dmake: do not set MAKEFLAGS=k
[unleashed/tickless.git] / lib / libcrypto / pem / pem_all.c
blobf5211f29a6788d2ac198de17dfa05b5b1bd3a5ec
1 /* $OpenBSD: pem_all.c,v 1.17 2016/09/04 16:10:38 jsing Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
58 /* ====================================================================
59 * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
61 * Redistribution and use in source and binary forms, with or without
62 * modification, are permitted provided that the following conditions
63 * are met:
65 * 1. Redistributions of source code must retain the above copyright
66 * notice, this list of conditions and the following disclaimer.
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in
70 * the documentation and/or other materials provided with the
71 * distribution.
73 * 3. All advertising materials mentioning features or use of this
74 * software must display the following acknowledgment:
75 * "This product includes software developed by the OpenSSL Project
76 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
78 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79 * endorse or promote products derived from this software without
80 * prior written permission. For written permission, please contact
81 * openssl-core@openssl.org.
83 * 5. Products derived from this software may not be called "OpenSSL"
84 * nor may "OpenSSL" appear in their names without prior written
85 * permission of the OpenSSL Project.
87 * 6. Redistributions of any form whatsoever must retain the following
88 * acknowledgment:
89 * "This product includes software developed by the OpenSSL Project
90 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
92 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
96 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103 * OF THE POSSIBILITY OF SUCH DAMAGE.
104 * ====================================================================
106 * This product includes cryptographic software written by Eric Young
107 * (eay@cryptsoft.com). This product includes software written by Tim
108 * Hudson (tjh@cryptsoft.com).
112 #include <stdio.h>
114 #include <openssl/opensslconf.h>
116 #include <openssl/bio.h>
117 #include <openssl/evp.h>
118 #include <openssl/pem.h>
119 #include <openssl/pkcs7.h>
120 #include <openssl/x509.h>
122 #ifndef OPENSSL_NO_DH
123 #include <openssl/dh.h>
124 #endif
125 #ifndef OPENSSL_NO_DSA
126 #include <openssl/dsa.h>
127 #endif
128 #ifndef OPENSSL_NO_RSA
129 #include <openssl/rsa.h>
130 #endif
132 #ifndef OPENSSL_NO_RSA
133 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
134 #endif
135 #ifndef OPENSSL_NO_DSA
136 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
137 #endif
139 #ifndef OPENSSL_NO_EC
140 static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey);
141 #endif
144 X509_REQ *
145 PEM_read_X509_REQ(FILE *fp, X509_REQ **x, pem_password_cb *cb, void *u)
147 return PEM_ASN1_read((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, fp,
148 (void **)x, cb, u);
152 PEM_write_X509_REQ(FILE *fp, X509_REQ *x)
154 return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, fp,
155 x, NULL, NULL, 0, NULL, NULL);
158 X509_REQ *
159 PEM_read_bio_X509_REQ(BIO *bp, X509_REQ **x, pem_password_cb *cb, void *u)
161 return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, bp,
162 (void **)x, cb, u);
166 PEM_write_bio_X509_REQ(BIO *bp, X509_REQ *x)
168 return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, bp,
169 x, NULL, NULL, 0, NULL, NULL);
173 PEM_write_X509_REQ_NEW(FILE *fp, X509_REQ *x)
175 return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, fp,
176 x, NULL, NULL, 0, NULL, NULL);
180 PEM_write_bio_X509_REQ_NEW(BIO *bp, X509_REQ *x)
182 return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, bp,
183 x, NULL, NULL, 0, NULL, NULL);
186 X509_CRL *
187 PEM_read_X509_CRL(FILE *fp, X509_CRL **x, pem_password_cb *cb, void *u)
189 return PEM_ASN1_read((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, fp,
190 (void **)x, cb, u);
194 PEM_write_X509_CRL(FILE *fp, X509_CRL *x)
196 return PEM_ASN1_write((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, fp,
197 x, NULL, NULL, 0, NULL, NULL);
200 X509_CRL *
201 PEM_read_bio_X509_CRL(BIO *bp, X509_CRL **x, pem_password_cb *cb, void *u)
203 return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, bp,
204 (void **)x, cb, u);
208 PEM_write_bio_X509_CRL(BIO *bp, X509_CRL *x)
210 return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, bp,
211 x, NULL, NULL, 0, NULL, NULL);
214 PKCS7 *
215 PEM_read_PKCS7(FILE *fp, PKCS7 **x, pem_password_cb *cb, void *u)
217 return PEM_ASN1_read((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, fp,
218 (void **)x, cb, u);
222 PEM_write_PKCS7(FILE *fp, PKCS7 *x)
224 return PEM_ASN1_write((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, fp,
225 x, NULL, NULL, 0, NULL, NULL);
228 PKCS7 *
229 PEM_read_bio_PKCS7(BIO *bp, PKCS7 **x, pem_password_cb *cb, void *u)
231 return PEM_ASN1_read_bio((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, bp,
232 (void **)x, cb, u);
236 PEM_write_bio_PKCS7(BIO *bp, PKCS7 *x)
238 return PEM_ASN1_write_bio((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, bp,
239 x, NULL, NULL, 0, NULL, NULL);
243 PEM_write_NETSCAPE_CERT_SEQUENCE(FILE *fp, NETSCAPE_CERT_SEQUENCE *x)
245 return PEM_ASN1_write((i2d_of_void *)i2d_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, fp,
246 x, NULL, NULL, 0, NULL, NULL);
249 NETSCAPE_CERT_SEQUENCE *
250 PEM_read_NETSCAPE_CERT_SEQUENCE(FILE *fp, NETSCAPE_CERT_SEQUENCE **x, pem_password_cb *cb, void *u)
252 return PEM_ASN1_read((d2i_of_void *)d2i_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, fp,
253 (void **)x, cb, u);
256 NETSCAPE_CERT_SEQUENCE *
257 PEM_read_bio_NETSCAPE_CERT_SEQUENCE(BIO *bp, NETSCAPE_CERT_SEQUENCE **x, pem_password_cb *cb, void *u)
259 return PEM_ASN1_read_bio((d2i_of_void *)d2i_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, bp,
260 (void **)x, cb, u);
264 PEM_write_bio_NETSCAPE_CERT_SEQUENCE(BIO *bp, NETSCAPE_CERT_SEQUENCE *x)
266 return PEM_ASN1_write_bio((i2d_of_void *)i2d_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, bp,
267 x, NULL, NULL, 0, NULL, NULL);
270 #ifndef OPENSSL_NO_RSA
272 /* We treat RSA or DSA private keys as a special case.
274 * For private keys we read in an EVP_PKEY structure with
275 * PEM_read_bio_PrivateKey() and extract the relevant private
276 * key: this means can handle "traditional" and PKCS#8 formats
277 * transparently.
280 static RSA *
281 pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
283 RSA *rtmp;
285 if (!key)
286 return NULL;
287 rtmp = EVP_PKEY_get1_RSA(key);
288 EVP_PKEY_free(key);
289 if (!rtmp)
290 return NULL;
291 if (rsa) {
292 RSA_free(*rsa);
293 *rsa = rtmp;
295 return rtmp;
298 RSA *
299 PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)
301 EVP_PKEY *pktmp;
303 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
304 return pkey_get_rsa(pktmp, rsa);
308 PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc,
309 unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
311 return PEM_ASN1_write((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, fp,
312 x, enc, kstr, klen, cb, u);
315 RSA *
316 PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, void *u)
318 EVP_PKEY *pktmp;
320 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
321 return pkey_get_rsa(pktmp, rsa);
325 PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x,
326 const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
327 void *u)
329 return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, bp,
330 x, enc, kstr, klen, cb, u);
333 RSA *
334 PEM_read_RSAPublicKey(FILE *fp, RSA **x, pem_password_cb *cb, void *u)
336 return PEM_ASN1_read((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp,
337 (void **)x, cb, u);
341 PEM_write_RSAPublicKey(FILE *fp, const RSA *x)
343 return PEM_ASN1_write((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp,
344 (void *)x, NULL, NULL, 0, NULL, NULL);
347 RSA *
348 PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x, pem_password_cb *cb, void *u)
350 return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp,
351 (void **)x, cb, u);
355 PEM_write_bio_RSAPublicKey(BIO *bp, const RSA *x)
357 return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp,
358 (void *)x, NULL, NULL, 0, NULL, NULL);
361 RSA *
362 PEM_read_RSA_PUBKEY(FILE *fp, RSA **x, pem_password_cb *cb, void *u)
364 return PEM_ASN1_read((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, fp,
365 (void **)x, cb, u);
369 PEM_write_RSA_PUBKEY(FILE *fp, RSA *x)
371 return PEM_ASN1_write((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, fp,
372 x, NULL, NULL, 0, NULL, NULL);
375 RSA *
376 PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x, pem_password_cb *cb, void *u)
378 return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, bp,
379 (void **)x, cb, u);
383 PEM_write_bio_RSA_PUBKEY(BIO *bp, RSA *x)
385 return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, bp,
386 x, NULL, NULL, 0, NULL, NULL);
389 #endif
391 #ifndef OPENSSL_NO_DSA
393 static DSA *
394 pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
396 DSA *dtmp;
398 if (!key)
399 return NULL;
400 dtmp = EVP_PKEY_get1_DSA(key);
401 EVP_PKEY_free(key);
402 if (!dtmp)
403 return NULL;
404 if (dsa) {
405 DSA_free(*dsa);
406 *dsa = dtmp;
408 return dtmp;
411 DSA *
412 PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb, void *u)
414 EVP_PKEY *pktmp;
416 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
417 return pkey_get_dsa(pktmp, dsa); /* will free pktmp */
421 PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc,
422 unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
424 return PEM_ASN1_write((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, fp,
425 x, enc, kstr, klen, cb, u);
428 DSA *
429 PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, void *u)
431 EVP_PKEY *pktmp;
433 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
434 return pkey_get_dsa(pktmp, dsa); /* will free pktmp */
438 PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x,
439 const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
440 void *u)
442 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, bp,
443 x, enc, kstr, klen, cb, u);
446 DSA *
447 PEM_read_DSA_PUBKEY(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
449 return PEM_ASN1_read((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, fp,
450 (void **)x, cb, u);
454 PEM_write_DSA_PUBKEY(FILE *fp, DSA *x)
456 return PEM_ASN1_write((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, fp,
457 x, NULL, NULL, 0, NULL, NULL);
461 PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x)
463 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, bp,
464 x, NULL, NULL, 0, NULL, NULL);
467 DSA *
468 PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x, pem_password_cb *cb, void *u)
470 return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, bp,
471 (void **)x, cb, u);
474 DSA *
475 PEM_read_DSAparams(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
477 return PEM_ASN1_read((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, fp,
478 (void **)x, cb, u);
482 PEM_write_DSAparams(FILE *fp, const DSA *x)
484 return PEM_ASN1_write((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, fp,
485 (void *)x, NULL, NULL, 0, NULL, NULL);
488 DSA *
489 PEM_read_bio_DSAparams(BIO *bp, DSA **x, pem_password_cb *cb, void *u)
491 return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, bp,
492 (void **)x, cb, u);
496 PEM_write_bio_DSAparams(BIO *bp, const DSA *x)
498 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, bp,
499 (void *)x, NULL, NULL, 0, NULL, NULL);
502 #endif
505 #ifndef OPENSSL_NO_EC
506 static EC_KEY *
507 pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey)
509 EC_KEY *dtmp;
511 if (!key)
512 return NULL;
513 dtmp = EVP_PKEY_get1_EC_KEY(key);
514 EVP_PKEY_free(key);
515 if (!dtmp)
516 return NULL;
517 if (eckey) {
518 EC_KEY_free(*eckey);
519 *eckey = dtmp;
521 return dtmp;
524 EC_GROUP *
525 PEM_read_ECPKParameters(FILE *fp, EC_GROUP **x, pem_password_cb *cb, void *u)
527 return PEM_ASN1_read((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, fp,
528 (void **)x, cb, u);
532 PEM_write_ECPKParameters(FILE *fp, const EC_GROUP *x)
534 return PEM_ASN1_write((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, fp,
535 (void *)x, NULL, NULL, 0, NULL, NULL);
538 EC_GROUP *
539 PEM_read_bio_ECPKParameters(BIO *bp, EC_GROUP **x, pem_password_cb *cb, void *u)
541 return PEM_ASN1_read_bio((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, bp,
542 (void **)x, cb, u);
546 PEM_write_bio_ECPKParameters(BIO *bp, const EC_GROUP *x)
548 return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, bp,
549 (void *)x, NULL, NULL, 0, NULL, NULL);
552 EC_KEY *
553 PEM_read_ECPrivateKey(FILE *fp, EC_KEY **eckey, pem_password_cb *cb, void *u)
555 EVP_PKEY *pktmp;
557 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
558 return pkey_get_eckey(pktmp, eckey); /* will free pktmp */
562 PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc,
563 unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
565 return PEM_ASN1_write((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, fp,
566 x, enc, kstr, klen, cb, u);
569 EC_KEY *
570 PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb, void *u)
572 EVP_PKEY *pktmp;
573 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
574 return pkey_get_eckey(pktmp, key); /* will free pktmp */
578 PEM_write_bio_ECPrivateKey(BIO *bp, EC_KEY *x,
579 const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
580 void *u)
582 return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, bp,
583 x, enc, kstr, klen, cb, u);
586 EC_KEY *
587 PEM_read_EC_PUBKEY(FILE *fp, EC_KEY **x, pem_password_cb *cb, void *u)
589 return PEM_ASN1_read((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, fp,
590 (void **)x, cb, u);
594 PEM_write_EC_PUBKEY(FILE *fp, EC_KEY *x)
596 return PEM_ASN1_write((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, fp,
597 x, NULL, NULL, 0, NULL, NULL);
600 EC_KEY *
601 PEM_read_bio_EC_PUBKEY(BIO *bp, EC_KEY **x, pem_password_cb *cb, void *u)
603 return PEM_ASN1_read_bio((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, bp,
604 (void **)x, cb, u);
608 PEM_write_bio_EC_PUBKEY(BIO *bp, EC_KEY *x)
610 return PEM_ASN1_write_bio((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, bp,
611 x, NULL, NULL, 0, NULL, NULL);
614 #endif
616 #ifndef OPENSSL_NO_DH
618 DH *
619 PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u)
621 return PEM_ASN1_read((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, fp,
622 (void **)x, cb, u);
626 PEM_write_DHparams(FILE *fp, const DH *x)
628 return PEM_ASN1_write((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, fp,
629 (void *)x, NULL, NULL, 0, NULL, NULL);
632 DH *
633 PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u)
635 return PEM_ASN1_read_bio((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, bp,
636 (void **)x, cb, u);
640 PEM_write_bio_DHparams(BIO *bp, const DH *x)
642 return PEM_ASN1_write_bio((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, bp,
643 (void *)x, NULL, NULL, 0, NULL, NULL);
646 #endif
648 EVP_PKEY *
649 PEM_read_PUBKEY(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u)
651 return PEM_ASN1_read((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, fp,
652 (void **)x, cb, u);
656 PEM_write_PUBKEY(FILE *fp, EVP_PKEY *x)
658 return PEM_ASN1_write((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, fp,
659 x, NULL, NULL, 0, NULL, NULL);
662 EVP_PKEY *
663 PEM_read_bio_PUBKEY(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u)
665 return PEM_ASN1_read_bio((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, bp,
666 (void **)x, cb, u);
670 PEM_write_bio_PUBKEY(BIO *bp, EVP_PKEY *x)
672 return PEM_ASN1_write_bio((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, bp,
673 x, NULL, NULL, 0, NULL, NULL);