blob: 0cc63cac4b1c70958e643b9016fdda4937eb8bde [file] [log] [blame]
Paul Bakkerd1a983f2013-09-16 22:26:53 +02001/**
2 * \file compat-1.2.h
3 *
4 * \brief Backwards compatibility header for PolarSSL-1.2 from PolarSSL-1.3
5 *
6 * Copyright (C) 2006-2013, Brainspark B.V.
7 *
8 * This file is part of PolarSSL (http://www.polarssl.org)
9 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
10 *
11 * All rights reserved.
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License along
24 * with this program; if not, write to the Free Software Foundation, Inc.,
25 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
26 */
27#ifndef POLARSSL_COMPAT_1_2_H
28#define POLARSSL_COMPAT_1_2_H
29
30#include "config.h"
31
Paul Bakker51876562013-09-17 14:36:05 +020032// Comment out to disable prototype change warnings
Paul Bakkerd1a983f2013-09-16 22:26:53 +020033#define SHOW_PROTOTYPE_CHANGE_WARNINGS
34
Paul Bakkerfa6a6202013-10-28 18:48:30 +010035#if defined(_MSC_VER) && !defined(inline)
36#define inline _inline
37#else
38#if defined(__ARMCC_VERSION) && !defined(inline)
39#define inline __inline
40#endif /* __ARMCC_VERSION */
Paul Bakkerd46a9f12013-10-31 14:34:19 +010041#endif /* _MSC_VER */
Paul Bakkerfa6a6202013-10-28 18:48:30 +010042
43#if defined(_MSC_VER)
Paul Bakker4aa40d42013-10-11 10:49:24 +020044// MSVC does not support #warning
45#undef SHOW_PROTOTYPE_CHANGE_WARNINGS
46#endif
47
Paul Bakker51876562013-09-17 14:36:05 +020048#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
49#warning "You can disable these warnings by commenting SHOW_PROTOTYPE_CHANGE_WARNINGS in compat-1.2.h"
50#endif
51
Paul Bakkerd1a983f2013-09-16 22:26:53 +020052#if defined(POLARSSL_SHA256_C)
53#define POLARSSL_SHA2_C
54#include "sha256.h"
55
56/*
57 * SHA-2 -> SHA-256
58 */
59typedef sha256_context sha2_context;
60
Steffan Karger44cf68f2013-11-12 10:34:55 +010061static inline void sha2_starts( sha256_context *ctx, int is224 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020062 sha256_starts( ctx, is224 );
63}
Steffan Karger44cf68f2013-11-12 10:34:55 +010064static inline void sha2_update( sha256_context *ctx, const unsigned char *input,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020065 size_t ilen ) {
66 sha256_update( ctx, input, ilen );
67}
Steffan Karger44cf68f2013-11-12 10:34:55 +010068static inline void sha2_finish( sha256_context *ctx, unsigned char output[32] ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +020069 sha256_finish( ctx, output );
Paul Bakkerd1a983f2013-09-16 22:26:53 +020070}
Steffan Karger44cf68f2013-11-12 10:34:55 +010071static inline int sha2_file( const char *path, unsigned char output[32], int is224 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020072 return sha256_file( path, output, is224 );
73}
Steffan Karger44cf68f2013-11-12 10:34:55 +010074static inline void sha2( const unsigned char *input, size_t ilen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020075 unsigned char output[32], int is224 ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +020076 sha256( input, ilen, output, is224 );
Paul Bakkerd1a983f2013-09-16 22:26:53 +020077}
Steffan Karger44cf68f2013-11-12 10:34:55 +010078static inline void sha2_hmac_starts( sha256_context *ctx, const unsigned char *key,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020079 size_t keylen, int is224 ) {
80 sha256_hmac_starts( ctx, key, keylen, is224 );
81}
Steffan Karger44cf68f2013-11-12 10:34:55 +010082static inline void sha2_hmac_update( sha256_context *ctx, const unsigned char *input, size_t ilen ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020083 sha256_hmac_update( ctx, input, ilen );
84}
Steffan Karger44cf68f2013-11-12 10:34:55 +010085static inline void sha2_hmac_finish( sha256_context *ctx, unsigned char output[32] ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020086 sha256_hmac_finish( ctx, output );
87}
Steffan Karger44cf68f2013-11-12 10:34:55 +010088static inline void sha2_hmac_reset( sha256_context *ctx ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020089 sha256_hmac_reset( ctx );
90}
Steffan Karger44cf68f2013-11-12 10:34:55 +010091static inline void sha2_hmac( const unsigned char *key, size_t keylen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +020092 const unsigned char *input, size_t ilen,
93 unsigned char output[32], int is224 ) {
94 sha256_hmac( key, keylen, input, ilen, output, is224 );
95}
Steffan Karger44cf68f2013-11-12 10:34:55 +010096static inline int sha2_self_test( int verbose ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +020097 return sha256_self_test( verbose );
98}
99#endif /* POLARSSL_SHA256_C */
100
101#if defined(POLARSSL_SHA512_C)
102#define POLARSSL_SHA4_C
103#include "sha512.h"
104
105/*
106 * SHA-4 -> SHA-512
107 */
108typedef sha512_context sha4_context;
109
Steffan Karger44cf68f2013-11-12 10:34:55 +0100110static inline void sha4_starts( sha512_context *ctx, int is384 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200111 sha512_starts( ctx, is384 );
112}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100113static inline void sha4_update( sha512_context *ctx, const unsigned char *input,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200114 size_t ilen ) {
115 sha512_update( ctx, input, ilen );
116}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100117static inline void sha4_finish( sha512_context *ctx, unsigned char output[64] ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +0200118 sha512_finish( ctx, output );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200119}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100120static inline int sha4_file( const char *path, unsigned char output[64], int is384 ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200121 return sha512_file( path, output, is384 );
122}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100123static inline void sha4( const unsigned char *input, size_t ilen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200124 unsigned char output[32], int is384 ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +0200125 sha512( input, ilen, output, is384 );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200126}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100127static inline void sha4_hmac_starts( sha512_context *ctx, const unsigned char *key,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200128 size_t keylen, int is384 ) {
129 sha512_hmac_starts( ctx, key, keylen, is384 );
130}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100131static inline void sha4_hmac_update( sha512_context *ctx, const unsigned char *input, size_t ilen ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200132 sha512_hmac_update( ctx, input, ilen );
133}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100134static inline void sha4_hmac_finish( sha512_context *ctx, unsigned char output[64] ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200135 sha512_hmac_finish( ctx, output );
136}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100137static inline void sha4_hmac_reset( sha512_context *ctx ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200138 sha512_hmac_reset( ctx );
139}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100140static inline void sha4_hmac( const unsigned char *key, size_t keylen,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200141 const unsigned char *input, size_t ilen,
142 unsigned char output[64], int is384 ) {
143 sha512_hmac( key, keylen, input, ilen, output, is384 );
144}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100145static inline int sha4_self_test( int verbose ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200146 return sha512_self_test( verbose );
147}
148#endif /* POLARSSL_SHA512_C */
149
150#if defined(POLARSSL_CIPHER_C)
151#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
152#warning "cipher_reset() prototype changed. Manual change required if used"
153#endif
154#endif
155
156#if defined(POLARSSL_RSA_C)
157#define SIG_RSA_RAW POLARSSL_MD_NONE
158#define SIG_RSA_MD2 POLARSSL_MD_MD2
159#define SIG_RSA_MD4 POLARSSL_MD_MD4
160#define SIG_RSA_MD5 POLARSSL_MD_MD5
161#define SIG_RSA_SHA1 POLARSSL_MD_SHA1
162#define SIG_RSA_SHA224 POLARSSL_MD_SHA224
163#define SIG_RSA_SHA256 POLARSSL_MD_SHA256
164#define SIG_RSA_SHA384 POLARSSL_MD_SHA384
165#define SIG_RSA_SHA512 POLARSSL_MD_SHA512
166#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
167#warning "rsa_pkcs1_verify() prototype changed. Manual change required if used"
168#warning "rsa_pkcs1_decrypt() prototype changed. Manual change required if used"
169#endif
170#endif
171
172#if defined(POLARSSL_DHM_C)
173#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
174#warning "dhm_calc_secret() prototype changed. Manual change required if used"
175#endif
176#endif
177
178#if defined(POLARSSL_GCM_C)
179#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
180#warning "gcm_init() prototype changed. Manual change required if used"
181#endif
182#endif
183
184#if defined(POLARSSL_SSL_CLI_C)
185#if defined(SHOW_PROTOTYPE_CHANGE_WARNINGS)
186#warning "ssl_set_own_cert() prototype changed. Change to ssl_set_own_cert_rsa(). Manual change required if used"
187#endif
188#endif
189
Paul Bakker51876562013-09-17 14:36:05 +0200190#if defined(POLARSSL_X509_USE_C) || defined(POLARSSL_X509_CREATE_C)
Paul Bakker86d0c192013-09-18 11:11:02 +0200191#include "x509.h"
192
Paul Bakker51876562013-09-17 14:36:05 +0200193#define POLARSSL_ERR_X509_CERT_INVALID_FORMAT POLARSSL_ERR_X509_INVALID_FORMAT
194#define POLARSSL_ERR_X509_CERT_INVALID_VERSION POLARSSL_ERR_X509_INVALID_VERSION
195#define POLARSSL_ERR_X509_CERT_INVALID_ALG POLARSSL_ERR_X509_INVALID_ALG
196#define POLARSSL_ERR_X509_CERT_UNKNOWN_SIG_ALG POLARSSL_ERR_X509_UNKNOWN_SIG_ALG
197#define POLARSSL_ERR_X509_CERT_INVALID_NAME POLARSSL_ERR_X509_INVALID_NAME
198#define POLARSSL_ERR_X509_CERT_INVALID_DATE POLARSSL_ERR_X509_INVALID_DATE
199#define POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS POLARSSL_ERR_X509_INVALID_EXTENSIONS
200#define POLARSSL_ERR_X509_CERT_SIG_MISMATCH POLARSSL_ERR_X509_SIG_MISMATCH
201#define POLARSSL_ERR_X509_CERT_INVALID_SIGNATURE POLARSSL_ERR_X509_INVALID_SIGNATURE
202#define POLARSSL_ERR_X509_CERT_INVALID_SERIAL POLARSSL_ERR_X509_INVALID_SERIAL
203#define POLARSSL_ERR_X509_CERT_UNKNOWN_VERSION POLARSSL_ERR_X509_UNKNOWN_VERSION
Paul Bakker86d0c192013-09-18 11:11:02 +0200204
Steffan Karger44cf68f2013-11-12 10:34:55 +0100205static inline int x509parse_serial_gets( char *buf, size_t size, const x509_buf *serial ) {
Paul Bakker86d0c192013-09-18 11:11:02 +0200206 return x509_serial_gets( buf, size, serial );
207}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100208static inline int x509parse_dn_gets( char *buf, size_t size, const x509_name *dn ) {
Paul Bakker86d0c192013-09-18 11:11:02 +0200209 return x509_dn_gets( buf, size, dn );
210}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100211static inline int x509parse_time_expired( const x509_time *time ) {
Paul Bakker86d0c192013-09-18 11:11:02 +0200212 return x509_time_expired( time );
213}
Paul Bakker51876562013-09-17 14:36:05 +0200214#endif /* POLARSSL_X509_USE_C || POLARSSL_X509_CREATE_C */
215
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200216#if defined(POLARSSL_X509_CRT_PARSE_C)
217#define POLARSSL_X509_PARSE_C
218#include "x509_crt.h"
Paul Bakkerc559c7a2013-09-18 14:13:26 +0200219typedef x509_crt x509_cert;
220
Steffan Karger44cf68f2013-11-12 10:34:55 +0100221static inline int x509parse_crt_der( x509_cert *chain, const unsigned char *buf,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200222 size_t buflen ) {
223 return x509_crt_parse_der( chain, buf, buflen );
224}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100225static inline int x509parse_crt( x509_cert *chain, const unsigned char *buf, size_t buflen ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200226 return x509_crt_parse( chain, buf, buflen );
227}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100228static inline int x509parse_crtfile( x509_cert *chain, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200229 return x509_crt_parse_file( chain, path );
230}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100231static inline int x509parse_crtpath( x509_cert *chain, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200232 return x509_crt_parse_path( chain, path );
233}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100234static inline int x509parse_cert_info( char *buf, size_t size, const char *prefix,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200235 const x509_cert *crt ) {
236 return x509_crt_info( buf, size, prefix, crt );
237}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100238static inline int x509parse_verify( x509_cert *crt, x509_cert *trust_ca,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200239 x509_crl *ca_crl, const char *cn, int *flags,
240 int (*f_vrfy)(void *, x509_cert *, int, int *),
241 void *p_vrfy ) {
242 return x509_crt_verify( crt, trust_ca, ca_crl, cn, flags, f_vrfy, p_vrfy );
243}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100244static inline int x509parse_revoked( const x509_cert *crt, const x509_crl *crl ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200245 return x509_crt_revoked( crt, crl );
246}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100247static inline void x509_free( x509_cert *crt ) {
Paul Bakker4aa40d42013-10-11 10:49:24 +0200248 x509_crt_free( crt );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200249}
250#endif /* POLARSSL_X509_CRT_PARSE_C */
251
Paul Bakkerddf26b42013-09-18 13:46:23 +0200252#if defined(POLARSSL_X509_CRL_PARSE_C)
253#define POLARSSL_X509_PARSE_C
254#include "x509_crl.h"
Steffan Karger44cf68f2013-11-12 10:34:55 +0100255static inline int x509parse_crl( x509_crl *chain, const unsigned char *buf, size_t buflen ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200256 return x509_crl_parse( chain, buf, buflen );
257}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100258static inline int x509parse_crlfile( x509_crl *chain, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200259 return x509_crl_parse_file( chain, path );
260}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100261static inline int x509parse_crl_info( char *buf, size_t size, const char *prefix,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200262 const x509_crl *crl ) {
263 return x509_crl_info( buf, size, prefix, crl );
264}
265#endif /* POLARSSL_X509_CRL_PARSE_C */
266
267#if defined(POLARSSL_X509_CSR_PARSE_C)
268#define POLARSSL_X509_PARSE_C
269#include "x509_csr.h"
Steffan Karger44cf68f2013-11-12 10:34:55 +0100270static inline int x509parse_csr( x509_csr *csr, const unsigned char *buf, size_t buflen ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200271 return x509_csr_parse( csr, buf, buflen );
272}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100273static inline int x509parse_csrfile( x509_csr *csr, const char *path ) {
Paul Bakkerddf26b42013-09-18 13:46:23 +0200274 return x509_csr_parse_file( csr, path );
275}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100276static inline int x509parse_csr_info( char *buf, size_t size, const char *prefix,
Paul Bakkerddf26b42013-09-18 13:46:23 +0200277 const x509_csr *csr ) {
278 return x509_csr_info( buf, size, prefix, csr );
279}
280#endif /* POLARSSL_X509_CSR_PARSE_C */
281
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200282#if defined(POLARSSL_SSL_TLS_C)
283#include "ssl_ciphersuites.h"
284
285#define ssl_default_ciphersuites ssl_list_ciphersuites()
286#endif
287
288#if defined(POLARSSL_PK_PARSE_C) && defined(POLARSSL_RSA_C)
289#include "rsa.h"
290#include "pk.h"
291
292#define POLARSSL_ERR_X509_PASSWORD_MISMATCH POLARSSL_ERR_PK_PASSWORD_MISMATCH
293#define POLARSSL_ERR_X509_KEY_INVALID_FORMAT POLARSSL_ERR_PK_KEY_INVALID_FORMAT
294#define POLARSSL_ERR_X509_UNKNOWN_PK_ALG POLARSSL_ERR_PK_UNKNOWN_PK_ALG
295#define POLARSSL_ERR_X509_CERT_INVALID_PUBKEY POLARSSL_ERR_PK_INVALID_PUBKEY
296
297#if defined(POLARSSL_FS_IO)
Steffan Karger44cf68f2013-11-12 10:34:55 +0100298static inline int x509parse_keyfile( rsa_context *rsa, const char *path,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200299 const char *pwd ) {
300 int ret;
301 pk_context pk;
302 pk_init( &pk );
303 ret = pk_parse_keyfile( &pk, path, pwd );
304 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
305 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
306 if( ret == 0 )
307 rsa_copy( rsa, pk_rsa( pk ) );
308 else
309 rsa_free( rsa );
310 pk_free( &pk );
311 return( ret );
312}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100313static inline int x509parse_public_keyfile( rsa_context *rsa, const char *path ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200314 int ret;
315 pk_context pk;
316 pk_init( &pk );
317 ret = pk_parse_public_keyfile( &pk, path );
318 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
319 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
320 if( ret == 0 )
321 rsa_copy( rsa, pk_rsa( pk ) );
322 else
323 rsa_free( rsa );
324 pk_free( &pk );
325 return( ret );
326}
327#endif /* POLARSSL_FS_IO */
328
Steffan Karger44cf68f2013-11-12 10:34:55 +0100329static inline int x509parse_key( rsa_context *rsa, const unsigned char *key,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200330 size_t keylen,
331 const unsigned char *pwd, size_t pwdlen ) {
332 int ret;
333 pk_context pk;
334 pk_init( &pk );
335 ret = pk_parse_key( &pk, key, keylen, pwd, pwdlen );
336 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
337 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
338 if( ret == 0 )
339 rsa_copy( rsa, pk_rsa( pk ) );
340 else
341 rsa_free( rsa );
342 pk_free( &pk );
343 return( ret );
344}
345
Steffan Karger44cf68f2013-11-12 10:34:55 +0100346static inline int x509parse_public_key( rsa_context *rsa,
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200347 const unsigned char *key, size_t keylen )
348{
349 int ret;
350 pk_context pk;
351 pk_init( &pk );
352 ret = pk_parse_public_key( &pk, key, keylen );
353 if( ret == 0 && ! pk_can_do( &pk, POLARSSL_PK_RSA ) )
354 ret = POLARSSL_ERR_PK_TYPE_MISMATCH;
355 if( ret == 0 )
356 rsa_copy( rsa, pk_rsa( pk ) );
357 else
358 rsa_free( rsa );
359 pk_free( &pk );
360 return( ret );
361}
362#endif /* POLARSSL_PK_PARSE_C && POLARSSL_RSA_C */
363
364#if defined(POLARSSL_PK_WRITE_C) && defined(POLARSSL_RSA_C)
365#include "pk.h"
Steffan Karger44cf68f2013-11-12 10:34:55 +0100366static inline int x509_write_pubkey_der( unsigned char *buf, size_t len, rsa_context *rsa ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200367 int ret;
368 pk_context ctx;
369 if( ( ret = pk_init_ctx( &ctx, pk_info_from_type( POLARSSL_PK_RSA ) ) ) != 0 ) return( ret );
Paul Bakker4aa40d42013-10-11 10:49:24 +0200370 if( ( ret = rsa_copy( pk_rsa( ctx ), rsa ) ) != 0 ) return( ret );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200371 ret = pk_write_pubkey_der( &ctx, buf, len );
372 pk_free( &ctx );
373 return( ret );
374}
Steffan Karger44cf68f2013-11-12 10:34:55 +0100375static inline int x509_write_key_der( unsigned char *buf, size_t len, rsa_context *rsa ) {
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200376 int ret;
377 pk_context ctx;
378 if( ( ret = pk_init_ctx( &ctx, pk_info_from_type( POLARSSL_PK_RSA ) ) ) != 0 ) return( ret );
Paul Bakker4aa40d42013-10-11 10:49:24 +0200379 if( ( ret = rsa_copy( pk_rsa( ctx ), rsa ) ) != 0 ) return( ret );
Paul Bakkerd1a983f2013-09-16 22:26:53 +0200380 ret = pk_write_key_der( &ctx, buf, len );
381 pk_free( &ctx );
382 return( ret );
383}
384#endif /* POLARSSL_PK_WRITE_C && POLARSSL_RSA_C */
385#endif /* compat-1.2.h */