1 /* $OpenBSD: pem_all.c,v 1.17 2016/09/04 16:10:38 jsing Exp $ */ 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 /* ==================================================================== 59 * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 60 * 61 * Redistribution and use in source and binary forms, with or without 62 * modification, are permitted provided that the following conditions 63 * are met: 64 * 65 * 1. Redistributions of source code must retain the above copyright 66 * notice, this list of conditions and the following disclaimer. 67 * 68 * 2. Redistributions in binary form must reproduce the above copyright 69 * notice, this list of conditions and the following disclaimer in 70 * the documentation and/or other materials provided with the 71 * distribution. 72 * 73 * 3. All advertising materials mentioning features or use of this 74 * software must display the following acknowledgment: 75 * "This product includes software developed by the OpenSSL Project 76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 77 * 78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 79 * endorse or promote products derived from this software without 80 * prior written permission. For written permission, please contact 81 * openssl-core@openssl.org. 82 * 83 * 5. Products derived from this software may not be called "OpenSSL" 84 * nor may "OpenSSL" appear in their names without prior written 85 * permission of the OpenSSL Project. 86 * 87 * 6. Redistributions of any form whatsoever must retain the following 88 * acknowledgment: 89 * "This product includes software developed by the OpenSSL Project 90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)" 91 * 92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 103 * OF THE POSSIBILITY OF SUCH DAMAGE. 104 * ==================================================================== 105 * 106 * This product includes cryptographic software written by Eric Young 107 * (eay@cryptsoft.com). This product includes software written by Tim 108 * Hudson (tjh@cryptsoft.com). 109 * 110 */ 111 112 #include <stdio.h> 113 114 #include <openssl/opensslconf.h> 115 116 #include <openssl/bio.h> 117 #include <openssl/evp.h> 118 #include <openssl/pem.h> 119 #include <openssl/pkcs7.h> 120 #include <openssl/x509.h> 121 122 #ifndef OPENSSL_NO_DH 123 #include <openssl/dh.h> 124 #endif 125 #ifndef OPENSSL_NO_DSA 126 #include <openssl/dsa.h> 127 #endif 128 #ifndef OPENSSL_NO_RSA 129 #include <openssl/rsa.h> 130 #endif 131 132 #ifndef OPENSSL_NO_RSA 133 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa); 134 #endif 135 #ifndef OPENSSL_NO_DSA 136 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa); 137 #endif 138 139 #ifndef OPENSSL_NO_EC 140 static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey); 141 #endif 142 143 144 X509_REQ * 145 PEM_read_X509_REQ(FILE *fp, X509_REQ **x, pem_password_cb *cb, void *u) 146 { 147 return PEM_ASN1_read((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, fp, 148 (void **)x, cb, u); 149 } 150 151 int 152 PEM_write_X509_REQ(FILE *fp, X509_REQ *x) 153 { 154 return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, fp, 155 x, NULL, NULL, 0, NULL, NULL); 156 } 157 158 X509_REQ * 159 PEM_read_bio_X509_REQ(BIO *bp, X509_REQ **x, pem_password_cb *cb, void *u) 160 { 161 return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, bp, 162 (void **)x, cb, u); 163 } 164 165 int 166 PEM_write_bio_X509_REQ(BIO *bp, X509_REQ *x) 167 { 168 return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, bp, 169 x, NULL, NULL, 0, NULL, NULL); 170 } 171 172 int 173 PEM_write_X509_REQ_NEW(FILE *fp, X509_REQ *x) 174 { 175 return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, fp, 176 x, NULL, NULL, 0, NULL, NULL); 177 } 178 179 int 180 PEM_write_bio_X509_REQ_NEW(BIO *bp, X509_REQ *x) 181 { 182 return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, bp, 183 x, NULL, NULL, 0, NULL, NULL); 184 } 185 186 X509_CRL * 187 PEM_read_X509_CRL(FILE *fp, X509_CRL **x, pem_password_cb *cb, void *u) 188 { 189 return PEM_ASN1_read((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, fp, 190 (void **)x, cb, u); 191 } 192 193 int 194 PEM_write_X509_CRL(FILE *fp, X509_CRL *x) 195 { 196 return PEM_ASN1_write((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, fp, 197 x, NULL, NULL, 0, NULL, NULL); 198 } 199 200 X509_CRL * 201 PEM_read_bio_X509_CRL(BIO *bp, X509_CRL **x, pem_password_cb *cb, void *u) 202 { 203 return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, bp, 204 (void **)x, cb, u); 205 } 206 207 int 208 PEM_write_bio_X509_CRL(BIO *bp, X509_CRL *x) 209 { 210 return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, bp, 211 x, NULL, NULL, 0, NULL, NULL); 212 } 213 214 PKCS7 * 215 PEM_read_PKCS7(FILE *fp, PKCS7 **x, pem_password_cb *cb, void *u) 216 { 217 return PEM_ASN1_read((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, fp, 218 (void **)x, cb, u); 219 } 220 221 int 222 PEM_write_PKCS7(FILE *fp, PKCS7 *x) 223 { 224 return PEM_ASN1_write((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, fp, 225 x, NULL, NULL, 0, NULL, NULL); 226 } 227 228 PKCS7 * 229 PEM_read_bio_PKCS7(BIO *bp, PKCS7 **x, pem_password_cb *cb, void *u) 230 { 231 return PEM_ASN1_read_bio((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, bp, 232 (void **)x, cb, u); 233 } 234 235 int 236 PEM_write_bio_PKCS7(BIO *bp, PKCS7 *x) 237 { 238 return PEM_ASN1_write_bio((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, bp, 239 x, NULL, NULL, 0, NULL, NULL); 240 } 241 242 int 243 PEM_write_NETSCAPE_CERT_SEQUENCE(FILE *fp, NETSCAPE_CERT_SEQUENCE *x) 244 { 245 return PEM_ASN1_write((i2d_of_void *)i2d_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, fp, 246 x, NULL, NULL, 0, NULL, NULL); 247 } 248 249 NETSCAPE_CERT_SEQUENCE * 250 PEM_read_NETSCAPE_CERT_SEQUENCE(FILE *fp, NETSCAPE_CERT_SEQUENCE **x, pem_password_cb *cb, void *u) 251 { 252 return PEM_ASN1_read((d2i_of_void *)d2i_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, fp, 253 (void **)x, cb, u); 254 } 255 256 NETSCAPE_CERT_SEQUENCE * 257 PEM_read_bio_NETSCAPE_CERT_SEQUENCE(BIO *bp, NETSCAPE_CERT_SEQUENCE **x, pem_password_cb *cb, void *u) 258 { 259 return PEM_ASN1_read_bio((d2i_of_void *)d2i_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, bp, 260 (void **)x, cb, u); 261 } 262 263 int 264 PEM_write_bio_NETSCAPE_CERT_SEQUENCE(BIO *bp, NETSCAPE_CERT_SEQUENCE *x) 265 { 266 return PEM_ASN1_write_bio((i2d_of_void *)i2d_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, bp, 267 x, NULL, NULL, 0, NULL, NULL); 268 } 269 270 #ifndef OPENSSL_NO_RSA 271 272 /* We treat RSA or DSA private keys as a special case. 273 * 274 * For private keys we read in an EVP_PKEY structure with 275 * PEM_read_bio_PrivateKey() and extract the relevant private 276 * key: this means can handle "traditional" and PKCS#8 formats 277 * transparently. 278 */ 279 280 static RSA * 281 pkey_get_rsa(EVP_PKEY *key, RSA **rsa) 282 { 283 RSA *rtmp; 284 285 if (!key) 286 return NULL; 287 rtmp = EVP_PKEY_get1_RSA(key); 288 EVP_PKEY_free(key); 289 if (!rtmp) 290 return NULL; 291 if (rsa) { 292 RSA_free(*rsa); 293 *rsa = rtmp; 294 } 295 return rtmp; 296 } 297 298 RSA * 299 PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u) 300 { 301 EVP_PKEY *pktmp; 302 303 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); 304 return pkey_get_rsa(pktmp, rsa); 305 } 306 307 int 308 PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc, 309 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) 310 { 311 return PEM_ASN1_write((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, fp, 312 x, enc, kstr, klen, cb, u); 313 } 314 315 RSA * 316 PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, void *u) 317 { 318 EVP_PKEY *pktmp; 319 320 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); 321 return pkey_get_rsa(pktmp, rsa); 322 } 323 324 int 325 PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x, 326 const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, 327 void *u) 328 { 329 return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, bp, 330 x, enc, kstr, klen, cb, u); 331 } 332 333 RSA * 334 PEM_read_RSAPublicKey(FILE *fp, RSA **x, pem_password_cb *cb, void *u) 335 { 336 return PEM_ASN1_read((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp, 337 (void **)x, cb, u); 338 } 339 340 int 341 PEM_write_RSAPublicKey(FILE *fp, const RSA *x) 342 { 343 return PEM_ASN1_write((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp, 344 (void *)x, NULL, NULL, 0, NULL, NULL); 345 } 346 347 RSA * 348 PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x, pem_password_cb *cb, void *u) 349 { 350 return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp, 351 (void **)x, cb, u); 352 } 353 354 int 355 PEM_write_bio_RSAPublicKey(BIO *bp, const RSA *x) 356 { 357 return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp, 358 (void *)x, NULL, NULL, 0, NULL, NULL); 359 } 360 361 RSA * 362 PEM_read_RSA_PUBKEY(FILE *fp, RSA **x, pem_password_cb *cb, void *u) 363 { 364 return PEM_ASN1_read((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, fp, 365 (void **)x, cb, u); 366 } 367 368 int 369 PEM_write_RSA_PUBKEY(FILE *fp, RSA *x) 370 { 371 return PEM_ASN1_write((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, fp, 372 x, NULL, NULL, 0, NULL, NULL); 373 } 374 375 RSA * 376 PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x, pem_password_cb *cb, void *u) 377 { 378 return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, bp, 379 (void **)x, cb, u); 380 } 381 382 int 383 PEM_write_bio_RSA_PUBKEY(BIO *bp, RSA *x) 384 { 385 return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, bp, 386 x, NULL, NULL, 0, NULL, NULL); 387 } 388 389 #endif 390 391 #ifndef OPENSSL_NO_DSA 392 393 static DSA * 394 pkey_get_dsa(EVP_PKEY *key, DSA **dsa) 395 { 396 DSA *dtmp; 397 398 if (!key) 399 return NULL; 400 dtmp = EVP_PKEY_get1_DSA(key); 401 EVP_PKEY_free(key); 402 if (!dtmp) 403 return NULL; 404 if (dsa) { 405 DSA_free(*dsa); 406 *dsa = dtmp; 407 } 408 return dtmp; 409 } 410 411 DSA * 412 PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb, void *u) 413 { 414 EVP_PKEY *pktmp; 415 416 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); 417 return pkey_get_dsa(pktmp, dsa); /* will free pktmp */ 418 } 419 420 int 421 PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc, 422 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) 423 { 424 return PEM_ASN1_write((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, fp, 425 x, enc, kstr, klen, cb, u); 426 } 427 428 DSA * 429 PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, void *u) 430 { 431 EVP_PKEY *pktmp; 432 433 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); 434 return pkey_get_dsa(pktmp, dsa); /* will free pktmp */ 435 } 436 437 int 438 PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, 439 const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, 440 void *u) 441 { 442 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, bp, 443 x, enc, kstr, klen, cb, u); 444 } 445 446 DSA * 447 PEM_read_DSA_PUBKEY(FILE *fp, DSA **x, pem_password_cb *cb, void *u) 448 { 449 return PEM_ASN1_read((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, fp, 450 (void **)x, cb, u); 451 } 452 453 int 454 PEM_write_DSA_PUBKEY(FILE *fp, DSA *x) 455 { 456 return PEM_ASN1_write((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, fp, 457 x, NULL, NULL, 0, NULL, NULL); 458 } 459 460 int 461 PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x) 462 { 463 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, bp, 464 x, NULL, NULL, 0, NULL, NULL); 465 } 466 467 DSA * 468 PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x, pem_password_cb *cb, void *u) 469 { 470 return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, bp, 471 (void **)x, cb, u); 472 } 473 474 DSA * 475 PEM_read_DSAparams(FILE *fp, DSA **x, pem_password_cb *cb, void *u) 476 { 477 return PEM_ASN1_read((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, fp, 478 (void **)x, cb, u); 479 } 480 481 int 482 PEM_write_DSAparams(FILE *fp, const DSA *x) 483 { 484 return PEM_ASN1_write((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, fp, 485 (void *)x, NULL, NULL, 0, NULL, NULL); 486 } 487 488 DSA * 489 PEM_read_bio_DSAparams(BIO *bp, DSA **x, pem_password_cb *cb, void *u) 490 { 491 return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, bp, 492 (void **)x, cb, u); 493 } 494 495 int 496 PEM_write_bio_DSAparams(BIO *bp, const DSA *x) 497 { 498 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, bp, 499 (void *)x, NULL, NULL, 0, NULL, NULL); 500 } 501 502 #endif 503 504 505 #ifndef OPENSSL_NO_EC 506 static EC_KEY * 507 pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey) 508 { 509 EC_KEY *dtmp; 510 511 if (!key) 512 return NULL; 513 dtmp = EVP_PKEY_get1_EC_KEY(key); 514 EVP_PKEY_free(key); 515 if (!dtmp) 516 return NULL; 517 if (eckey) { 518 EC_KEY_free(*eckey); 519 *eckey = dtmp; 520 } 521 return dtmp; 522 } 523 524 EC_GROUP * 525 PEM_read_ECPKParameters(FILE *fp, EC_GROUP **x, pem_password_cb *cb, void *u) 526 { 527 return PEM_ASN1_read((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, fp, 528 (void **)x, cb, u); 529 } 530 531 int 532 PEM_write_ECPKParameters(FILE *fp, const EC_GROUP *x) 533 { 534 return PEM_ASN1_write((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, fp, 535 (void *)x, NULL, NULL, 0, NULL, NULL); 536 } 537 538 EC_GROUP * 539 PEM_read_bio_ECPKParameters(BIO *bp, EC_GROUP **x, pem_password_cb *cb, void *u) 540 { 541 return PEM_ASN1_read_bio((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, bp, 542 (void **)x, cb, u); 543 } 544 545 int 546 PEM_write_bio_ECPKParameters(BIO *bp, const EC_GROUP *x) 547 { 548 return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, bp, 549 (void *)x, NULL, NULL, 0, NULL, NULL); 550 } 551 552 EC_KEY * 553 PEM_read_ECPrivateKey(FILE *fp, EC_KEY **eckey, pem_password_cb *cb, void *u) 554 { 555 EVP_PKEY *pktmp; 556 557 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); 558 return pkey_get_eckey(pktmp, eckey); /* will free pktmp */ 559 } 560 561 int 562 PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc, 563 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) 564 { 565 return PEM_ASN1_write((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, fp, 566 x, enc, kstr, klen, cb, u); 567 } 568 569 EC_KEY * 570 PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb, void *u) 571 { 572 EVP_PKEY *pktmp; 573 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); 574 return pkey_get_eckey(pktmp, key); /* will free pktmp */ 575 } 576 577 int 578 PEM_write_bio_ECPrivateKey(BIO *bp, EC_KEY *x, 579 const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, 580 void *u) 581 { 582 return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, bp, 583 x, enc, kstr, klen, cb, u); 584 } 585 586 EC_KEY * 587 PEM_read_EC_PUBKEY(FILE *fp, EC_KEY **x, pem_password_cb *cb, void *u) 588 { 589 return PEM_ASN1_read((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, fp, 590 (void **)x, cb, u); 591 } 592 593 int 594 PEM_write_EC_PUBKEY(FILE *fp, EC_KEY *x) 595 { 596 return PEM_ASN1_write((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, fp, 597 x, NULL, NULL, 0, NULL, NULL); 598 } 599 600 EC_KEY * 601 PEM_read_bio_EC_PUBKEY(BIO *bp, EC_KEY **x, pem_password_cb *cb, void *u) 602 { 603 return PEM_ASN1_read_bio((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, bp, 604 (void **)x, cb, u); 605 } 606 607 int 608 PEM_write_bio_EC_PUBKEY(BIO *bp, EC_KEY *x) 609 { 610 return PEM_ASN1_write_bio((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, bp, 611 x, NULL, NULL, 0, NULL, NULL); 612 } 613 614 #endif 615 616 #ifndef OPENSSL_NO_DH 617 618 DH * 619 PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u) 620 { 621 return PEM_ASN1_read((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, fp, 622 (void **)x, cb, u); 623 } 624 625 int 626 PEM_write_DHparams(FILE *fp, const DH *x) 627 { 628 return PEM_ASN1_write((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, fp, 629 (void *)x, NULL, NULL, 0, NULL, NULL); 630 } 631 632 DH * 633 PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u) 634 { 635 return PEM_ASN1_read_bio((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, bp, 636 (void **)x, cb, u); 637 } 638 639 int 640 PEM_write_bio_DHparams(BIO *bp, const DH *x) 641 { 642 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, bp, 643 (void *)x, NULL, NULL, 0, NULL, NULL); 644 } 645 646 #endif 647 648 EVP_PKEY * 649 PEM_read_PUBKEY(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u) 650 { 651 return PEM_ASN1_read((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, fp, 652 (void **)x, cb, u); 653 } 654 655 int 656 PEM_write_PUBKEY(FILE *fp, EVP_PKEY *x) 657 { 658 return PEM_ASN1_write((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, fp, 659 x, NULL, NULL, 0, NULL, NULL); 660 } 661 662 EVP_PKEY * 663 PEM_read_bio_PUBKEY(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u) 664 { 665 return PEM_ASN1_read_bio((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, bp, 666 (void **)x, cb, u); 667 } 668 669 int 670 PEM_write_bio_PUBKEY(BIO *bp, EVP_PKEY *x) 671 { 672 return PEM_ASN1_write_bio((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, bp, 673 x, NULL, NULL, 0, NULL, NULL); 674 } 675