GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: lib/libcrypto/pem/pem_all.c Lines: 45 155 29.0 %
Date: 2017-11-07 Branches: 3 18 16.7 %

Line Branch Exec Source
1
/* $OpenBSD: pem_all.c,v 1.17 2016/09/04 16:10:38 jsing Exp $ */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3
 * All rights reserved.
4
 *
5
 * This package is an SSL implementation written
6
 * by Eric Young (eay@cryptsoft.com).
7
 * The implementation was written so as to conform with Netscapes SSL.
8
 *
9
 * This library is free for commercial and non-commercial use as long as
10
 * the following conditions are aheared to.  The following conditions
11
 * apply to all code found in this distribution, be it the RC4, RSA,
12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13
 * included with this distribution is covered by the same copyright terms
14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15
 *
16
 * Copyright remains Eric Young's, and as such any Copyright notices in
17
 * the code are not to be removed.
18
 * If this package is used in a product, Eric Young should be given attribution
19
 * as the author of the parts of the library used.
20
 * This can be in the form of a textual message at program startup or
21
 * in documentation (online or textual) provided with the package.
22
 *
23
 * Redistribution and use in source and binary forms, with or without
24
 * modification, are permitted provided that the following conditions
25
 * are met:
26
 * 1. Redistributions of source code must retain the copyright
27
 *    notice, this list of conditions and the following disclaimer.
28
 * 2. Redistributions in binary form must reproduce the above copyright
29
 *    notice, this list of conditions and the following disclaimer in the
30
 *    documentation and/or other materials provided with the distribution.
31
 * 3. All advertising materials mentioning features or use of this software
32
 *    must display the following acknowledgement:
33
 *    "This product includes cryptographic software written by
34
 *     Eric Young (eay@cryptsoft.com)"
35
 *    The word 'cryptographic' can be left out if the rouines from the library
36
 *    being used are not cryptographic related :-).
37
 * 4. If you include any Windows specific code (or a derivative thereof) from
38
 *    the apps directory (application code) you must include an acknowledgement:
39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40
 *
41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51
 * SUCH DAMAGE.
52
 *
53
 * The licence and distribution terms for any publically available version or
54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
55
 * copied and put under another distribution licence
56
 * [including the GNU Public Licence.]
57
 */
58
/* ====================================================================
59
 * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
60
 *
61
 * Redistribution and use in source and binary forms, with or without
62
 * modification, are permitted provided that the following conditions
63
 * are met:
64
 *
65
 * 1. Redistributions of source code must retain the above copyright
66
 *    notice, this list of conditions and the following disclaimer.
67
 *
68
 * 2. Redistributions in binary form must reproduce the above copyright
69
 *    notice, this list of conditions and the following disclaimer in
70
 *    the documentation and/or other materials provided with the
71
 *    distribution.
72
 *
73
 * 3. All advertising materials mentioning features or use of this
74
 *    software must display the following acknowledgment:
75
 *    "This product includes software developed by the OpenSSL Project
76
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77
 *
78
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79
 *    endorse or promote products derived from this software without
80
 *    prior written permission. For written permission, please contact
81
 *    openssl-core@openssl.org.
82
 *
83
 * 5. Products derived from this software may not be called "OpenSSL"
84
 *    nor may "OpenSSL" appear in their names without prior written
85
 *    permission of the OpenSSL Project.
86
 *
87
 * 6. Redistributions of any form whatsoever must retain the following
88
 *    acknowledgment:
89
 *    "This product includes software developed by the OpenSSL Project
90
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91
 *
92
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103
 * OF THE POSSIBILITY OF SUCH DAMAGE.
104
 * ====================================================================
105
 *
106
 * This product includes cryptographic software written by Eric Young
107
 * (eay@cryptsoft.com).  This product includes software written by Tim
108
 * Hudson (tjh@cryptsoft.com).
109
 *
110
 */
111
112
#include <stdio.h>
113
114
#include <openssl/opensslconf.h>
115
116
#include <openssl/bio.h>
117
#include <openssl/evp.h>
118
#include <openssl/pem.h>
119
#include <openssl/pkcs7.h>
120
#include <openssl/x509.h>
121
122
#ifndef OPENSSL_NO_DH
123
#include <openssl/dh.h>
124
#endif
125
#ifndef OPENSSL_NO_DSA
126
#include <openssl/dsa.h>
127
#endif
128
#ifndef OPENSSL_NO_RSA
129
#include <openssl/rsa.h>
130
#endif
131
132
#ifndef OPENSSL_NO_RSA
133
static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
134
#endif
135
#ifndef OPENSSL_NO_DSA
136
static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
137
#endif
138
139
#ifndef OPENSSL_NO_EC
140
static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey);
141
#endif
142
143
144
X509_REQ *
145
PEM_read_X509_REQ(FILE *fp, X509_REQ **x, pem_password_cb *cb, void *u)
146
{
147
	return PEM_ASN1_read((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, fp,
148
	    (void **)x, cb, u);
149
}
150
151
int
152
PEM_write_X509_REQ(FILE *fp, X509_REQ *x)
153
{
154
	return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, fp,
155
	    x, NULL, NULL, 0, NULL, NULL);
156
}
157
158
X509_REQ *
159
PEM_read_bio_X509_REQ(BIO *bp, X509_REQ **x, pem_password_cb *cb, void *u)
160
{
161
18
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, bp,
162
36
	    (void **)x, cb, u);
163
}
164
165
int
166
PEM_write_bio_X509_REQ(BIO *bp, X509_REQ *x)
167
{
168
18
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, bp,
169
36
	    x, NULL, NULL, 0, NULL, NULL);
170
}
171
172
int
173
PEM_write_X509_REQ_NEW(FILE *fp, X509_REQ *x)
174
{
175
	return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, fp,
176
	    x, NULL, NULL, 0, NULL, NULL);
177
}
178
179
int
180
PEM_write_bio_X509_REQ_NEW(BIO *bp, X509_REQ *x)
181
{
182
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, bp,
183
	    x, NULL, NULL, 0, NULL, NULL);
184
}
185
186
X509_CRL *
187
PEM_read_X509_CRL(FILE *fp, X509_CRL **x, pem_password_cb *cb, void *u)
188
{
189
	return PEM_ASN1_read((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, fp,
190
	    (void **)x, cb, u);
191
}
192
193
int
194
PEM_write_X509_CRL(FILE *fp, X509_CRL *x)
195
{
196
	return PEM_ASN1_write((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, fp,
197
	    x, NULL, NULL, 0, NULL, NULL);
198
}
199
200
X509_CRL *
201
PEM_read_bio_X509_CRL(BIO *bp, X509_CRL **x, pem_password_cb *cb, void *u)
202
{
203
16
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, bp,
204
32
	    (void **)x, cb, u);
205
}
206
207
int
208
PEM_write_bio_X509_CRL(BIO *bp, X509_CRL *x)
209
{
210
6
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, bp,
211
12
	    x, NULL, NULL, 0, NULL, NULL);
212
}
213
214
PKCS7 *
215
PEM_read_PKCS7(FILE *fp, PKCS7 **x, pem_password_cb *cb, void *u)
216
{
217
	return PEM_ASN1_read((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, fp,
218
	    (void **)x, cb, u);
219
}
220
221
int
222
PEM_write_PKCS7(FILE *fp, PKCS7 *x)
223
{
224
	return PEM_ASN1_write((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, fp,
225
	    x, NULL, NULL, 0, NULL, NULL);
226
}
227
228
PKCS7 *
229
PEM_read_bio_PKCS7(BIO *bp, PKCS7 **x, pem_password_cb *cb, void *u)
230
{
231
20
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, bp,
232
40
	    (void **)x, cb, u);
233
}
234
235
int
236
PEM_write_bio_PKCS7(BIO *bp, PKCS7 *x)
237
{
238
20
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, bp,
239
40
	    x, NULL, NULL, 0, NULL, NULL);
240
}
241
242
int
243
PEM_write_NETSCAPE_CERT_SEQUENCE(FILE *fp, NETSCAPE_CERT_SEQUENCE *x)
244
{
245
	return PEM_ASN1_write((i2d_of_void *)i2d_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, fp,
246
	    x, NULL, NULL, 0, NULL, NULL);
247
}
248
249
NETSCAPE_CERT_SEQUENCE *
250
PEM_read_NETSCAPE_CERT_SEQUENCE(FILE *fp, NETSCAPE_CERT_SEQUENCE **x, pem_password_cb *cb, void *u)
251
{
252
	return PEM_ASN1_read((d2i_of_void *)d2i_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, fp,
253
	    (void **)x, cb, u);
254
}
255
256
NETSCAPE_CERT_SEQUENCE *
257
PEM_read_bio_NETSCAPE_CERT_SEQUENCE(BIO *bp, NETSCAPE_CERT_SEQUENCE **x, pem_password_cb *cb, void *u)
258
{
259
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, bp,
260
	    (void **)x, cb, u);
261
}
262
263
int
264
PEM_write_bio_NETSCAPE_CERT_SEQUENCE(BIO *bp, NETSCAPE_CERT_SEQUENCE *x)
265
{
266
2
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_NETSCAPE_CERT_SEQUENCE, PEM_STRING_X509, bp,
267
4
	    x, NULL, NULL, 0, NULL, NULL);
268
}
269
270
#ifndef OPENSSL_NO_RSA
271
272
/* We treat RSA or DSA private keys as a special case.
273
 *
274
 * For private keys we read in an EVP_PKEY structure with
275
 * PEM_read_bio_PrivateKey() and extract the relevant private
276
 * key: this means can handle "traditional" and PKCS#8 formats
277
 * transparently.
278
 */
279
280
static RSA *
281
pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
282
{
283
	RSA *rtmp;
284
285
	if (!key)
286
		return NULL;
287
	rtmp = EVP_PKEY_get1_RSA(key);
288
	EVP_PKEY_free(key);
289
	if (!rtmp)
290
		return NULL;
291
	if (rsa) {
292
		RSA_free(*rsa);
293
		*rsa = rtmp;
294
	}
295
	return rtmp;
296
}
297
298
RSA *
299
PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)
300
{
301
	EVP_PKEY *pktmp;
302
303
	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
304
	return pkey_get_rsa(pktmp, rsa);
305
}
306
307
int
308
PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc,
309
    unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
310
{
311
6
        return PEM_ASN1_write((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, fp,
312
12
	    x, enc, kstr, klen, cb, u);
313
}
314
315
RSA *
316
PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, void *u)
317
{
318
	EVP_PKEY *pktmp;
319
320
	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
321
	return pkey_get_rsa(pktmp, rsa);
322
}
323
324
int
325
PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x,
326
    const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
327
    void *u)
328
{
329
8
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, bp,
330
16
	    x, enc, kstr, klen, cb, u);
331
}
332
333
RSA *
334
PEM_read_RSAPublicKey(FILE *fp, RSA **x, pem_password_cb *cb, void *u)
335
{
336
	return PEM_ASN1_read((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp,
337
	    (void **)x, cb, u);
338
}
339
340
int
341
PEM_write_RSAPublicKey(FILE *fp, const RSA *x)
342
{
343
	return PEM_ASN1_write((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp,
344
	    (void *)x, NULL, NULL, 0, NULL, NULL);
345
}
346
347
RSA *
348
PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x, pem_password_cb *cb, void *u)
349
{
350
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp,
351
	    (void **)x, cb, u);
352
}
353
354
int
355
PEM_write_bio_RSAPublicKey(BIO *bp, const RSA *x)
356
{
357
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp,
358
	    (void *)x, NULL, NULL, 0, NULL, NULL);
359
}
360
361
RSA *
362
PEM_read_RSA_PUBKEY(FILE *fp, RSA **x, pem_password_cb *cb, void *u)
363
{
364
	return PEM_ASN1_read((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, fp,
365
	    (void **)x, cb, u);
366
}
367
368
int
369
PEM_write_RSA_PUBKEY(FILE *fp, RSA *x)
370
{
371
	return PEM_ASN1_write((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, fp,
372
	    x, NULL, NULL, 0, NULL, NULL);
373
}
374
375
RSA *
376
PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x, pem_password_cb *cb, void *u)
377
{
378
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, bp,
379
	    (void **)x, cb, u);
380
}
381
382
int
383
PEM_write_bio_RSA_PUBKEY(BIO *bp, RSA *x)
384
{
385
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, bp,
386
	    x, NULL, NULL, 0, NULL, NULL);
387
}
388
389
#endif
390
391
#ifndef OPENSSL_NO_DSA
392
393
static DSA *
394
pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
395
{
396
	DSA *dtmp;
397
398
	if (!key)
399
		return NULL;
400
	dtmp = EVP_PKEY_get1_DSA(key);
401
	EVP_PKEY_free(key);
402
	if (!dtmp)
403
		return NULL;
404
	if (dsa) {
405
		DSA_free(*dsa);
406
		*dsa = dtmp;
407
	}
408
	return dtmp;
409
}
410
411
DSA *
412
PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb, void *u)
413
{
414
	EVP_PKEY *pktmp;
415
416
	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
417
	return pkey_get_dsa(pktmp, dsa);	/* will free pktmp */
418
}
419
420
int
421
PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc,
422
    unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
423
{
424
2
        return PEM_ASN1_write((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, fp,
425
4
	    x, enc, kstr, klen, cb, u);
426
}
427
428
DSA *
429
PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, void *u)
430
{
431
	EVP_PKEY *pktmp;
432
433
	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
434
	return pkey_get_dsa(pktmp, dsa);	/* will free pktmp */
435
}
436
437
int
438
PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x,
439
    const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
440
    void *u)
441
{
442
7
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, bp,
443
14
	    x, enc, kstr, klen, cb, u);
444
}
445
446
DSA *
447
PEM_read_DSA_PUBKEY(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
448
{
449
	return PEM_ASN1_read((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, fp,
450
	    (void **)x, cb, u);
451
}
452
453
int
454
PEM_write_DSA_PUBKEY(FILE *fp, DSA *x)
455
{
456
	return PEM_ASN1_write((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, fp,
457
	    x, NULL, NULL, 0, NULL, NULL);
458
}
459
460
int
461
PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x)
462
{
463
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, bp,
464
	    x, NULL, NULL, 0, NULL, NULL);
465
}
466
467
DSA *
468
PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x, pem_password_cb *cb, void *u)
469
{
470
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, bp,
471
	    (void **)x, cb, u);
472
}
473
474
DSA *
475
PEM_read_DSAparams(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
476
{
477
	return PEM_ASN1_read((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, fp,
478
	    (void **)x, cb, u);
479
}
480
481
int
482
PEM_write_DSAparams(FILE *fp, const DSA *x)
483
{
484
	return PEM_ASN1_write((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, fp,
485
	    (void *)x, NULL, NULL, 0, NULL, NULL);
486
}
487
488
DSA *
489
PEM_read_bio_DSAparams(BIO *bp, DSA **x, pem_password_cb *cb, void *u)
490
{
491
2
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, bp,
492
4
	    (void **)x, cb, u);
493
}
494
495
int
496
PEM_write_bio_DSAparams(BIO *bp, const DSA *x)
497
{
498
4
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, bp,
499
8
	    (void *)x, NULL, NULL, 0, NULL, NULL);
500
}
501
502
#endif
503
504
505
#ifndef OPENSSL_NO_EC
506
static EC_KEY *
507
pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey)
508
{
509
	EC_KEY *dtmp;
510
511
360
	if (!key)
512
		return NULL;
513
180
	dtmp = EVP_PKEY_get1_EC_KEY(key);
514
180
	EVP_PKEY_free(key);
515
180
	if (!dtmp)
516
		return NULL;
517
180
	if (eckey) {
518
		EC_KEY_free(*eckey);
519
		*eckey = dtmp;
520
	}
521
180
	return dtmp;
522
180
}
523
524
EC_GROUP *
525
PEM_read_ECPKParameters(FILE *fp, EC_GROUP **x, pem_password_cb *cb, void *u)
526
{
527
	return PEM_ASN1_read((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, fp,
528
	    (void **)x, cb, u);
529
}
530
531
int
532
PEM_write_ECPKParameters(FILE *fp, const EC_GROUP *x)
533
{
534
	return PEM_ASN1_write((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, fp,
535
	    (void *)x, NULL, NULL, 0, NULL, NULL);
536
}
537
538
EC_GROUP *
539
PEM_read_bio_ECPKParameters(BIO *bp, EC_GROUP **x, pem_password_cb *cb, void *u)
540
{
541
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, bp,
542
	    (void **)x, cb, u);
543
}
544
545
int
546
PEM_write_bio_ECPKParameters(BIO *bp, const EC_GROUP *x)
547
{
548
180
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, bp,
549
360
	    (void *)x, NULL, NULL, 0, NULL, NULL);
550
}
551
552
EC_KEY *
553
PEM_read_ECPrivateKey(FILE *fp, EC_KEY **eckey, pem_password_cb *cb, void *u)
554
{
555
	EVP_PKEY *pktmp;
556
557
	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
558
	return pkey_get_eckey(pktmp, eckey);	/* will free pktmp */
559
}
560
561
int
562
PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc,
563
    unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
564
{
565
        return PEM_ASN1_write((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, fp,
566
	    x, enc, kstr, klen, cb, u);
567
}
568
569
EC_KEY *
570
PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb, void *u)
571
{
572
	EVP_PKEY *pktmp;
573
360
	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
574
180
	return pkey_get_eckey(pktmp, key);	/* will free pktmp */
575
}
576
577
int
578
PEM_write_bio_ECPrivateKey(BIO *bp, EC_KEY *x,
579
    const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
580
    void *u)
581
{
582
361
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, bp,
583
722
	    x, enc, kstr, klen, cb, u);
584
}
585
586
EC_KEY *
587
PEM_read_EC_PUBKEY(FILE *fp, EC_KEY **x, pem_password_cb *cb, void *u)
588
{
589
	return PEM_ASN1_read((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, fp,
590
	    (void **)x, cb, u);
591
}
592
593
int
594
PEM_write_EC_PUBKEY(FILE *fp, EC_KEY *x)
595
{
596
	return PEM_ASN1_write((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, fp,
597
	    x, NULL, NULL, 0, NULL, NULL);
598
}
599
600
EC_KEY *
601
PEM_read_bio_EC_PUBKEY(BIO *bp, EC_KEY **x, pem_password_cb *cb, void *u)
602
{
603
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, bp,
604
	    (void **)x, cb, u);
605
}
606
607
int
608
PEM_write_bio_EC_PUBKEY(BIO *bp, EC_KEY *x)
609
{
610
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, bp,
611
	    x, NULL, NULL, 0, NULL, NULL);
612
}
613
614
#endif
615
616
#ifndef OPENSSL_NO_DH
617
618
DH *
619
PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u)
620
{
621
	return PEM_ASN1_read((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, fp,
622
	    (void **)x, cb, u);
623
}
624
625
int
626
PEM_write_DHparams(FILE *fp, const DH *x)
627
{
628
	return PEM_ASN1_write((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, fp,
629
	    (void *)x, NULL, NULL, 0, NULL, NULL);
630
}
631
632
DH *
633
PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u)
634
{
635
1186
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, bp,
636
2372
	    (void **)x, cb, u);
637
}
638
639
int
640
PEM_write_bio_DHparams(BIO *bp, const DH *x)
641
{
642
8
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, bp,
643
16
	    (void *)x, NULL, NULL, 0, NULL, NULL);
644
}
645
646
#endif
647
648
EVP_PKEY *
649
PEM_read_PUBKEY(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u)
650
{
651
	return PEM_ASN1_read((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, fp,
652
	    (void **)x, cb, u);
653
}
654
655
int
656
PEM_write_PUBKEY(FILE *fp, EVP_PKEY *x)
657
{
658
	return PEM_ASN1_write((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, fp,
659
	    x, NULL, NULL, 0, NULL, NULL);
660
}
661
662
EVP_PKEY *
663
PEM_read_bio_PUBKEY(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u)
664
{
665
	return PEM_ASN1_read_bio((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, bp,
666
	    (void **)x, cb, u);
667
}
668
669
int
670
PEM_write_bio_PUBKEY(BIO *bp, EVP_PKEY *x)
671
{
672
2
	return PEM_ASN1_write_bio((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, bp,
673
4
	    x, NULL, NULL, 0, NULL, NULL);
674
}