diff options
Diffstat (limited to 'src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod')
| -rw-r--r-- | src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod | 56 |
1 files changed, 27 insertions, 29 deletions
diff --git a/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod b/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod index 0d9270985a..6d87079a84 100644 --- a/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod +++ b/src/lib/libcrypto/doc/PEM_read_bio_PrivateKey.pod | |||
| @@ -353,71 +353,67 @@ Read a certificate in PEM format from a BIO: | |||
| 353 | 353 | ||
| 354 | X509 *x; | 354 | X509 *x; |
| 355 | x = PEM_read_bio_X509(bp, NULL, 0, NULL); | 355 | x = PEM_read_bio_X509(bp, NULL, 0, NULL); |
| 356 | if (x == NULL) | 356 | if (x == NULL) { |
| 357 | { | ||
| 358 | /* Error */ | 357 | /* Error */ |
| 359 | } | 358 | } |
| 360 | 359 | ||
| 361 | Alternative method: | 360 | Alternative method: |
| 362 | 361 | ||
| 363 | X509 *x = NULL; | 362 | X509 *x = NULL; |
| 364 | if (!PEM_read_bio_X509(bp, &x, 0, NULL)) | 363 | if (!PEM_read_bio_X509(bp, &x, 0, NULL)) { |
| 365 | { | ||
| 366 | /* Error */ | 364 | /* Error */ |
| 367 | } | 365 | } |
| 368 | 366 | ||
| 369 | Write a certificate to a BIO: | 367 | Write a certificate to a BIO: |
| 370 | 368 | ||
| 371 | if (!PEM_write_bio_X509(bp, x)) | 369 | if (!PEM_write_bio_X509(bp, x)) { |
| 372 | { | ||
| 373 | /* Error */ | 370 | /* Error */ |
| 374 | } | 371 | } |
| 375 | 372 | ||
| 376 | Write an unencrypted private key to a FILE pointer: | 373 | Write an unencrypted private key to a FILE pointer: |
| 377 | 374 | ||
| 378 | if (!PEM_write_PrivateKey(fp, key, NULL, NULL, 0, 0, NULL)) | 375 | if (!PEM_write_PrivateKey(fp, key, NULL, NULL, 0, 0, NULL)) { |
| 379 | { | ||
| 380 | /* Error */ | 376 | /* Error */ |
| 381 | } | 377 | } |
| 382 | 378 | ||
| 383 | Write a private key (using traditional format) to a BIO using | 379 | Write a private key (using traditional format) to a BIO using |
| 384 | triple DES encryption, the pass phrase is prompted for: | 380 | triple DES encryption, the pass phrase is prompted for: |
| 385 | 381 | ||
| 386 | if (!PEM_write_bio_PrivateKey(bp, key, EVP_des_ede3_cbc(), NULL, 0, 0, NULL)) | 382 | if (!PEM_write_bio_PrivateKey(bp, key, EVP_des_ede3_cbc(), |
| 387 | { | 383 | NULL, 0, 0, NULL)) { |
| 388 | /* Error */ | 384 | /* Error */ |
| 389 | } | 385 | } |
| 390 | 386 | ||
| 391 | Write a private key (using PKCS#8 format) to a BIO using triple | 387 | Write a private key (using PKCS#8 format) to a BIO using triple |
| 392 | DES encryption, using the pass phrase "hello": | 388 | DES encryption, using the pass phrase "hello": |
| 393 | 389 | ||
| 394 | if (!PEM_write_bio_PKCS8PrivateKey(bp, key, EVP_des_ede3_cbc(), NULL, 0, 0, "hello")) | 390 | if (!PEM_write_bio_PKCS8PrivateKey(bp, key, EVP_des_ede3_cbc(), |
| 395 | { | 391 | NULL, 0, 0, "hello")) { |
| 396 | /* Error */ | 392 | /* Error */ |
| 397 | } | 393 | } |
| 398 | 394 | ||
| 399 | Read a private key from a BIO using the pass phrase "hello": | 395 | Read a private key from a BIO using the pass phrase "hello": |
| 400 | 396 | ||
| 401 | key = PEM_read_bio_PrivateKey(bp, NULL, 0, "hello"); | 397 | key = PEM_read_bio_PrivateKey(bp, NULL, 0, "hello"); |
| 402 | if (key == NULL) | 398 | if (key == NULL) { |
| 403 | { | ||
| 404 | /* Error */ | 399 | /* Error */ |
| 405 | } | 400 | } |
| 406 | 401 | ||
| 407 | Read a private key from a BIO using a pass phrase callback: | 402 | Read a private key from a BIO using a pass phrase callback: |
| 408 | 403 | ||
| 409 | key = PEM_read_bio_PrivateKey(bp, NULL, pass_cb, "My Private Key"); | 404 | key = PEM_read_bio_PrivateKey(bp, NULL, pass_cb, "My Private Key"); |
| 410 | if (key == NULL) | 405 | if (key == NULL) { |
| 411 | { | ||
| 412 | /* Error */ | 406 | /* Error */ |
| 413 | } | 407 | } |
| 414 | 408 | ||
| 415 | Skeleton pass phrase callback: | 409 | Skeleton pass phrase callback: |
| 416 | 410 | ||
| 417 | int pass_cb(char *buf, int size, int rwflag, void *u); | 411 | int |
| 418 | { | 412 | pass_cb(char *buf, int size, int rwflag, void *u) |
| 413 | { | ||
| 419 | int len; | 414 | int len; |
| 420 | char *tmp; | 415 | char *tmp; |
| 416 | |||
| 421 | /* We'd probably do something else if 'rwflag' is 1 */ | 417 | /* We'd probably do something else if 'rwflag' is 1 */ |
| 422 | printf("Enter pass phrase for \"%s\"\n", u); | 418 | printf("Enter pass phrase for \"%s\"\n", u); |
| 423 | 419 | ||
| @@ -425,12 +421,14 @@ Skeleton pass phrase callback: | |||
| 425 | tmp = "hello"; | 421 | tmp = "hello"; |
| 426 | len = strlen(tmp); | 422 | len = strlen(tmp); |
| 427 | 423 | ||
| 428 | if (len <= 0) return 0; | 424 | if (len == 0) |
| 425 | return 0; | ||
| 429 | /* if too long, truncate */ | 426 | /* if too long, truncate */ |
| 430 | if (len > size) len = size; | 427 | if (len > size) |
| 428 | len = size; | ||
| 431 | memcpy(buf, tmp, len); | 429 | memcpy(buf, tmp, len); |
| 432 | return len; | 430 | return len; |
| 433 | } | 431 | } |
| 434 | 432 | ||
| 435 | =head1 NOTES | 433 | =head1 NOTES |
| 436 | 434 | ||
