1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 2 * All rights reserved. 3 * 4 * This package is an SSL implementation written 5 * by Eric Young (eay (at) cryptsoft.com). 6 * The implementation was written so as to conform with Netscapes SSL. 7 * 8 * This library is free for commercial and non-commercial use as long as 9 * the following conditions are aheared to. The following conditions 10 * apply to all code found in this distribution, be it the RC4, RSA, 11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 12 * included with this distribution is covered by the same copyright terms 13 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 14 * 15 * Copyright remains Eric Young's, and as such any Copyright notices in 16 * the code are not to be removed. 17 * If this package is used in a product, Eric Young should be given attribution 18 * as the author of the parts of the library used. 19 * This can be in the form of a textual message at program startup or 20 * in documentation (online or textual) provided with the package. 21 * 22 * Redistribution and use in source and binary forms, with or without 23 * modification, are permitted provided that the following conditions 24 * are met: 25 * 1. Redistributions of source code must retain the copyright 26 * notice, this list of conditions and the following disclaimer. 27 * 2. Redistributions in binary form must reproduce the above copyright 28 * notice, this list of conditions and the following disclaimer in the 29 * documentation and/or other materials provided with the distribution. 30 * 3. All advertising materials mentioning features or use of this software 31 * must display the following acknowledgement: 32 * "This product includes cryptographic software written by 33 * Eric Young (eay (at) cryptsoft.com)" 34 * The word 'cryptographic' can be left out if the rouines from the library 35 * being used are not cryptographic related :-). 36 * 4. If you include any Windows specific code (or a derivative thereof) from 37 * the apps directory (application code) you must include an acknowledgement: 38 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 50 * SUCH DAMAGE. 51 * 52 * The licence and distribution terms for any publically available version or 53 * derivative of this code cannot be changed. i.e. this code cannot simply be 54 * copied and put under another distribution licence 55 * [including the GNU Public Licence.] */ 56 57 #include <openssl/asn1.h> 58 #include <openssl/buf.h> 59 #include <openssl/digest.h> 60 #include <openssl/dsa.h> 61 #include <openssl/evp.h> 62 #include <openssl/rsa.h> 63 #include <openssl/stack.h> 64 #include <openssl/x509.h> 65 66 67 extern const ASN1_ITEM RSAPrivateKey_it; 68 extern const ASN1_ITEM RSAPublicKey_it; 69 70 int X509_verify(X509 *a, EVP_PKEY *r) 71 { 72 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) 73 return 0; 74 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg, 75 a->signature,a->cert_info,r)); 76 } 77 78 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) 79 { 80 return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO), 81 a->sig_alg,a->signature,a->req_info,r)); 82 } 83 84 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) 85 { 86 x->cert_info->enc.modified = 1; 87 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 88 x->sig_alg, x->signature, x->cert_info,pkey,md)); 89 } 90 91 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) 92 { 93 x->cert_info->enc.modified = 1; 94 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF), 95 x->cert_info->signature, 96 x->sig_alg, x->signature, x->cert_info, ctx); 97 } 98 99 /* TODO(fork) 100 int X509_http_nbio(OCSP_REQ_CTX *rctx, X509 **pcert) 101 { 102 return OCSP_REQ_CTX_nbio_d2i(rctx, 103 (ASN1_VALUE **)pcert, ASN1_ITEM_rptr(X509)); 104 } 105 */ 106 107 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) 108 { 109 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL, 110 x->signature, x->req_info,pkey,md)); 111 } 112 113 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) 114 { 115 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO), 116 x->sig_alg, NULL, x->signature, x->req_info, ctx); 117 } 118 119 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) 120 { 121 x->crl->enc.modified = 1; 122 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg, 123 x->sig_alg, x->signature, x->crl,pkey,md)); 124 } 125 126 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) 127 { 128 x->crl->enc.modified = 1; 129 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO), 130 x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); 131 } 132 133 /* TODO(fork) 134 int X509_CRL_http_nbio(OCSP_REQ_CTX *rctx, X509_CRL **pcrl) 135 { 136 return OCSP_REQ_CTX_nbio_d2i(rctx, 137 (ASN1_VALUE **)pcrl, ASN1_ITEM_rptr(X509_CRL)); 138 } 139 */ 140 141 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) 142 { 143 return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL, 144 x->signature, x->spkac,pkey,md)); 145 } 146 147 #ifndef OPENSSL_NO_FP_API 148 X509 *d2i_X509_fp(FILE *fp, X509 **x509) 149 { 150 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509); 151 } 152 153 int i2d_X509_fp(FILE *fp, X509 *x509) 154 { 155 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509); 156 } 157 #endif 158 159 X509 *d2i_X509_bio(BIO *bp, X509 **x509) 160 { 161 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509); 162 } 163 164 int i2d_X509_bio(BIO *bp, X509 *x509) 165 { 166 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509); 167 } 168 169 #ifndef OPENSSL_NO_FP_API 170 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) 171 { 172 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 173 } 174 175 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) 176 { 177 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); 178 } 179 #endif 180 181 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) 182 { 183 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 184 } 185 186 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) 187 { 188 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); 189 } 190 191 /* TODO(fork) */ 192 #if 0 193 #ifndef OPENSSL_NO_FP_API 194 PKCS7 *d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) 195 { 196 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); 197 } 198 199 int i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) 200 { 201 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); 202 } 203 #endif 204 205 PKCS7 *d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) 206 { 207 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); 208 } 209 210 int i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) 211 { 212 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); 213 } 214 #endif 215 216 #ifndef OPENSSL_NO_FP_API 217 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) 218 { 219 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 220 } 221 222 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) 223 { 224 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 225 } 226 #endif 227 228 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) 229 { 230 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 231 } 232 233 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) 234 { 235 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 236 } 237 238 239 #ifndef OPENSSL_NO_FP_API 240 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) 241 { 242 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 243 } 244 245 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) 246 { 247 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); 248 } 249 250 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) 251 { 252 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 253 } 254 255 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) 256 { 257 return ASN1_d2i_fp((void *(*)(void)) 258 RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp, 259 (void **)rsa); 260 } 261 262 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) 263 { 264 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); 265 } 266 267 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa) 268 { 269 return ASN1_i2d_fp((I2D_OF_const(void))i2d_RSA_PUBKEY,fp,rsa); 270 } 271 #endif 272 273 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) 274 { 275 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); 276 } 277 278 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) 279 { 280 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); 281 } 282 283 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) 284 { 285 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); 286 } 287 288 289 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa) 290 { 291 return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa); 292 } 293 294 int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) 295 { 296 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); 297 } 298 299 int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa) 300 { 301 return ASN1_i2d_bio_of_const(RSA,i2d_RSA_PUBKEY,bp,rsa); 302 } 303 304 #ifndef OPENSSL_NO_DSA 305 #ifndef OPENSSL_NO_FP_API 306 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) 307 { 308 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa); 309 } 310 311 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) 312 { 313 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa); 314 } 315 316 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa) 317 { 318 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa); 319 } 320 321 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa) 322 { 323 return ASN1_i2d_fp_of_const(DSA,i2d_DSA_PUBKEY,fp,dsa); 324 } 325 #endif 326 327 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) 328 { 329 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa 330 ); 331 } 332 333 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) 334 { 335 return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa); 336 } 337 338 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa) 339 { 340 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa); 341 } 342 343 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa) 344 { 345 return ASN1_i2d_bio_of_const(DSA,i2d_DSA_PUBKEY,bp,dsa); 346 } 347 348 #endif 349 350 #ifndef OPENSSL_NO_FP_API 351 EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey) 352 { 353 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey); 354 } 355 356 int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey) 357 { 358 return ASN1_i2d_fp_of_const(EC_KEY,i2d_EC_PUBKEY,fp,eckey); 359 } 360 361 EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey) 362 { 363 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey); 364 } 365 366 int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey) 367 { 368 return ASN1_i2d_fp_of_const(EC_KEY,i2d_ECPrivateKey,fp,eckey); 369 } 370 #endif 371 EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey) 372 { 373 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey); 374 } 375 376 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa) 377 { 378 return ASN1_i2d_bio_of_const(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa); 379 } 380 381 EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey) 382 { 383 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey); 384 } 385 386 int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey) 387 { 388 return ASN1_i2d_bio_of_const(EC_KEY,i2d_ECPrivateKey,bp,eckey); 389 } 390 391 392 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 393 unsigned int *len) 394 { 395 ASN1_BIT_STRING *key; 396 key = X509_get0_pubkey_bitstr(data); 397 if(!key) return 0; 398 return EVP_Digest(key->data, key->length, md, len, type, NULL); 399 } 400 401 int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, 402 unsigned int *len) 403 { 404 return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len)); 405 } 406 407 int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, 408 unsigned int *len) 409 { 410 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len)); 411 } 412 413 int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, 414 unsigned int *len) 415 { 416 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len)); 417 } 418 419 int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, 420 unsigned int *len) 421 { 422 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len)); 423 } 424 425 #if 0 /* TODO(fork): remove */ 426 int PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, const EVP_MD *type, 427 unsigned char *md, unsigned int *len) 428 { 429 return(ASN1_item_digest(ASN1_ITEM_rptr(PKCS7_ISSUER_AND_SERIAL),type, 430 (char *)data,md,len)); 431 } 432 #endif 433 434 #ifndef OPENSSL_NO_FP_API 435 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) 436 { 437 return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8); 438 } 439 440 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) 441 { 442 return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8); 443 } 444 #endif 445 446 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) 447 { 448 return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8); 449 } 450 451 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) 452 { 453 return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8); 454 } 455 456 #ifndef OPENSSL_NO_FP_API 457 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, 458 PKCS8_PRIV_KEY_INFO **p8inf) 459 { 460 return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new, 461 d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf); 462 } 463 464 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) 465 { 466 return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp, 467 p8inf); 468 } 469 470 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key) 471 { 472 PKCS8_PRIV_KEY_INFO *p8inf; 473 int ret; 474 p8inf = EVP_PKEY2PKCS8(key); 475 if(!p8inf) return 0; 476 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf); 477 PKCS8_PRIV_KEY_INFO_free(p8inf); 478 return ret; 479 } 480 481 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey) 482 { 483 return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PrivateKey,fp,pkey); 484 } 485 486 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a) 487 { 488 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a); 489 } 490 491 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey) 492 { 493 return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PUBKEY,fp,pkey); 494 } 495 496 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a) 497 { 498 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a); 499 } 500 501 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, 502 PKCS8_PRIV_KEY_INFO **p8inf) 503 { 504 return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new, 505 d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf); 506 } 507 508 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) 509 { 510 return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp, 511 p8inf); 512 } 513 514 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key) 515 { 516 PKCS8_PRIV_KEY_INFO *p8inf; 517 int ret; 518 p8inf = EVP_PKEY2PKCS8(key); 519 if(!p8inf) return 0; 520 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf); 521 PKCS8_PRIV_KEY_INFO_free(p8inf); 522 return ret; 523 } 524 #endif 525 526 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey) 527 { 528 return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PrivateKey,bp,pkey); 529 } 530 531 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a) 532 { 533 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a); 534 } 535 536 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey) 537 { 538 return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PUBKEY,bp,pkey); 539 } 540 541 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a) 542 { 543 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a); 544 } 545