x_all.c revision 276864
1/* crypto/x509/x_all.c */ 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#include <stdio.h> 60#include <openssl/stack.h> 61#include "cryptlib.h" 62#include <openssl/buffer.h> 63#include <openssl/asn1.h> 64#include <openssl/evp.h> 65#include <openssl/x509.h> 66#ifndef OPENSSL_NO_RSA 67#include <openssl/rsa.h> 68#endif 69#ifndef OPENSSL_NO_DSA 70#include <openssl/dsa.h> 71#endif 72 73int X509_verify(X509 *a, EVP_PKEY *r) 74 { 75 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) 76 return 0; 77 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg, 78 a->signature,a->cert_info,r)); 79 } 80 81int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) 82 { 83 return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO), 84 a->sig_alg,a->signature,a->req_info,r)); 85 } 86 87int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) 88 { 89 return(ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), 90 a->sig_algor,a->signature,a->spkac,r)); 91 } 92 93int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 94 { 95 x->cert_info->enc.modified = 1; 96 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 97 x->sig_alg, x->signature, x->cert_info,pkey,md)); 98 } 99 100int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) 101 { 102 x->cert_info->enc.modified = 1; 103 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF), 104 x->cert_info->signature, 105 x->sig_alg, x->signature, x->cert_info, ctx); 106 } 107 108int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) 109 { 110 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL, 111 x->signature, x->req_info,pkey,md)); 112 } 113 114int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) 115 { 116 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO), 117 x->sig_alg, NULL, x->signature, x->req_info, ctx); 118 } 119 120int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) 121 { 122 x->crl->enc.modified = 1; 123 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 124 x->sig_alg, x->signature, x->crl,pkey,md)); 125 } 126 127int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) 128 { 129 x->crl->enc.modified = 1; 130 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO), 131 x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); 132 } 133 134int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) 135 { 136 return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL, 137 x->signature, x->spkac,pkey,md)); 138 } 139 140#ifndef OPENSSL_NO_FP_API 141X509 *d2i_X509_fp(FILE *fp, X509 **x509) 142 { 143 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509); 144 } 145 146int i2d_X509_fp(FILE *fp, X509 *x509) 147 { 148 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509); 149 } 150#endif 151 152X509 *d2i_X509_bio(BIO *bp, X509 **x509) 153 { 154 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509); 155 } 156 157int i2d_X509_bio(BIO *bp, X509 *x509) 158 { 159 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509); 160 } 161 162#ifndef OPENSSL_NO_FP_API 163X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) 164 { 165 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 166 } 167 168int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) 169 { 170 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 171 } 172#endif 173 174X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) 175 { 176 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 177 } 178 179int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) 180 { 181 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 182 } 183 184#ifndef OPENSSL_NO_FP_API 185PKCS7 *d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) 186 { 187 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); 188 } 189 190int i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) 191 { 192 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); 193 } 194#endif 195 196PKCS7 *d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) 197 { 198 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); 199 } 200 201int i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) 202 { 203 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); 204 } 205 206#ifndef OPENSSL_NO_FP_API 207X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) 208 { 209 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 210 } 211 212int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) 213 { 214 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 215 } 216#endif 217 218X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) 219 { 220 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 221 } 222 223int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) 224 { 225 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 226 } 227 228#ifndef OPENSSL_NO_RSA 229 230#ifndef OPENSSL_NO_FP_API 231RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 232 { 233 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 234 } 235 236int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 237 { 238 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 239 } 240 241RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) 242 { 243 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 244 } 245 246 247RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) 248 { 249 return ASN1_d2i_fp((void *(*)(void)) 250 RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp, 251 (void **)rsa); 252 } 253 254int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) 255 { 256 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 257 } 258 259int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) 260 { 261 return ASN1_i2d_fp((I2D_OF(void))i2d_RSA_PUBKEY,fp,rsa); 262 } 263#endif 264 265RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) 266 { 267 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); 268 } 269 270int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) 271 { 272 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); 273 } 274 275RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) 276 { 277 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); 278 } 279 280 281RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) 282 { 283 return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa); 284 } 285 286int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) 287 { 288 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); 289 } 290 291int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) 292 { 293 return ASN1_i2d_bio_of(RSA,i2d_RSA_PUBKEY,bp,rsa); 294 } 295#endif 296 297#ifndef OPENSSL_NO_DSA 298#ifndef OPENSSL_NO_FP_API 299DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 300 { 301 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 302 } 303 304int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 305 { 306 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); 307 } 308 309DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) 310 { 311 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa); 312 } 313 314int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) 315 { 316 return ASN1_i2d_fp_of(DSA,i2d_DSA_PUBKEY,fp,dsa); 317 } 318#endif 319 320DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) 321 { 322 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa 323); 324 } 325 326int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) 327 { 328 return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa); 329 } 330 331DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) 332 { 333 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa); 334 } 335 336int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) 337 { 338 return ASN1_i2d_bio_of(DSA,i2d_DSA_PUBKEY,bp,dsa); 339 } 340 341#endif 342 343#ifndef OPENSSL_NO_EC 344#ifndef OPENSSL_NO_FP_API 345EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey) 346 { 347 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey); 348 } 349 350int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey) 351 { 352 return ASN1_i2d_fp_of(EC_KEY,i2d_EC_PUBKEY,fp,eckey); 353 } 354 355EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) 356 { 357 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey); 358 } 359 360int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) 361 { 362 return ASN1_i2d_fp_of(EC_KEY,i2d_ECPrivateKey,fp,eckey); 363 } 364#endif 365EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey) 366 { 367 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey); 368 } 369 370int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa) 371 { 372 return ASN1_i2d_bio_of(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa); 373 } 374 375EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey) 376 { 377 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey); 378 } 379 380int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) 381 { 382 return ASN1_i2d_bio_of(EC_KEY,i2d_ECPrivateKey,bp,eckey); 383 } 384#endif 385 386 387int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 388 unsigned int *len) 389 { 390 ASN1_BIT_STRING *key; 391 key = X509_get0_pubkey_bitstr(data); 392 if(!key) return 0; 393 return EVP_Digest(key->data, key->length, md, len, type, NULL); 394 } 395 396int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 397 unsigned int *len) 398 { 399 return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len)); 400 } 401 402int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, 403 unsigned int *len) 404 { 405 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len)); 406 } 407 408int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, 409 unsigned int *len) 410 { 411 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len)); 412 } 413 414int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, 415 unsigned int *len) 416 { 417 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len)); 418 } 419 420int PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, const EVP_MD *type, 421 unsigned char *md, unsigned int *len) 422 { 423 return(ASN1_item_digest(ASN1_ITEM_rptr(PKCS7_ISSUER_AND_SERIAL),type, 424 (char *)data,md,len)); 425 } 426 427 428#ifndef OPENSSL_NO_FP_API 429X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) 430 { 431 return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8); 432 } 433 434int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) 435 { 436 return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8); 437 } 438#endif 439 440X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) 441 { 442 return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8); 443 } 444 445int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) 446 { 447 return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8); 448 } 449 450#ifndef OPENSSL_NO_FP_API 451PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, 452 PKCS8_PRIV_KEY_INFO **p8inf) 453 { 454 return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new, 455 d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf); 456 } 457 458int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) 459 { 460 return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp, 461 p8inf); 462 } 463 464int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) 465 { 466 PKCS8_PRIV_KEY_INFO *p8inf; 467 int ret; 468 p8inf = EVP_PKEY2PKCS8(key); 469 if(!p8inf) return 0; 470 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf); 471 PKCS8_PRIV_KEY_INFO_free(p8inf); 472 return ret; 473 } 474 475int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) 476 { 477 return ASN1_i2d_fp_of(EVP_PKEY,i2d_PrivateKey,fp,pkey); 478 } 479 480EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) 481{ 482 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a); 483} 484 485int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) 486 { 487 return ASN1_i2d_fp_of(EVP_PKEY,i2d_PUBKEY,fp,pkey); 488 } 489 490EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a) 491{ 492 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a); 493} 494 495#endif 496 497PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, 498 PKCS8_PRIV_KEY_INFO **p8inf) 499 { 500 return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new, 501 d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf); 502 } 503 504int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) 505 { 506 return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp, 507 p8inf); 508 } 509 510int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) 511 { 512 PKCS8_PRIV_KEY_INFO *p8inf; 513 int ret; 514 p8inf = EVP_PKEY2PKCS8(key); 515 if(!p8inf) return 0; 516 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf); 517 PKCS8_PRIV_KEY_INFO_free(p8inf); 518 return ret; 519 } 520 521int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) 522 { 523 return ASN1_i2d_bio_of(EVP_PKEY,i2d_PrivateKey,bp,pkey); 524 } 525 526EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) 527 { 528 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a); 529 } 530 531int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) 532 { 533 return ASN1_i2d_bio_of(EVP_PKEY,i2d_PUBKEY,bp,pkey); 534 } 535 536EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a) 537 { 538 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a); 539 } 540