Home | History | Annotate | Download | only in x509
      1 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com)
      2  * All rights reserved.
      3  *
      4  * This package is an SSL implementation written
      5  * by Eric Young (eay (at) cryptsoft.com).
      6  * The implementation was written so as to conform with Netscapes SSL.
      7  *
      8  * This library is free for commercial and non-commercial use as long as
      9  * the following conditions are aheared to.  The following conditions
     10  * apply to all code found in this distribution, be it the RC4, RSA,
     11  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
     12  * included with this distribution is covered by the same copyright terms
     13  * except that the holder is Tim Hudson (tjh (at) cryptsoft.com).
     14  *
     15  * Copyright remains Eric Young's, and as such any Copyright notices in
     16  * the code are not to be removed.
     17  * If this package is used in a product, Eric Young should be given attribution
     18  * as the author of the parts of the library used.
     19  * This can be in the form of a textual message at program startup or
     20  * in documentation (online or textual) provided with the package.
     21  *
     22  * Redistribution and use in source and binary forms, with or without
     23  * modification, are permitted provided that the following conditions
     24  * are met:
     25  * 1. Redistributions of source code must retain the copyright
     26  *    notice, this list of conditions and the following disclaimer.
     27  * 2. Redistributions in binary form must reproduce the above copyright
     28  *    notice, this list of conditions and the following disclaimer in the
     29  *    documentation and/or other materials provided with the distribution.
     30  * 3. All advertising materials mentioning features or use of this software
     31  *    must display the following acknowledgement:
     32  *    "This product includes cryptographic software written by
     33  *     Eric Young (eay (at) cryptsoft.com)"
     34  *    The word 'cryptographic' can be left out if the rouines from the library
     35  *    being used are not cryptographic related :-).
     36  * 4. If you include any Windows specific code (or a derivative thereof) from
     37  *    the apps directory (application code) you must include an acknowledgement:
     38  *    "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)"
     39  *
     40  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
     41  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     42  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     43  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     44  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     45  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     46  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     48  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     49  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     50  * SUCH DAMAGE.
     51  *
     52  * The licence and distribution terms for any publically available version or
     53  * derivative of this code cannot be changed.  i.e. this code cannot simply be
     54  * copied and put under another distribution licence
     55  * [including the GNU Public Licence.] */
     56 
     57 #include <openssl/asn1.h>
     58 #include <openssl/buf.h>
     59 #include <openssl/digest.h>
     60 #include <openssl/dsa.h>
     61 #include <openssl/evp.h>
     62 #include <openssl/rsa.h>
     63 #include <openssl/stack.h>
     64 #include <openssl/x509.h>
     65 
     66 
     67 int X509_verify(X509 *a, EVP_PKEY *r)
     68 	{
     69 	if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
     70 		return 0;
     71 	return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg,
     72 		a->signature,a->cert_info,r));
     73 	}
     74 
     75 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r)
     76 	{
     77 	return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO),
     78 		a->sig_alg,a->signature,a->req_info,r));
     79 	}
     80 
     81 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
     82 	{
     83 	x->cert_info->enc.modified = 1;
     84 	return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
     85 		x->sig_alg, x->signature, x->cert_info,pkey,md));
     86 	}
     87 
     88 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx)
     89 	{
     90 	x->cert_info->enc.modified = 1;
     91 	return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF),
     92 		x->cert_info->signature,
     93 		x->sig_alg, x->signature, x->cert_info, ctx);
     94 	}
     95 
     96 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md)
     97 	{
     98 	return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL,
     99 		x->signature, x->req_info,pkey,md));
    100 	}
    101 
    102 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx)
    103 	{
    104 	return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO),
    105 		x->sig_alg, NULL, x->signature, x->req_info, ctx);
    106 	}
    107 
    108 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md)
    109 	{
    110 	x->crl->enc.modified = 1;
    111 	return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg,
    112 		x->sig_alg, x->signature, x->crl,pkey,md));
    113 	}
    114 
    115 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx)
    116 	{
    117 	x->crl->enc.modified = 1;
    118 	return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO),
    119 		x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx);
    120 	}
    121 
    122 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md)
    123 	{
    124 	return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL,
    125 		x->signature, x->spkac,pkey,md));
    126 	}
    127 
    128 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *x, EVP_PKEY *pkey)
    129 	{
    130 	return (ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,
    131 		x->signature, x->spkac, pkey));
    132 	}
    133 
    134 #ifndef OPENSSL_NO_FP_API
    135 X509 *d2i_X509_fp(FILE *fp, X509 **x509)
    136 	{
    137 	return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509);
    138 	}
    139 
    140 int i2d_X509_fp(FILE *fp, X509 *x509)
    141 	{
    142 	return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509);
    143 	}
    144 #endif
    145 
    146 X509 *d2i_X509_bio(BIO *bp, X509 **x509)
    147 	{
    148 	return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509);
    149 	}
    150 
    151 int i2d_X509_bio(BIO *bp, X509 *x509)
    152 	{
    153 	return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509);
    154 	}
    155 
    156 #ifndef OPENSSL_NO_FP_API
    157 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl)
    158 	{
    159 	return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
    160 	}
    161 
    162 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl)
    163 	{
    164 	return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
    165 	}
    166 #endif
    167 
    168 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl)
    169 	{
    170 	return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
    171 	}
    172 
    173 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl)
    174 	{
    175 	return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
    176 	}
    177 
    178 #ifndef OPENSSL_NO_FP_API
    179 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req)
    180 	{
    181 	return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
    182 	}
    183 
    184 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req)
    185 	{
    186 	return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
    187 	}
    188 #endif
    189 
    190 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req)
    191 	{
    192 	return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
    193 	}
    194 
    195 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req)
    196 	{
    197 	return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
    198 	}
    199 
    200 
    201 #ifndef OPENSSL_NO_FP_API
    202 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
    203 	{
    204 	return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPrivateKey, fp, rsa);
    205 	}
    206 
    207 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
    208 	{
    209 	return ASN1_i2d_fp_of_const(RSA, i2d_RSAPrivateKey, fp, rsa);
    210 	}
    211 
    212 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa)
    213 	{
    214 	return ASN1_d2i_fp_of(RSA, RSA_new, d2i_RSAPublicKey, fp, rsa);
    215 	}
    216 
    217 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa)
    218 	{
    219 	return ASN1_d2i_fp((void *(*)(void))
    220 			   RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp,
    221 			   (void **)rsa);
    222 	}
    223 
    224 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa)
    225 	{
    226 	return ASN1_i2d_fp_of_const(RSA, i2d_RSAPublicKey, fp, rsa);
    227 	}
    228 
    229 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa)
    230 	{
    231 	return ASN1_i2d_fp((I2D_OF_const(void))i2d_RSA_PUBKEY,fp,rsa);
    232 	}
    233 #endif
    234 
    235 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa)
    236 	{
    237 	return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPrivateKey, bp, rsa);
    238 	}
    239 
    240 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa)
    241 	{
    242 	return ASN1_i2d_bio_of_const(RSA, i2d_RSAPrivateKey, bp, rsa);
    243 	}
    244 
    245 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa)
    246 	{
    247 	return ASN1_d2i_bio_of(RSA, RSA_new, d2i_RSAPublicKey, bp, rsa);
    248 	}
    249 
    250 
    251 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa)
    252 	{
    253 	return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa);
    254 	}
    255 
    256 int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa)
    257 	{
    258 	return ASN1_i2d_bio_of_const(RSA, i2d_RSAPublicKey, bp, rsa);
    259 	}
    260 
    261 int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa)
    262 	{
    263 	return ASN1_i2d_bio_of_const(RSA,i2d_RSA_PUBKEY,bp,rsa);
    264 	}
    265 
    266 #ifndef OPENSSL_NO_DSA
    267 #ifndef OPENSSL_NO_FP_API
    268 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
    269 	{
    270 	return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
    271 	}
    272 
    273 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
    274 	{
    275 	return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
    276 	}
    277 
    278 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa)
    279 	{
    280 	return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa);
    281 	}
    282 
    283 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa)
    284 	{
    285 	return ASN1_i2d_fp_of_const(DSA,i2d_DSA_PUBKEY,fp,dsa);
    286 	}
    287 #endif
    288 
    289 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa)
    290 	{
    291 	return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa
    292 );
    293 	}
    294 
    295 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa)
    296 	{
    297 	return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa);
    298 	}
    299 
    300 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa)
    301 	{
    302 	return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa);
    303 	}
    304 
    305 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa)
    306 	{
    307 	return ASN1_i2d_bio_of_const(DSA,i2d_DSA_PUBKEY,bp,dsa);
    308 	}
    309 
    310 #endif
    311 
    312 #ifndef OPENSSL_NO_FP_API
    313 EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey)
    314 	{
    315 	return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey);
    316 	}
    317 
    318 int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey)
    319 	{
    320 	return ASN1_i2d_fp_of_const(EC_KEY,i2d_EC_PUBKEY,fp,eckey);
    321 	}
    322 
    323 EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey)
    324 	{
    325 	return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey);
    326 	}
    327 
    328 int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey)
    329 	{
    330 	return ASN1_i2d_fp_of_const(EC_KEY,i2d_ECPrivateKey,fp,eckey);
    331 	}
    332 #endif
    333 EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey)
    334 	{
    335 	return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey);
    336 	}
    337 
    338 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa)
    339 	{
    340 	return ASN1_i2d_bio_of_const(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa);
    341 	}
    342 
    343 EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey)
    344 	{
    345 	return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey);
    346 	}
    347 
    348 int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey)
    349 	{
    350 	return ASN1_i2d_bio_of_const(EC_KEY,i2d_ECPrivateKey,bp,eckey);
    351 	}
    352 
    353 
    354 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
    355 	     unsigned int *len)
    356 	{
    357 	ASN1_BIT_STRING *key;
    358 	key = X509_get0_pubkey_bitstr(data);
    359 	if(!key) return 0;
    360 	return EVP_Digest(key->data, key->length, md, len, type, NULL);
    361 	}
    362 
    363 int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
    364 	     unsigned int *len)
    365 	{
    366 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len));
    367 	}
    368 
    369 int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md,
    370 	     unsigned int *len)
    371 	{
    372 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,len));
    373 	}
    374 
    375 int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md,
    376 	     unsigned int *len)
    377 	{
    378 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,len));
    379 	}
    380 
    381 int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md,
    382 	     unsigned int *len)
    383 	{
    384 	return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,len));
    385 	}
    386 
    387 #ifndef OPENSSL_NO_FP_API
    388 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8)
    389 	{
    390 	return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8);
    391 	}
    392 
    393 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8)
    394 	{
    395 	return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8);
    396 	}
    397 #endif
    398 
    399 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8)
    400 	{
    401 	return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8);
    402 	}
    403 
    404 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8)
    405 	{
    406 	return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8);
    407 	}
    408 
    409 #ifndef OPENSSL_NO_FP_API
    410 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,
    411 						 PKCS8_PRIV_KEY_INFO **p8inf)
    412 	{
    413 	return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
    414 			      d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf);
    415 	}
    416 
    417 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf)
    418 	{
    419 	return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp,
    420 			      p8inf);
    421 	}
    422 
    423 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key)
    424 	{
    425 	PKCS8_PRIV_KEY_INFO *p8inf;
    426 	int ret;
    427 	p8inf = EVP_PKEY2PKCS8(key);
    428 	if(!p8inf) return 0;
    429 	ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf);
    430 	PKCS8_PRIV_KEY_INFO_free(p8inf);
    431 	return ret;
    432 	}
    433 
    434 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey)
    435 	{
    436 	return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PrivateKey,fp,pkey);
    437 	}
    438 
    439 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a)
    440 {
    441 	return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a);
    442 }
    443 
    444 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey)
    445 	{
    446 	return ASN1_i2d_fp_of_const(EVP_PKEY,i2d_PUBKEY,fp,pkey);
    447 	}
    448 
    449 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a)
    450 {
    451 	return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a);
    452 }
    453 
    454 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,
    455 						 PKCS8_PRIV_KEY_INFO **p8inf)
    456 	{
    457 	return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
    458 			    d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf);
    459 	}
    460 
    461 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf)
    462 	{
    463 	return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp,
    464 			       p8inf);
    465 	}
    466 
    467 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key)
    468 	{
    469 	PKCS8_PRIV_KEY_INFO *p8inf;
    470 	int ret;
    471 	p8inf = EVP_PKEY2PKCS8(key);
    472 	if(!p8inf) return 0;
    473 	ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf);
    474 	PKCS8_PRIV_KEY_INFO_free(p8inf);
    475 	return ret;
    476 	}
    477 #endif
    478 
    479 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey)
    480 	{
    481 	return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PrivateKey,bp,pkey);
    482 	}
    483 
    484 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a)
    485 	{
    486 	return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a);
    487 	}
    488 
    489 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey)
    490 	{
    491 	return ASN1_i2d_bio_of_const(EVP_PKEY,i2d_PUBKEY,bp,pkey);
    492 	}
    493 
    494 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a)
    495 	{
    496 	return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a);
    497 	}
    498