xref: /openbsd-src/lib/libcrypto/pem/pem_all.c (revision fc405d53b73a2d73393cb97f684863d17b583e38)
1 /* $OpenBSD: pem_all.c,v 1.20 2023/04/25 17:51:36 tb Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 /* ====================================================================
59  * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
60  *
61  * Redistribution and use in source and binary forms, with or without
62  * modification, are permitted provided that the following conditions
63  * are met:
64  *
65  * 1. Redistributions of source code must retain the above copyright
66  *    notice, this list of conditions and the following disclaimer.
67  *
68  * 2. Redistributions in binary form must reproduce the above copyright
69  *    notice, this list of conditions and the following disclaimer in
70  *    the documentation and/or other materials provided with the
71  *    distribution.
72  *
73  * 3. All advertising materials mentioning features or use of this
74  *    software must display the following acknowledgment:
75  *    "This product includes software developed by the OpenSSL Project
76  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77  *
78  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79  *    endorse or promote products derived from this software without
80  *    prior written permission. For written permission, please contact
81  *    openssl-core@openssl.org.
82  *
83  * 5. Products derived from this software may not be called "OpenSSL"
84  *    nor may "OpenSSL" appear in their names without prior written
85  *    permission of the OpenSSL Project.
86  *
87  * 6. Redistributions of any form whatsoever must retain the following
88  *    acknowledgment:
89  *    "This product includes software developed by the OpenSSL Project
90  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91  *
92  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103  * OF THE POSSIBILITY OF SUCH DAMAGE.
104  * ====================================================================
105  *
106  * This product includes cryptographic software written by Eric Young
107  * (eay@cryptsoft.com).  This product includes software written by Tim
108  * Hudson (tjh@cryptsoft.com).
109  *
110  */
111 
112 #include <stdio.h>
113 
114 #include <openssl/opensslconf.h>
115 
116 #include <openssl/bio.h>
117 #include <openssl/evp.h>
118 #include <openssl/pem.h>
119 #include <openssl/pkcs7.h>
120 #include <openssl/x509.h>
121 
122 #ifndef OPENSSL_NO_DH
123 #include <openssl/dh.h>
124 #endif
125 #ifndef OPENSSL_NO_DSA
126 #include <openssl/dsa.h>
127 #endif
128 #ifndef OPENSSL_NO_RSA
129 #include <openssl/rsa.h>
130 #endif
131 
132 #ifndef OPENSSL_NO_RSA
133 static RSA *pkey_get_rsa(EVP_PKEY *key, RSA **rsa);
134 #endif
135 #ifndef OPENSSL_NO_DSA
136 static DSA *pkey_get_dsa(EVP_PKEY *key, DSA **dsa);
137 #endif
138 
139 #ifndef OPENSSL_NO_EC
140 static EC_KEY *pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey);
141 #endif
142 
143 
144 X509_REQ *
145 PEM_read_X509_REQ(FILE *fp, X509_REQ **x, pem_password_cb *cb, void *u)
146 {
147 	return PEM_ASN1_read((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, fp,
148 	    (void **)x, cb, u);
149 }
150 
151 int
152 PEM_write_X509_REQ(FILE *fp, X509_REQ *x)
153 {
154 	return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, fp,
155 	    x, NULL, NULL, 0, NULL, NULL);
156 }
157 
158 X509_REQ *
159 PEM_read_bio_X509_REQ(BIO *bp, X509_REQ **x, pem_password_cb *cb, void *u)
160 {
161 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_REQ, PEM_STRING_X509_REQ, bp,
162 	    (void **)x, cb, u);
163 }
164 
165 int
166 PEM_write_bio_X509_REQ(BIO *bp, X509_REQ *x)
167 {
168 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ, bp,
169 	    x, NULL, NULL, 0, NULL, NULL);
170 }
171 
172 int
173 PEM_write_X509_REQ_NEW(FILE *fp, X509_REQ *x)
174 {
175 	return PEM_ASN1_write((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, fp,
176 	    x, NULL, NULL, 0, NULL, NULL);
177 }
178 
179 int
180 PEM_write_bio_X509_REQ_NEW(BIO *bp, X509_REQ *x)
181 {
182 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_REQ, PEM_STRING_X509_REQ_OLD, bp,
183 	    x, NULL, NULL, 0, NULL, NULL);
184 }
185 
186 X509_CRL *
187 PEM_read_X509_CRL(FILE *fp, X509_CRL **x, pem_password_cb *cb, void *u)
188 {
189 	return PEM_ASN1_read((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, fp,
190 	    (void **)x, cb, u);
191 }
192 
193 int
194 PEM_write_X509_CRL(FILE *fp, X509_CRL *x)
195 {
196 	return PEM_ASN1_write((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, fp,
197 	    x, NULL, NULL, 0, NULL, NULL);
198 }
199 
200 X509_CRL *
201 PEM_read_bio_X509_CRL(BIO *bp, X509_CRL **x, pem_password_cb *cb, void *u)
202 {
203 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_X509_CRL, PEM_STRING_X509_CRL, bp,
204 	    (void **)x, cb, u);
205 }
206 
207 int
208 PEM_write_bio_X509_CRL(BIO *bp, X509_CRL *x)
209 {
210 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_X509_CRL, PEM_STRING_X509_CRL, bp,
211 	    x, NULL, NULL, 0, NULL, NULL);
212 }
213 
214 PKCS7 *
215 PEM_read_PKCS7(FILE *fp, PKCS7 **x, pem_password_cb *cb, void *u)
216 {
217 	return PEM_ASN1_read((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, fp,
218 	    (void **)x, cb, u);
219 }
220 
221 int
222 PEM_write_PKCS7(FILE *fp, PKCS7 *x)
223 {
224 	return PEM_ASN1_write((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, fp,
225 	    x, NULL, NULL, 0, NULL, NULL);
226 }
227 
228 PKCS7 *
229 PEM_read_bio_PKCS7(BIO *bp, PKCS7 **x, pem_password_cb *cb, void *u)
230 {
231 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_PKCS7, PEM_STRING_PKCS7, bp,
232 	    (void **)x, cb, u);
233 }
234 
235 int
236 PEM_write_bio_PKCS7(BIO *bp, PKCS7 *x)
237 {
238 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_PKCS7, PEM_STRING_PKCS7, bp,
239 	    x, NULL, NULL, 0, NULL, NULL);
240 }
241 
242 #ifndef OPENSSL_NO_RSA
243 
244 /* We treat RSA or DSA private keys as a special case.
245  *
246  * For private keys we read in an EVP_PKEY structure with
247  * PEM_read_bio_PrivateKey() and extract the relevant private
248  * key: this means can handle "traditional" and PKCS#8 formats
249  * transparently.
250  */
251 
252 static RSA *
253 pkey_get_rsa(EVP_PKEY *key, RSA **rsa)
254 {
255 	RSA *rtmp;
256 
257 	if (!key)
258 		return NULL;
259 	rtmp = EVP_PKEY_get1_RSA(key);
260 	EVP_PKEY_free(key);
261 	if (!rtmp)
262 		return NULL;
263 	if (rsa) {
264 		RSA_free(*rsa);
265 		*rsa = rtmp;
266 	}
267 	return rtmp;
268 }
269 
270 RSA *
271 PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, void *u)
272 {
273 	EVP_PKEY *pktmp;
274 
275 	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
276 	return pkey_get_rsa(pktmp, rsa);
277 }
278 
279 int
280 PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc,
281     unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
282 {
283         return PEM_ASN1_write((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, fp,
284 	    x, enc, kstr, klen, cb, u);
285 }
286 
287 RSA *
288 PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, void *u)
289 {
290 	EVP_PKEY *pktmp;
291 
292 	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
293 	return pkey_get_rsa(pktmp, rsa);
294 }
295 
296 int
297 PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x,
298     const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
299     void *u)
300 {
301 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPrivateKey, PEM_STRING_RSA, bp,
302 	    x, enc, kstr, klen, cb, u);
303 }
304 
305 RSA *
306 PEM_read_RSAPublicKey(FILE *fp, RSA **x, pem_password_cb *cb, void *u)
307 {
308 	return PEM_ASN1_read((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp,
309 	    (void **)x, cb, u);
310 }
311 
312 int
313 PEM_write_RSAPublicKey(FILE *fp, const RSA *x)
314 {
315 	return PEM_ASN1_write((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, fp,
316 	    (void *)x, NULL, NULL, 0, NULL, NULL);
317 }
318 
319 RSA *
320 PEM_read_bio_RSAPublicKey(BIO *bp, RSA **x, pem_password_cb *cb, void *u)
321 {
322 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp,
323 	    (void **)x, cb, u);
324 }
325 
326 int
327 PEM_write_bio_RSAPublicKey(BIO *bp, const RSA *x)
328 {
329 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSAPublicKey, PEM_STRING_RSA_PUBLIC, bp,
330 	    (void *)x, NULL, NULL, 0, NULL, NULL);
331 }
332 
333 RSA *
334 PEM_read_RSA_PUBKEY(FILE *fp, RSA **x, pem_password_cb *cb, void *u)
335 {
336 	return PEM_ASN1_read((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, fp,
337 	    (void **)x, cb, u);
338 }
339 
340 int
341 PEM_write_RSA_PUBKEY(FILE *fp, RSA *x)
342 {
343 	return PEM_ASN1_write((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, fp,
344 	    x, NULL, NULL, 0, NULL, NULL);
345 }
346 
347 RSA *
348 PEM_read_bio_RSA_PUBKEY(BIO *bp, RSA **x, pem_password_cb *cb, void *u)
349 {
350 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_RSA_PUBKEY, PEM_STRING_PUBLIC, bp,
351 	    (void **)x, cb, u);
352 }
353 
354 int
355 PEM_write_bio_RSA_PUBKEY(BIO *bp, RSA *x)
356 {
357 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_RSA_PUBKEY, PEM_STRING_PUBLIC, bp,
358 	    x, NULL, NULL, 0, NULL, NULL);
359 }
360 
361 #endif
362 
363 #ifndef OPENSSL_NO_DSA
364 
365 static DSA *
366 pkey_get_dsa(EVP_PKEY *key, DSA **dsa)
367 {
368 	DSA *dtmp;
369 
370 	if (!key)
371 		return NULL;
372 	dtmp = EVP_PKEY_get1_DSA(key);
373 	EVP_PKEY_free(key);
374 	if (!dtmp)
375 		return NULL;
376 	if (dsa) {
377 		DSA_free(*dsa);
378 		*dsa = dtmp;
379 	}
380 	return dtmp;
381 }
382 
383 DSA *
384 PEM_read_DSAPrivateKey(FILE *fp, DSA **dsa, pem_password_cb *cb, void *u)
385 {
386 	EVP_PKEY *pktmp;
387 
388 	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
389 	return pkey_get_dsa(pktmp, dsa);	/* will free pktmp */
390 }
391 
392 int
393 PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc,
394     unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
395 {
396         return PEM_ASN1_write((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, fp,
397 	    x, enc, kstr, klen, cb, u);
398 }
399 
400 DSA *
401 PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, void *u)
402 {
403 	EVP_PKEY *pktmp;
404 
405 	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
406 	return pkey_get_dsa(pktmp, dsa);	/* will free pktmp */
407 }
408 
409 int
410 PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x,
411     const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
412     void *u)
413 {
414 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAPrivateKey, PEM_STRING_DSA, bp,
415 	    x, enc, kstr, klen, cb, u);
416 }
417 
418 DSA *
419 PEM_read_DSA_PUBKEY(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
420 {
421 	return PEM_ASN1_read((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, fp,
422 	    (void **)x, cb, u);
423 }
424 
425 int
426 PEM_write_DSA_PUBKEY(FILE *fp, DSA *x)
427 {
428 	return PEM_ASN1_write((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, fp,
429 	    x, NULL, NULL, 0, NULL, NULL);
430 }
431 
432 int
433 PEM_write_bio_DSA_PUBKEY(BIO *bp, DSA *x)
434 {
435 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSA_PUBKEY, PEM_STRING_PUBLIC, bp,
436 	    x, NULL, NULL, 0, NULL, NULL);
437 }
438 
439 DSA *
440 PEM_read_bio_DSA_PUBKEY(BIO *bp, DSA **x, pem_password_cb *cb, void *u)
441 {
442 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSA_PUBKEY, PEM_STRING_PUBLIC, bp,
443 	    (void **)x, cb, u);
444 }
445 
446 DSA *
447 PEM_read_DSAparams(FILE *fp, DSA **x, pem_password_cb *cb, void *u)
448 {
449 	return PEM_ASN1_read((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, fp,
450 	    (void **)x, cb, u);
451 }
452 
453 int
454 PEM_write_DSAparams(FILE *fp, const DSA *x)
455 {
456 	return PEM_ASN1_write((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, fp,
457 	    (void *)x, NULL, NULL, 0, NULL, NULL);
458 }
459 
460 DSA *
461 PEM_read_bio_DSAparams(BIO *bp, DSA **x, pem_password_cb *cb, void *u)
462 {
463 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_DSAparams, PEM_STRING_DSAPARAMS, bp,
464 	    (void **)x, cb, u);
465 }
466 
467 int
468 PEM_write_bio_DSAparams(BIO *bp, const DSA *x)
469 {
470 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DSAparams, PEM_STRING_DSAPARAMS, bp,
471 	    (void *)x, NULL, NULL, 0, NULL, NULL);
472 }
473 
474 #endif
475 
476 
477 #ifndef OPENSSL_NO_EC
478 static EC_KEY *
479 pkey_get_eckey(EVP_PKEY *key, EC_KEY **eckey)
480 {
481 	EC_KEY *dtmp;
482 
483 	if (!key)
484 		return NULL;
485 	dtmp = EVP_PKEY_get1_EC_KEY(key);
486 	EVP_PKEY_free(key);
487 	if (!dtmp)
488 		return NULL;
489 	if (eckey) {
490 		EC_KEY_free(*eckey);
491 		*eckey = dtmp;
492 	}
493 	return dtmp;
494 }
495 
496 EC_GROUP *
497 PEM_read_ECPKParameters(FILE *fp, EC_GROUP **x, pem_password_cb *cb, void *u)
498 {
499 	return PEM_ASN1_read((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, fp,
500 	    (void **)x, cb, u);
501 }
502 
503 int
504 PEM_write_ECPKParameters(FILE *fp, const EC_GROUP *x)
505 {
506 	return PEM_ASN1_write((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, fp,
507 	    (void *)x, NULL, NULL, 0, NULL, NULL);
508 }
509 
510 EC_GROUP *
511 PEM_read_bio_ECPKParameters(BIO *bp, EC_GROUP **x, pem_password_cb *cb, void *u)
512 {
513 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_ECPKParameters, PEM_STRING_ECPARAMETERS, bp,
514 	    (void **)x, cb, u);
515 }
516 
517 int
518 PEM_write_bio_ECPKParameters(BIO *bp, const EC_GROUP *x)
519 {
520 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPKParameters, PEM_STRING_ECPARAMETERS, bp,
521 	    (void *)x, NULL, NULL, 0, NULL, NULL);
522 }
523 
524 EC_KEY *
525 PEM_read_ECPrivateKey(FILE *fp, EC_KEY **eckey, pem_password_cb *cb, void *u)
526 {
527 	EVP_PKEY *pktmp;
528 
529 	pktmp = PEM_read_PrivateKey(fp, NULL, cb, u);
530 	return pkey_get_eckey(pktmp, eckey);	/* will free pktmp */
531 }
532 
533 int
534 PEM_write_ECPrivateKey(FILE *fp, EC_KEY *x, const EVP_CIPHER *enc,
535     unsigned char *kstr, int klen, pem_password_cb *cb, void *u)
536 {
537         return PEM_ASN1_write((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, fp,
538 	    x, enc, kstr, klen, cb, u);
539 }
540 
541 EC_KEY *
542 PEM_read_bio_ECPrivateKey(BIO *bp, EC_KEY **key, pem_password_cb *cb, void *u)
543 {
544 	EVP_PKEY *pktmp;
545 	pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u);
546 	return pkey_get_eckey(pktmp, key);	/* will free pktmp */
547 }
548 
549 int
550 PEM_write_bio_ECPrivateKey(BIO *bp, EC_KEY *x,
551     const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb,
552     void *u)
553 {
554 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_ECPrivateKey, PEM_STRING_ECPRIVATEKEY, bp,
555 	    x, enc, kstr, klen, cb, u);
556 }
557 
558 EC_KEY *
559 PEM_read_EC_PUBKEY(FILE *fp, EC_KEY **x, pem_password_cb *cb, void *u)
560 {
561 	return PEM_ASN1_read((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, fp,
562 	    (void **)x, cb, u);
563 }
564 
565 int
566 PEM_write_EC_PUBKEY(FILE *fp, EC_KEY *x)
567 {
568 	return PEM_ASN1_write((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, fp,
569 	    x, NULL, NULL, 0, NULL, NULL);
570 }
571 
572 EC_KEY *
573 PEM_read_bio_EC_PUBKEY(BIO *bp, EC_KEY **x, pem_password_cb *cb, void *u)
574 {
575 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_EC_PUBKEY, PEM_STRING_PUBLIC, bp,
576 	    (void **)x, cb, u);
577 }
578 
579 int
580 PEM_write_bio_EC_PUBKEY(BIO *bp, EC_KEY *x)
581 {
582 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_EC_PUBKEY, PEM_STRING_PUBLIC, bp,
583 	    x, NULL, NULL, 0, NULL, NULL);
584 }
585 
586 #endif
587 
588 #ifndef OPENSSL_NO_DH
589 
590 DH *
591 PEM_read_DHparams(FILE *fp, DH **x, pem_password_cb *cb, void *u)
592 {
593 	return PEM_ASN1_read((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, fp,
594 	    (void **)x, cb, u);
595 }
596 
597 int
598 PEM_write_DHparams(FILE *fp, const DH *x)
599 {
600 	return PEM_ASN1_write((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, fp,
601 	    (void *)x, NULL, NULL, 0, NULL, NULL);
602 }
603 
604 DH *
605 PEM_read_bio_DHparams(BIO *bp, DH **x, pem_password_cb *cb, void *u)
606 {
607 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_DHparams, PEM_STRING_DHPARAMS, bp,
608 	    (void **)x, cb, u);
609 }
610 
611 int
612 PEM_write_bio_DHparams(BIO *bp, const DH *x)
613 {
614 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_DHparams, PEM_STRING_DHPARAMS, bp,
615 	    (void *)x, NULL, NULL, 0, NULL, NULL);
616 }
617 
618 #endif
619 
620 EVP_PKEY *
621 PEM_read_PUBKEY(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u)
622 {
623 	return PEM_ASN1_read((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, fp,
624 	    (void **)x, cb, u);
625 }
626 
627 int
628 PEM_write_PUBKEY(FILE *fp, EVP_PKEY *x)
629 {
630 	return PEM_ASN1_write((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, fp,
631 	    x, NULL, NULL, 0, NULL, NULL);
632 }
633 
634 EVP_PKEY *
635 PEM_read_bio_PUBKEY(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u)
636 {
637 	return PEM_ASN1_read_bio((d2i_of_void *)d2i_PUBKEY, PEM_STRING_PUBLIC, bp,
638 	    (void **)x, cb, u);
639 }
640 
641 int
642 PEM_write_bio_PUBKEY(BIO *bp, EVP_PKEY *x)
643 {
644 	return PEM_ASN1_write_bio((i2d_of_void *)i2d_PUBKEY, PEM_STRING_PUBLIC, bp,
645 	    x, NULL, NULL, 0, NULL, NULL);
646 }
647