x_all.c revision 68651
154359Sroberto/* crypto/x509/x_all.c */ 254359Sroberto/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 354359Sroberto * All rights reserved. 454359Sroberto * 554359Sroberto * This package is an SSL implementation written 654359Sroberto * by Eric Young (eay@cryptsoft.com). 754359Sroberto * The implementation was written so as to conform with Netscapes SSL. 854359Sroberto * 954359Sroberto * This library is free for commercial and non-commercial use as long as 1054359Sroberto * the following conditions are aheared to. The following conditions 1154359Sroberto * apply to all code found in this distribution, be it the RC4, RSA, 1254359Sroberto * lhash, DES, etc., code; not just the SSL code. The SSL documentation 1354359Sroberto * included with this distribution is covered by the same copyright terms 1454359Sroberto * except that the holder is Tim Hudson (tjh@cryptsoft.com). 1554359Sroberto * 1654359Sroberto * Copyright remains Eric Young's, and as such any Copyright notices in 1754359Sroberto * the code are not to be removed. 1854359Sroberto * If this package is used in a product, Eric Young should be given attribution 1954359Sroberto * as the author of the parts of the library used. 2054359Sroberto * This can be in the form of a textual message at program startup or 2154359Sroberto * in documentation (online or textual) provided with the package. 2254359Sroberto * 2354359Sroberto * Redistribution and use in source and binary forms, with or without 2454359Sroberto * modification, are permitted provided that the following conditions 2554359Sroberto * are met: 2654359Sroberto * 1. Redistributions of source code must retain the copyright 2754359Sroberto * notice, this list of conditions and the following disclaimer. 2854359Sroberto * 2. Redistributions in binary form must reproduce the above copyright 2954359Sroberto * notice, this list of conditions and the following disclaimer in the 3054359Sroberto * documentation and/or other materials provided with the distribution. 3154359Sroberto * 3. All advertising materials mentioning features or use of this software 3254359Sroberto * must display the following acknowledgement: 3354359Sroberto * "This product includes cryptographic software written by 3454359Sroberto * Eric Young (eay@cryptsoft.com)" 3554359Sroberto * The word 'cryptographic' can be left out if the rouines from the library 3654359Sroberto * being used are not cryptographic related :-). 3754359Sroberto * 4. If you include any Windows specific code (or a derivative thereof) from 3854359Sroberto * the apps directory (application code) you must include an acknowledgement: 3954359Sroberto * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 4054359Sroberto * 4154359Sroberto * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 4254359Sroberto * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 4354359Sroberto * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 4454359Sroberto * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 4554359Sroberto * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 4654359Sroberto * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 4754359Sroberto * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 4854359Sroberto * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 4954359Sroberto * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 5054359Sroberto * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 5154359Sroberto * SUCH DAMAGE. 5254359Sroberto * 5354359Sroberto * The licence and distribution terms for any publically available version or 5454359Sroberto * derivative of this code cannot be changed. i.e. this code cannot simply be 5554359Sroberto * copied and put under another distribution licence 5654359Sroberto * [including the GNU Public Licence.] 5754359Sroberto */ 5854359Sroberto 5954359Sroberto#include <stdio.h> 6054359Sroberto#undef SSLEAY_MACROS 6154359Sroberto#include <openssl/stack.h> 6254359Sroberto#include "cryptlib.h" 6354359Sroberto#include <openssl/buffer.h> 64#include <openssl/asn1.h> 65#include <openssl/evp.h> 66#include <openssl/x509.h> 67 68int X509_verify(X509 *a, EVP_PKEY *r) 69 { 70 return(ASN1_verify((int (*)())i2d_X509_CINF,a->sig_alg, 71 a->signature,(char *)a->cert_info,r)); 72 } 73 74int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) 75 { 76 return( ASN1_verify((int (*)())i2d_X509_REQ_INFO, 77 a->sig_alg,a->signature,(char *)a->req_info,r)); 78 } 79 80int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r) 81 { 82 return(ASN1_verify((int (*)())i2d_X509_CRL_INFO, 83 a->sig_alg, a->signature,(char *)a->crl,r)); 84 } 85 86int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) 87 { 88 return(ASN1_verify((int (*)())i2d_NETSCAPE_SPKAC, 89 a->sig_algor,a->signature, (char *)a->spkac,r)); 90 } 91 92int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 93 { 94 return(ASN1_sign((int (*)())i2d_X509_CINF, x->cert_info->signature, 95 x->sig_alg, x->signature, (char *)x->cert_info,pkey,md)); 96 } 97 98int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) 99 { 100 return(ASN1_sign((int (*)())i2d_X509_REQ_INFO,x->sig_alg, NULL, 101 x->signature, (char *)x->req_info,pkey,md)); 102 } 103 104int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) 105 { 106 return(ASN1_sign((int (*)())i2d_X509_CRL_INFO,x->crl->sig_alg, 107 x->sig_alg, x->signature, (char *)x->crl,pkey,md)); 108 } 109 110int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) 111 { 112 return(ASN1_sign((int (*)())i2d_NETSCAPE_SPKAC, x->sig_algor,NULL, 113 x->signature, (char *)x->spkac,pkey,md)); 114 } 115 116X509_ATTRIBUTE *X509_ATTRIBUTE_dup(X509_ATTRIBUTE *xa) 117 { 118 return((X509_ATTRIBUTE *)ASN1_dup((int (*)())i2d_X509_ATTRIBUTE, 119 (char *(*)())d2i_X509_ATTRIBUTE,(char *)xa)); 120 } 121 122X509 *X509_dup(X509 *x509) 123 { 124 return((X509 *)ASN1_dup((int (*)())i2d_X509, 125 (char *(*)())d2i_X509,(char *)x509)); 126 } 127 128X509_EXTENSION *X509_EXTENSION_dup(X509_EXTENSION *ex) 129 { 130 return((X509_EXTENSION *)ASN1_dup( 131 (int (*)())i2d_X509_EXTENSION, 132 (char *(*)())d2i_X509_EXTENSION,(char *)ex)); 133 } 134 135#ifndef NO_FP_API 136X509 *d2i_X509_fp(FILE *fp, X509 **x509) 137 { 138 return((X509 *)ASN1_d2i_fp((char *(*)())X509_new, 139 (char *(*)())d2i_X509, (fp),(unsigned char **)(x509))); 140 } 141 142int i2d_X509_fp(FILE *fp, X509 *x509) 143 { 144 return(ASN1_i2d_fp(i2d_X509,fp,(unsigned char *)x509)); 145 } 146#endif 147 148X509 *d2i_X509_bio(BIO *bp, X509 **x509) 149 { 150 return((X509 *)ASN1_d2i_bio((char *(*)())X509_new, 151 (char *(*)())d2i_X509, (bp),(unsigned char **)(x509))); 152 } 153 154int i2d_X509_bio(BIO *bp, X509 *x509) 155 { 156 return(ASN1_i2d_bio(i2d_X509,bp,(unsigned char *)x509)); 157 } 158 159X509_CRL *X509_CRL_dup(X509_CRL *crl) 160 { 161 return((X509_CRL *)ASN1_dup((int (*)())i2d_X509_CRL, 162 (char *(*)())d2i_X509_CRL,(char *)crl)); 163 } 164 165#ifndef NO_FP_API 166X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) 167 { 168 return((X509_CRL *)ASN1_d2i_fp((char *(*)()) 169 X509_CRL_new,(char *(*)())d2i_X509_CRL, (fp), 170 (unsigned char **)(crl))); 171 } 172 173int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) 174 { 175 return(ASN1_i2d_fp(i2d_X509_CRL,fp,(unsigned char *)crl)); 176 } 177#endif 178 179X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) 180 { 181 return((X509_CRL *)ASN1_d2i_bio((char *(*)()) 182 X509_CRL_new,(char *(*)())d2i_X509_CRL, (bp), 183 (unsigned char **)(crl))); 184 } 185 186int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) 187 { 188 return(ASN1_i2d_bio(i2d_X509_CRL,bp,(unsigned char *)crl)); 189 } 190 191PKCS7 *PKCS7_dup(PKCS7 *p7) 192 { 193 return((PKCS7 *)ASN1_dup((int (*)())i2d_PKCS7, 194 (char *(*)())d2i_PKCS7,(char *)p7)); 195 } 196 197#ifndef NO_FP_API 198PKCS7 *d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) 199 { 200 return((PKCS7 *)ASN1_d2i_fp((char *(*)()) 201 PKCS7_new,(char *(*)())d2i_PKCS7, (fp), 202 (unsigned char **)(p7))); 203 } 204 205int i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) 206 { 207 return(ASN1_i2d_fp(i2d_PKCS7,fp,(unsigned char *)p7)); 208 } 209#endif 210 211PKCS7 *d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) 212 { 213 return((PKCS7 *)ASN1_d2i_bio((char *(*)()) 214 PKCS7_new,(char *(*)())d2i_PKCS7, (bp), 215 (unsigned char **)(p7))); 216 } 217 218int i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) 219 { 220 return(ASN1_i2d_bio(i2d_PKCS7,bp,(unsigned char *)p7)); 221 } 222 223X509_REQ *X509_REQ_dup(X509_REQ *req) 224 { 225 return((X509_REQ *)ASN1_dup((int (*)())i2d_X509_REQ, 226 (char *(*)())d2i_X509_REQ,(char *)req)); 227 } 228 229#ifndef NO_FP_API 230X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) 231 { 232 return((X509_REQ *)ASN1_d2i_fp((char *(*)()) 233 X509_REQ_new, (char *(*)())d2i_X509_REQ, (fp), 234 (unsigned char **)(req))); 235 } 236 237int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) 238 { 239 return(ASN1_i2d_fp(i2d_X509_REQ,fp,(unsigned char *)req)); 240 } 241#endif 242 243X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) 244 { 245 return((X509_REQ *)ASN1_d2i_bio((char *(*)()) 246 X509_REQ_new, (char *(*)())d2i_X509_REQ, (bp), 247 (unsigned char **)(req))); 248 } 249 250int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) 251 { 252 return(ASN1_i2d_bio(i2d_X509_REQ,bp,(unsigned char *)req)); 253 } 254 255#ifndef NO_RSA 256RSA *RSAPublicKey_dup(RSA *rsa) 257 { 258 return((RSA *)ASN1_dup((int (*)())i2d_RSAPublicKey, 259 (char *(*)())d2i_RSAPublicKey,(char *)rsa)); 260 } 261 262RSA *RSAPrivateKey_dup(RSA *rsa) 263 { 264 return((RSA *)ASN1_dup((int (*)())i2d_RSAPrivateKey, 265 (char *(*)())d2i_RSAPrivateKey,(char *)rsa)); 266 } 267 268#ifndef NO_FP_API 269RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 270 { 271 return((RSA *)ASN1_d2i_fp((char *(*)()) 272 RSA_new,(char *(*)())d2i_RSAPrivateKey, (fp), 273 (unsigned char **)(rsa))); 274 } 275 276int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 277 { 278 return(ASN1_i2d_fp(i2d_RSAPrivateKey,fp,(unsigned char *)rsa)); 279 } 280 281RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) 282 { 283 return((RSA *)ASN1_d2i_fp((char *(*)()) 284 RSA_new,(char *(*)())d2i_RSAPublicKey, (fp), 285 (unsigned char **)(rsa))); 286 } 287 288RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) 289 { 290 return((RSA *)ASN1_d2i_fp((char *(*)()) 291 RSA_new,(char *(*)())d2i_RSA_PUBKEY, (fp), 292 (unsigned char **)(rsa))); 293 } 294 295int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) 296 { 297 return(ASN1_i2d_fp(i2d_RSAPublicKey,fp,(unsigned char *)rsa)); 298 } 299 300int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) 301 { 302 return(ASN1_i2d_fp(i2d_RSA_PUBKEY,fp,(unsigned char *)rsa)); 303 } 304#endif 305 306RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) 307 { 308 return((RSA *)ASN1_d2i_bio((char *(*)()) 309 RSA_new,(char *(*)())d2i_RSAPrivateKey, (bp), 310 (unsigned char **)(rsa))); 311 } 312 313int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) 314 { 315 return(ASN1_i2d_bio(i2d_RSAPrivateKey,bp,(unsigned char *)rsa)); 316 } 317 318RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) 319 { 320 return((RSA *)ASN1_d2i_bio((char *(*)()) 321 RSA_new,(char *(*)())d2i_RSAPublicKey, (bp), 322 (unsigned char **)(rsa))); 323 } 324 325RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) 326 { 327 return((RSA *)ASN1_d2i_bio((char *(*)()) 328 RSA_new,(char *(*)())d2i_RSA_PUBKEY, (bp), 329 (unsigned char **)(rsa))); 330 } 331 332int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) 333 { 334 return(ASN1_i2d_bio(i2d_RSAPublicKey,bp,(unsigned char *)rsa)); 335 } 336 337int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) 338 { 339 return(ASN1_i2d_bio(i2d_RSA_PUBKEY,bp,(unsigned char *)rsa)); 340 } 341#endif 342 343#ifndef NO_DSA 344#ifndef NO_FP_API 345DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 346 { 347 return((DSA *)ASN1_d2i_fp((char *(*)()) 348 DSA_new,(char *(*)())d2i_DSAPrivateKey, (fp), 349 (unsigned char **)(dsa))); 350 } 351 352int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 353 { 354 return(ASN1_i2d_fp(i2d_DSAPrivateKey,fp,(unsigned char *)dsa)); 355 } 356 357DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) 358 { 359 return((DSA *)ASN1_d2i_fp((char *(*)()) 360 DSA_new,(char *(*)())d2i_DSA_PUBKEY, (fp), 361 (unsigned char **)(dsa))); 362 } 363 364int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) 365 { 366 return(ASN1_i2d_fp(i2d_DSA_PUBKEY,fp,(unsigned char *)dsa)); 367 } 368#endif 369 370DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) 371 { 372 return((DSA *)ASN1_d2i_bio((char *(*)()) 373 DSA_new,(char *(*)())d2i_DSAPrivateKey, (bp), 374 (unsigned char **)(dsa))); 375 } 376 377int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) 378 { 379 return(ASN1_i2d_bio(i2d_DSAPrivateKey,bp,(unsigned char *)dsa)); 380 } 381 382DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) 383 { 384 return((DSA *)ASN1_d2i_bio((char *(*)()) 385 DSA_new,(char *(*)())d2i_DSA_PUBKEY, (bp), 386 (unsigned char **)(dsa))); 387 } 388 389int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) 390 { 391 return(ASN1_i2d_bio(i2d_DSA_PUBKEY,bp,(unsigned char *)dsa)); 392 } 393 394#endif 395 396X509_ALGOR *X509_ALGOR_dup(X509_ALGOR *xn) 397 { 398 return((X509_ALGOR *)ASN1_dup((int (*)())i2d_X509_ALGOR, 399 (char *(*)())d2i_X509_ALGOR,(char *)xn)); 400 } 401 402X509_NAME *X509_NAME_dup(X509_NAME *xn) 403 { 404 return((X509_NAME *)ASN1_dup((int (*)())i2d_X509_NAME, 405 (char *(*)())d2i_X509_NAME,(char *)xn)); 406 } 407 408X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne) 409 { 410 return((X509_NAME_ENTRY *)ASN1_dup((int (*)())i2d_X509_NAME_ENTRY, 411 (char *(*)())d2i_X509_NAME_ENTRY,(char *)ne)); 412 } 413 414int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 415 unsigned int *len) 416 { 417 return(ASN1_digest((int (*)())i2d_X509,type,(char *)data,md,len)); 418 } 419 420int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, 421 unsigned int *len) 422 { 423 return(ASN1_digest((int (*)())i2d_X509_CRL,type,(char *)data,md,len)); 424 } 425 426int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, 427 unsigned int *len) 428 { 429 return(ASN1_digest((int (*)())i2d_X509_REQ,type,(char *)data,md,len)); 430 } 431 432int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, 433 unsigned int *len) 434 { 435 return(ASN1_digest((int (*)())i2d_X509_NAME,type,(char *)data,md,len)); 436 } 437 438int PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, const EVP_MD *type, 439 unsigned char *md, unsigned int *len) 440 { 441 return(ASN1_digest((int (*)())i2d_PKCS7_ISSUER_AND_SERIAL,type, 442 (char *)data,md,len)); 443 } 444 445 446#ifndef NO_FP_API 447X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) 448 { 449 return((X509_SIG *)ASN1_d2i_fp((char *(*)())X509_SIG_new, 450 (char *(*)())d2i_X509_SIG, (fp),(unsigned char **)(p8))); 451 } 452 453int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) 454 { 455 return(ASN1_i2d_fp(i2d_X509_SIG,fp,(unsigned char *)p8)); 456 } 457#endif 458 459X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) 460 { 461 return((X509_SIG *)ASN1_d2i_bio((char *(*)())X509_SIG_new, 462 (char *(*)())d2i_X509_SIG, (bp),(unsigned char **)(p8))); 463 } 464 465int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) 466 { 467 return(ASN1_i2d_bio(i2d_X509_SIG,bp,(unsigned char *)p8)); 468 } 469 470#ifndef NO_FP_API 471PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, 472 PKCS8_PRIV_KEY_INFO **p8inf) 473 { 474 return((PKCS8_PRIV_KEY_INFO *)ASN1_d2i_fp( 475 (char *(*)())PKCS8_PRIV_KEY_INFO_new, 476 (char *(*)())d2i_PKCS8_PRIV_KEY_INFO, (fp), 477 (unsigned char **)(p8inf))); 478 } 479 480int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) 481 { 482 return(ASN1_i2d_fp(i2d_PKCS8_PRIV_KEY_INFO,fp,(unsigned char *)p8inf)); 483 } 484 485int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) 486 { 487 PKCS8_PRIV_KEY_INFO *p8inf; 488 int ret; 489 p8inf = EVP_PKEY2PKCS8(key); 490 if(!p8inf) return 0; 491 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf); 492 PKCS8_PRIV_KEY_INFO_free(p8inf); 493 return ret; 494 } 495 496int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) 497 { 498 return(ASN1_i2d_fp(i2d_PrivateKey,fp,(unsigned char *)pkey)); 499 } 500 501EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) 502{ 503 return((EVP_PKEY *)ASN1_d2i_fp((char *(*)())EVP_PKEY_new, 504 (char *(*)())d2i_AutoPrivateKey, (fp),(unsigned char **)(a))); 505} 506 507int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) 508 { 509 return(ASN1_i2d_fp(i2d_PUBKEY,fp,(unsigned char *)pkey)); 510 } 511 512EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a) 513{ 514 return((EVP_PKEY *)ASN1_d2i_fp((char *(*)())EVP_PKEY_new, 515 (char *(*)())d2i_PUBKEY, (fp),(unsigned char **)(a))); 516} 517 518#endif 519 520PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, 521 PKCS8_PRIV_KEY_INFO **p8inf) 522 { 523 return((PKCS8_PRIV_KEY_INFO *)ASN1_d2i_bio( 524 (char *(*)())PKCS8_PRIV_KEY_INFO_new, 525 (char *(*)())d2i_PKCS8_PRIV_KEY_INFO, (bp), 526 (unsigned char **)(p8inf))); 527 } 528 529int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) 530 { 531 return(ASN1_i2d_bio(i2d_PKCS8_PRIV_KEY_INFO,bp,(unsigned char *)p8inf)); 532 } 533 534int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) 535 { 536 PKCS8_PRIV_KEY_INFO *p8inf; 537 int ret; 538 p8inf = EVP_PKEY2PKCS8(key); 539 if(!p8inf) return 0; 540 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf); 541 PKCS8_PRIV_KEY_INFO_free(p8inf); 542 return ret; 543 } 544 545int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) 546 { 547 return(ASN1_i2d_bio(i2d_PrivateKey,bp,(unsigned char *)pkey)); 548 } 549 550EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) 551 { 552 return((EVP_PKEY *)ASN1_d2i_bio((char *(*)())EVP_PKEY_new, 553 (char *(*)())d2i_AutoPrivateKey, (bp),(unsigned char **)(a))); 554 } 555 556int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) 557 { 558 return(ASN1_i2d_bio(i2d_PUBKEY,bp,(unsigned char *)pkey)); 559 } 560 561EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a) 562 { 563 return((EVP_PKEY *)ASN1_d2i_bio((char *(*)())EVP_PKEY_new, 564 (char *(*)())d2i_PUBKEY, (bp),(unsigned char **)(a))); 565 } 566