fp,rsa);
232 	}
233 #endif
234 
d2i_RSAPrivateKey_bio(BIO * bp,RSA ** rsa)235 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa)
236 	{
237 	return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPrivateKey, bp, rsa);
238 	}
239 
i2d_RSAPrivateKey_bio(BIO * bp,RSA * rsa)240 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa)
241 	{
242 	return ASN1_i2d_bio_of_const(RSA, i2d_RSAPrivateKey, bp, rsa);
243 	}
244 
d2i_RSAPublicKey_bio(BIO * bp,RSA ** rsa)245 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa)
246 	{
247 	return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPublicKey, bp, rsa);
248 	}
249 
250 
d2i_RSA_PUBKEY_bio(BIO * bp,RSA ** rsa)251 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa)
252 	{
253 	return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa);
254 	}
255 
i2d_RSAPublicKey_bio(BIO * bp,RSA * rsa)256 int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa)
257 	{
258 	return ASN1_i2d_bio_of_const(RSA, i2d_RSAPublicKey, bp, rsa);
259 	}
260 
i2d_RSA_PUBKEY_bio(BIO * bp,RSA * rsa)261 int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa)
262 	{
263 	return ASN1_i2d_bio_of_const(RSA,i2d_RSA_PUBKEY,bp,rsa);
264 	}
265 
266 #ifndef OPENSSL_NO_DSA
267 #ifndef OPENSSL_NO_FP_API
d2i_DSAPrivateKey_fp(FILE * fp,DSA ** dsa)268 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
269 	{
270 	return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
271 	}
272 
i2d_DSAPrivateKey_fp(FILE * fp,DSA * dsa)273 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
274 	{
275 	return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
276 	}
277 
d2i_DSA_PUBKEY_fp(FILE * fp,DSA ** dsa)278 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa)
279 	{
280 	return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa);
281 	}
282 
i2d_DSA_PUBKEY_fp(FILE * fp,DSA * dsa)283 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa)
284 	{
285 	return ASN1_i2d_fp_of_const(DSA,i2d_DSA_PUBKEY,fp,dsa);
286 	}
287 #endif
288 
d2i_DSAPrivateKey_bio(BIO * bp,DSA ** dsa)289 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa)
290 	{
291 	return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa
292 );
293 	}
294 
i2d_DSAPrivateKey_bio(BIO * bp,DSA * dsa)295 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa)
296 	{
297 	return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa);
298 	}
299 
d2i_DSA_PUBKEY_bio(BIO * bp,DSA ** dsa)300 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa)
301 	{
302 	return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa);
303 	}
304 
i2d_DSA_PUBKEY_bio(BIO * bp,DSA * dsa)305 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa)
306 	{
307 	return ASN1_i2d_bio_of_const(DSA,i2d_DSA_PUBKEY,bp,dsa);
308 	}
309 
310 #endif
311 
312 #ifndef OPENSSL_NO_FP_API
d2i_EC_PUBKEY_fp(FILE * fp,EC_KEY ** eckey)313 EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey)
314 	{
315 	return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey);
316 	}
317 
i2d_EC_PUBKEY_fp(FILE * fp,EC_KEY * eckey)318 int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey)
319 	{
320 	return ASN1_i2d_fp_of_const(EC_KEY,i2d_EC_PUBKEY,fp,eckey);
321 	}
322 
d2i_ECPrivateKey_fp(FILE * fp,EC_KEY ** eckey)323 EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey)
324 	{
325 	return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey);
326 	}
327 
i2d_ECPrivateKey_fp(FILE * fp,EC_KEY * eckey)328 int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey)
329 	{
330 	return ASN1_i2d_fp_of_const(EC_KEY,i2d_ECPrivateKey,fp,eckey);
331 	}
332 #endif
d2i_EC_PUBKEY_bio(BIO * bp,EC_KEY ** eckey)333 EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey)
334 	{
335 	return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey);
336 	}
337 
i2d_EC_PUBKEY_bio(BIO * bp,EC_KEY * ecdsa)338 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa)
339 	{
340 	return ASN1_i2d_bio_of_const(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa);
341 	}
342 
d2i_ECPrivateKey_bio(BIO * bp,EC_KEY ** eckey)343 EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey)
344 	{
345 	return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey);
346 	}
347 
i2d_ECPrivateKey_bio(BIO * bp,EC_KEY * eckey)348 int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey)
349 	{
350 	return ASN1_i2d_bio_of_const(EC_KEY,i2d_ECPrivateKey,bp,eckey);
351 	}
352 
353 
X509_pubkey_digest(const X509 * data,const EVP_MD * type,unsigned char * md,unsigned int * len)354 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
355 	     unsigned int *len)
356 	{
357 	ASN1_BIT_STRING *key;
358 	key = X509_get0_pubkey_bitstr(data);
359 	if(!key) return 0;
360 	return EVP_Digest(key->data, key->length, md, len, type, NULL);
361 	}
362 
X509_digest(const X509 * data,const EVP_MD * type,unsigned char * md,unsigned int * len)363 int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
364 	     unsigned int *len)
365 	{
366 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len));
367 	}
368 
X509_CRL_digest(const X509_CRL * data,const EVP_MD * type,unsigned char * md,unsigned int * len)369 int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md,
370 	     unsigned int *len)
371 	{
372 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len));
373 	}
374 
X509_REQ_digest(const X509_REQ * data,const EVP_MD * type,unsigned char * md,unsigned int * len)375 int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md,
376 	     unsigned int *len)
377 	{
378 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len));
379 	}
380 
X509_NAME_digest(const X509_NAME * data,const EVP_MD * type,unsigned char * md,unsigned int * len)381 int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md,
382 	     unsigned int *len)
383 	{
384 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len));
385 	}
386 
387 #ifndef OPENSSL_NO_FP_API
d2i_PKCS8_fp(FILE * fp,X509_SIG ** p8)388 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8)
389 	{
390 	return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8);
391 	}
392 
i2d_PKCS8_fp(FILE * fp,X509_SIG * p8)393 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8)
394 	{
395 	return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8);
396 	}
397 #endif
398 
d2i_PKCS8_bio(BIO * bp,X509_SIG ** p8)399 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8)
400 	{
401 	return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8);
402 	}
403 
i2d_PKCS8_bio(BIO * bp,X509_SIG * p8)404 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8)
405 	{
406 	return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8);
407 	}
408 
409 #ifndef OPENSSL_NO_FP_API
d2i_PKCS8_PRIV_KEY_INFO_fp(FILE * fp,PKCS8_PRIV_KEY_INFO ** p8inf)410 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,
411 						 PKCS8_PRIV_KEY_INFO **p8inf)
412 	{
413 	return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
414 			      d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf);
415 	}
416 
i2d_PKCS8_PRIV_KEY_INFO_fp(FILE * fp,PKCS8_PRIV_KEY_INFO * p8inf)417 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf)
418 	{
419 	return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp,
420 			      p8inf);
421 	}
422 
i2d_PKCS8PrivateKeyInfo_fp(FILE * fp,EVP_PKEY * key)423 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key)
424 	{
425 	PKCS8_PRIV_KEY_INFO *p8inf;
426 	int ret;
427 	p8inf = EVP_PKEY2PKCS8(key);
428 	if(!p8inf) return 0;
429 	ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf);
430 	PKCS8_PRIV_KEY_INFO_free(p8inf);
431 	return ret;
432 	}
433 
i2d_PrivateKey_fp(FILE * fp,EVP_PKEY * pkey)434 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey)
435 	{
436 	return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PrivateKey,fp,pkey);
437 	}
438 
d2i_PrivateKey_fp(FILE * fp,EVP_PKEY ** a)439 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a)
440 {
441 	return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a);
442 }
443 
i2d_PUBKEY_fp(FILE * fp,EVP_PKEY * pkey)444 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey)
445 	{
446 	return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PUBKEY,fp,pkey);
447 	}
448 
d2i_PUBKEY_fp(FILE * fp,EVP_PKEY ** a)449 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a)
450 {
451 	return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a);
452 }
453 
d2i_PKCS8_PRIV_KEY_INFO_bio(BIO * bp,PKCS8_PRIV_KEY_INFO ** p8inf)454 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,
455 						 PKCS8_PRIV_KEY_INFO **p8inf)
456 	{
457 	return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
458 			    d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf);
459 	}
460 
i2d_PKCS8_PRIV_KEY_INFO_bio(BIO * bp,PKCS8_PRIV_KEY_INFO * p8inf)461 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf)
462 	{
463 	return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp,
464 			       p8inf);
465 	}
466 
i2d_PKCS8PrivateKeyInfo_bio(BIO * bp,EVP_PKEY * key)467 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key)
468 	{
469 	PKCS8_PRIV_KEY_INFO *p8inf;
470 	int ret;
471 	p8inf = EVP_PKEY2PKCS8(key);
472 	if(!p8inf) return 0;
473 	ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf);
474 	PKCS8_PRIV_KEY_INFO_free(p8inf);
475 	return ret;
476 	}
477 #endif
478 
i2d_PrivateKey_bio(BIO * bp,EVP_PKEY * pkey)479 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey)
480 	{
481 	return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PrivateKey,bp,pkey);
482 	}
483 
d2i_PrivateKey_bio(BIO * bp,EVP_PKEY ** a)484 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a)
485 	{
486 	return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a);
487 	}
488 
i2d_PUBKEY_bio(BIO * bp,EVP_PKEY * pkey)489 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey)
490 	{
491 	return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PUBKEY,bp,pkey);
492 	}
493 
d2i_PUBKEY_bio(BIO * bp,EVP_PKEY ** a)494 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a)
495 	{
496 	return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a);
497 	}
498