Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(187)

Side by Side Diff: openssl/crypto/x509/x_all.c

Issue 2072073002: Delete bundled copy of OpenSSL and replace with README. (Closed) Base URL: https://chromium.googlesource.com/chromium/deps/openssl@master
Patch Set: Delete bundled copy of OpenSSL and replace with README. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « openssl/crypto/x509/x509type.c ('k') | openssl/crypto/x509v3/ext_dat.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 /* crypto/x509/x_all.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59 #include <stdio.h>
60 #include <openssl/stack.h>
61 #include "cryptlib.h"
62 #include <openssl/buffer.h>
63 #include <openssl/asn1.h>
64 #include <openssl/evp.h>
65 #include <openssl/x509.h>
66 #ifndef OPENSSL_NO_RSA
67 #include <openssl/rsa.h>
68 #endif
69 #ifndef OPENSSL_NO_DSA
70 #include <openssl/dsa.h>
71 #endif
72
73 int X509_verify(X509 *a, EVP_PKEY *r)
74 {
75 return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF),a->sig_alg,
76 a->signature,a->cert_info,r));
77 }
78
79 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r)
80 {
81 return( ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO),
82 a->sig_alg,a->signature,a->req_info,r));
83 }
84
85 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r)
86 {
87 return(ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC),
88 a->sig_algor,a->signature,a->spkac,r));
89 }
90
91 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md)
92 {
93 x->cert_info->enc.modified = 1;
94 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature ,
95 x->sig_alg, x->signature, x->cert_info,pkey,md));
96 }
97
98 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx)
99 {
100 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF),
101 x->cert_info->signature,
102 x->sig_alg, x->signature, x->cert_info, ctx);
103 }
104
105 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md)
106 {
107 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO),x->sig_alg, NULL,
108 x->signature, x->req_info,pkey,md));
109 }
110
111 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx)
112 {
113 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO),
114 x->sig_alg, NULL, x->signature, x->req_info, ctx);
115 }
116
117 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md)
118 {
119 x->crl->enc.modified = 1;
120 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO),x->crl->sig_alg,
121 x->sig_alg, x->signature, x->crl,pkey,md));
122 }
123
124 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx)
125 {
126 return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO),
127 x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx);
128 }
129
130 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md)
131 {
132 return(ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), x->sig_algor,NULL,
133 x->signature, x->spkac,pkey,md));
134 }
135
136 #ifndef OPENSSL_NO_FP_API
137 X509 *d2i_X509_fp(FILE *fp, X509 **x509)
138 {
139 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509);
140 }
141
142 int i2d_X509_fp(FILE *fp, X509 *x509)
143 {
144 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509);
145 }
146 #endif
147
148 X509 *d2i_X509_bio(BIO *bp, X509 **x509)
149 {
150 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509);
151 }
152
153 int i2d_X509_bio(BIO *bp, X509 *x509)
154 {
155 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509);
156 }
157
158 #ifndef OPENSSL_NO_FP_API
159 X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl)
160 {
161 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
162 }
163
164 int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl)
165 {
166 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl);
167 }
168 #endif
169
170 X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl)
171 {
172 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
173 }
174
175 int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl)
176 {
177 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl);
178 }
179
180 #ifndef OPENSSL_NO_FP_API
181 PKCS7 *d2i_PKCS7_fp(FILE *fp, PKCS7 **p7)
182 {
183 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS7), fp, p7);
184 }
185
186 int i2d_PKCS7_fp(FILE *fp, PKCS7 *p7)
187 {
188 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS7), fp, p7);
189 }
190 #endif
191
192 PKCS7 *d2i_PKCS7_bio(BIO *bp, PKCS7 **p7)
193 {
194 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS7), bp, p7);
195 }
196
197 int i2d_PKCS7_bio(BIO *bp, PKCS7 *p7)
198 {
199 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS7), bp, p7);
200 }
201
202 #ifndef OPENSSL_NO_FP_API
203 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req)
204 {
205 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
206 }
207
208 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req)
209 {
210 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
211 }
212 #endif
213
214 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req)
215 {
216 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
217 }
218
219 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req)
220 {
221 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
222 }
223
224 #ifndef OPENSSL_NO_RSA
225
226 #ifndef OPENSSL_NO_FP_API
227 RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa)
228 {
229 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa);
230 }
231
232 int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa)
233 {
234 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa);
235 }
236
237 RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa)
238 {
239 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa);
240 }
241
242
243 RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa)
244 {
245 return ASN1_d2i_fp((void *(*)(void))
246 RSA_new,(D2I_OF(void))d2i_RSA_PUBKEY, fp,
247 (void **)rsa);
248 }
249
250 int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa)
251 {
252 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa);
253 }
254
255 int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa)
256 {
257 return ASN1_i2d_fp((I2D_OF(void))i2d_RSA_PUBKEY,fp,rsa);
258 }
259 #endif
260
261 RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa)
262 {
263 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa);
264 }
265
266 int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa)
267 {
268 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa);
269 }
270
271 RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa)
272 {
273 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa);
274 }
275
276
277 RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa)
278 {
279 return ASN1_d2i_bio_of(RSA,RSA_new,d2i_RSA_PUBKEY,bp,rsa);
280 }
281
282 int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa)
283 {
284 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa);
285 }
286
287 int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa)
288 {
289 return ASN1_i2d_bio_of(RSA,i2d_RSA_PUBKEY,bp,rsa);
290 }
291 #endif
292
293 #ifndef OPENSSL_NO_DSA
294 #ifndef OPENSSL_NO_FP_API
295 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa)
296 {
297 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSAPrivateKey,fp,dsa);
298 }
299
300 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa)
301 {
302 return ASN1_i2d_fp_of_const(DSA,i2d_DSAPrivateKey,fp,dsa);
303 }
304
305 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa)
306 {
307 return ASN1_d2i_fp_of(DSA,DSA_new,d2i_DSA_PUBKEY,fp,dsa);
308 }
309
310 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa)
311 {
312 return ASN1_i2d_fp_of(DSA,i2d_DSA_PUBKEY,fp,dsa);
313 }
314 #endif
315
316 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa)
317 {
318 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSAPrivateKey,bp,dsa
319 );
320 }
321
322 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa)
323 {
324 return ASN1_i2d_bio_of_const(DSA,i2d_DSAPrivateKey,bp,dsa);
325 }
326
327 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa)
328 {
329 return ASN1_d2i_bio_of(DSA,DSA_new,d2i_DSA_PUBKEY,bp,dsa);
330 }
331
332 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa)
333 {
334 return ASN1_i2d_bio_of(DSA,i2d_DSA_PUBKEY,bp,dsa);
335 }
336
337 #endif
338
339 #ifndef OPENSSL_NO_EC
340 #ifndef OPENSSL_NO_FP_API
341 EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey)
342 {
343 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,fp,eckey);
344 }
345
346 int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey)
347 {
348 return ASN1_i2d_fp_of(EC_KEY,i2d_EC_PUBKEY,fp,eckey);
349 }
350
351 EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey)
352 {
353 return ASN1_d2i_fp_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,fp,eckey);
354 }
355
356 int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey)
357 {
358 return ASN1_i2d_fp_of(EC_KEY,i2d_ECPrivateKey,fp,eckey);
359 }
360 #endif
361 EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey)
362 {
363 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_EC_PUBKEY,bp,eckey);
364 }
365
366 int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *ecdsa)
367 {
368 return ASN1_i2d_bio_of(EC_KEY,i2d_EC_PUBKEY,bp,ecdsa);
369 }
370
371 EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey)
372 {
373 return ASN1_d2i_bio_of(EC_KEY,EC_KEY_new,d2i_ECPrivateKey,bp,eckey);
374 }
375
376 int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey)
377 {
378 return ASN1_i2d_bio_of(EC_KEY,i2d_ECPrivateKey,bp,eckey);
379 }
380 #endif
381
382
383 int X509_pubkey_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
384 unsigned int *len)
385 {
386 ASN1_BIT_STRING *key;
387 key = X509_get0_pubkey_bitstr(data);
388 if(!key) return 0;
389 return EVP_Digest(key->data, key->length, md, len, type, NULL);
390 }
391
392 int X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md,
393 unsigned int *len)
394 {
395 return(ASN1_item_digest(ASN1_ITEM_rptr(X509),type,(char *)data,md,len));
396 }
397
398 int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md,
399 unsigned int *len)
400 {
401 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL),type,(char *)data,md,le n));
402 }
403
404 int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md,
405 unsigned int *len)
406 {
407 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ),type,(char *)data,md,le n));
408 }
409
410 int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *m d,
411 unsigned int *len)
412 {
413 return(ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME),type,(char *)data,md,l en));
414 }
415
416 int PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, const EVP_MD * type,
417 unsigned char *md, unsigned int *len)
418 {
419 return(ASN1_item_digest(ASN1_ITEM_rptr(PKCS7_ISSUER_AND_SERIAL),type,
420 (char *)data,md,len));
421 }
422
423
424 #ifndef OPENSSL_NO_FP_API
425 X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8)
426 {
427 return ASN1_d2i_fp_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,fp,p8);
428 }
429
430 int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8)
431 {
432 return ASN1_i2d_fp_of(X509_SIG,i2d_X509_SIG,fp,p8);
433 }
434 #endif
435
436 X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8)
437 {
438 return ASN1_d2i_bio_of(X509_SIG,X509_SIG_new,d2i_X509_SIG,bp,p8);
439 }
440
441 int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8)
442 {
443 return ASN1_i2d_bio_of(X509_SIG,i2d_X509_SIG,bp,p8);
444 }
445
446 #ifndef OPENSSL_NO_FP_API
447 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,
448 PKCS8_PRIV_KEY_INFO **p8inf)
449 {
450 return ASN1_d2i_fp_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
451 d2i_PKCS8_PRIV_KEY_INFO,fp,p8inf);
452 }
453
454 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf)
455 {
456 return ASN1_i2d_fp_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,fp,
457 p8inf);
458 }
459
460 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key)
461 {
462 PKCS8_PRIV_KEY_INFO *p8inf;
463 int ret;
464 p8inf = EVP_PKEY2PKCS8(key);
465 if(!p8inf) return 0;
466 ret = i2d_PKCS8_PRIV_KEY_INFO_fp(fp, p8inf);
467 PKCS8_PRIV_KEY_INFO_free(p8inf);
468 return ret;
469 }
470
471 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey)
472 {
473 return ASN1_i2d_fp_of(EVP_PKEY,i2d_PrivateKey,fp,pkey);
474 }
475
476 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a)
477 {
478 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,fp,a);
479 }
480
481 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey)
482 {
483 return ASN1_i2d_fp_of(EVP_PKEY,i2d_PUBKEY,fp,pkey);
484 }
485
486 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a)
487 {
488 return ASN1_d2i_fp_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,fp,a);
489 }
490
491 #endif
492
493 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,
494 PKCS8_PRIV_KEY_INFO **p8inf)
495 {
496 return ASN1_d2i_bio_of(PKCS8_PRIV_KEY_INFO,PKCS8_PRIV_KEY_INFO_new,
497 d2i_PKCS8_PRIV_KEY_INFO,bp,p8inf);
498 }
499
500 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf)
501 {
502 return ASN1_i2d_bio_of(PKCS8_PRIV_KEY_INFO,i2d_PKCS8_PRIV_KEY_INFO,bp,
503 p8inf);
504 }
505
506 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key)
507 {
508 PKCS8_PRIV_KEY_INFO *p8inf;
509 int ret;
510 p8inf = EVP_PKEY2PKCS8(key);
511 if(!p8inf) return 0;
512 ret = i2d_PKCS8_PRIV_KEY_INFO_bio(bp, p8inf);
513 PKCS8_PRIV_KEY_INFO_free(p8inf);
514 return ret;
515 }
516
517 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey)
518 {
519 return ASN1_i2d_bio_of(EVP_PKEY,i2d_PrivateKey,bp,pkey);
520 }
521
522 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a)
523 {
524 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_AutoPrivateKey,bp,a);
525 }
526
527 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey)
528 {
529 return ASN1_i2d_bio_of(EVP_PKEY,i2d_PUBKEY,bp,pkey);
530 }
531
532 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a)
533 {
534 return ASN1_d2i_bio_of(EVP_PKEY,EVP_PKEY_new,d2i_PUBKEY,bp,a);
535 }
OLDNEW
« no previous file with comments | « openssl/crypto/x509/x509type.c ('k') | openssl/crypto/x509v3/ext_dat.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698