3 * Originally written by Nils Larsch for the OpenSSL project.
5 /* ====================================================================
6 * Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * openssl-core@openssl.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
58 /* ====================================================================
59 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
61 * Portions of the attached software ("Contribution") are developed by
62 * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
64 * The Contribution is licensed pursuant to the OpenSSL open source
65 * license provided above.
67 * In addition, Sun covenants to all licensees who provide a reciprocal
68 * covenant with respect to their own patents if any, not to sue under
69 * current and future patent claims necessarily infringed by the making,
70 * using, practicing, selling, offering for sale and/or otherwise
71 * disposing of the Contribution as delivered hereunder
72 * (or portions thereof), provided that such covenant shall not apply:
73 * 1) for code that a licensee deletes from the Contribution;
74 * 2) separates from the Contribution; or
75 * 3) for infringements caused by:
76 * i) the modification of the Contribution or
77 * ii) the combination of the Contribution with other software or
78 * devices where such combination causes the infringement.
80 * The elliptic curve binary polynomial software is originally written by
81 * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
91 #include <openssl/bio.h>
92 #include <openssl/err.h>
93 #include <openssl/bn.h>
94 #include <openssl/ec.h>
95 #ifndef OPENSSL_NO_ECDSA
96 #include <openssl/ecdsa.h>
98 #include <openssl/x509.h>
99 #include <openssl/pem.h>
102 #define PROG ecparam_main
104 /* -inform arg - input format - default PEM (DER or PEM)
105 * -outform arg - output format - default PEM
106 * -in arg - input file - default stdin
107 * -out arg - output file - default stdout
110 * -check - validate the ec parameters
113 * -name file - use the ecparameters with 'short name' name
114 * -list_curves - prints a list of all currently available curve
115 * 'short names' and exits
116 * -conv_form - specifies the point conversion form
117 * possible values : compressed
118 * uncompressed (default)
120 * -param_enc - specifies the way the ec parameters are encoded
121 * in the asn1 der encoding
122 * possilbe values : named_curve (default)
124 * -no_seed - if 'explicit' parameters are choosen do not
126 * -genkey - generates a ecdsa private key
128 * -engine e - use engine e, possible a hardware device
131 static const char *curve_list[67] = {
132 "prime192v1 - 192 bit prime curve from the X9.62 draft",
133 "prime192v2 - 192 bit prime curve from the X9.62 draft",
134 "prime192v3 - 192 bit prime curve from the X9.62 draft",
135 "prime239v1 - 239 bit prime curve from the X9.62 draft",
136 "prime239v2 - 239 bit prime curve from the X9.62 draft",
137 "prime239v3 - 239 bit prime curve from the X9.62 draft",
138 "prime256v1 - 256 bit prime curve from the X9.62 draft",
139 "secp112r1 - SECG recommended curve over a 112 bit prime field",
140 "secp112r2 - SECG recommended curve over a 112 bit prime field",
141 "secp128r1 - SECG recommended curve over a 128 bit prime field",
142 "secp128r2 - SECG recommended curve over a 128 bit prime field",
143 "secp160k1 - SECG recommended curve over a 160 bit prime field",
144 "secp160r1 - SECG recommended curve over a 160 bit prime field",
145 "secp160r2 - SECG recommended curve over a 160 bit prime field",
146 "secp192k1 - SECG recommended curve over a 192 bit prime field",
147 "prime192v1 - SECG recommended curve over a 192 bit prime field (aka secp192r1)",
148 "secp224k1 - SECG recommended curve over a 224 bit prime field",
149 "secp224r1 - SECG/NIST recommended curve over a 224 bit prime field",
150 "secp256k1 - SECG recommended curve over a 256 bit prime field",
151 "prime256v1 - SECG recommended curve over a 256 bit prime field (aka secp256r1)",
152 "secp384r1 - SECG/NIST recommended curve over a 384 bit prime field",
153 "secp521r1 - SECG/NIST recommended curve over a 521 bit prime field",
154 "wap-wsg-idm-ecid-wtls6 - 112 bit prime curve from the WTLS standard",
155 "wap-wsg-idm-ecid-wtls8 - 112 bit prime curve from the WTLS standard",
156 "wap-wsg-idm-ecid-wtls7 - 160 bit prime curve from the WTLS standard",
157 "wap-wsg-idm-ecid-wtls9 - 160 bit prime curve from the WTLS standard",
158 "wap-wsg-idm-ecid-wtls12 - 224 bit prime curve from the WTLS standard",
159 "c2pnb163v1 - 163 bit binary curve from the X9.62 draft",
160 "c2pnb163v2 - 163 bit binary curve from the X9.62 draft",
161 "c2pnb163v3 - 163 bit binary curve from the X9.62 draft",
162 "c2pnb176v1 - 176 bit binary curve from the X9.62 draft",
163 "c2tnb191v1 - 191 bit binary curve from the X9.62 draft",
164 "c2tnb191v2 - 191 bit binary curve from the X9.62 draft",
165 "c2tnb191v3 - 191 bit binary curve from the X9.62 draft",
166 "c2pnb208w1 - 208 bit binary curve from the X9.62 draft",
167 "c2tnb239v1 - 239 bit binary curve from the X9.62 draft",
168 "c2tnb239v2 - 239 bit binary curve from the X9.62 draft",
169 "c2tnb239v3 - 239 bit binary curve from the X9.62 draft",
170 "c2pnb272w1 - 272 bit binary curve from the X9.62 draft",
171 "c2pnb304w1 - 304 bit binary curve from the X9.62 draft",
172 "c2tnb359v1 - 359 bit binary curve from the X9.62 draft",
173 "c2pnb368w1 - 368 bit binary curve from the X9.62 draft",
174 "c2tnb431r1 - 431 bit binary curve from the X9.62 draft",
175 "sect113r1 - SECG recommended curve over a 113 bit binary field",
176 "sect113r2 - SECG recommended curve over a 113 bit binary field",
177 "sect131r1 - SECG recommended curve over a 131 bit binary field",
178 "sect131r2 - SECG recommended curve over a 131 bit binary field",
179 "sect163k1 - SECG/NIST recommended curve over a 163 bit binary field",
180 "sect163r1 - SECG recommended curve over a 163 bit binary field",
181 "sect163r2 - SECG/NIST recommended curve over a 163 bit binary field",
182 "sect193r1 - SECG recommended curve over a 193 bit binary field",
183 "sect193r2 - SECG recommended curve over a 193 bit binary field",
184 "sect233k1 - SECG/NIST recommended curve over a 233 bit binary field",
185 "sect233r1 - SECG/NIST recommended curve over a 233 bit binary field",
186 "sect239k1 - SECG recommended curve over a 239 bit binary field",
187 "sect283k1 - SECG/NIST recommended curve over a 283 bit binary field",
188 "sect283r1 - SECG/NIST recommended curve over a 283 bit binary field",
189 "sect409k1 - SECG/NIST recommended curve over a 409 bit binary field",
190 "sect409r1 - SECG/NIST recommended curve over a 409 bit binary field",
191 "sect571k1 - SECG/NIST recommended curve over a 571 bit binary field",
192 "sect571r1 - SECG/NIST recommended curve over a 571 bit binary field",
193 "wap-wsg-idm-ecid-wtls1 - 113 bit binary curve from the WTLS standard",
194 "wap-wsg-idm-ecid-wtls4 - 113 bit binary curve from the WTLS standard",
195 "wap-wsg-idm-ecid-wtls3 - 163 bit binary curve from the WTLS standard",
196 "wap-wsg-idm-ecid-wtls5 - 163 bit binary curve from the WTLS standard",
197 "wap-wsg-idm-ecid-wtls10 - 233 bit binary curve from the WTLS standard",
198 "wap-wsg-idm-ecid-wtls11 - 233 bit binary curve from the WTLS standard"
201 static int ecparam_print_var(BIO *,BIGNUM *,const char *,int,unsigned char *);
203 int MAIN(int, char **);
205 int MAIN(int argc, char **argv)
207 EC_GROUP *group = NULL;
208 point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED;
210 int asn1_flag = OPENSSL_EC_NAMED_CURVE;
211 int new_asn1_flag = 0;
212 char *curve_name = NULL, *inrand = NULL;
213 int list_curves = 0, no_seed = 0, check = 0,
214 badops = 0, text = 0, i, need_rand = 0, genkey = 0;
215 char *infile = NULL, *outfile = NULL, *prog;
216 BIO *in = NULL, *out = NULL;
217 int informat, outformat, noout = 0, C = 0, ret = 1;
221 BIGNUM *ec_p = NULL, *ec_a = NULL, *ec_b = NULL,
222 *ec_gen = NULL, *ec_order = NULL, *ec_cofactor = NULL;
223 unsigned char *buffer = NULL;
228 if ((bio_err=BIO_new(BIO_s_file())) != NULL)
229 BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
231 if (!load_config(bio_err, NULL))
235 outformat=FORMAT_PEM;
242 if (strcmp(*argv,"-inform") == 0)
244 if (--argc < 1) goto bad;
245 informat=str2fmt(*(++argv));
247 else if (strcmp(*argv,"-outform") == 0)
249 if (--argc < 1) goto bad;
250 outformat=str2fmt(*(++argv));
252 else if (strcmp(*argv,"-in") == 0)
254 if (--argc < 1) goto bad;
257 else if (strcmp(*argv,"-out") == 0)
259 if (--argc < 1) goto bad;
262 else if (strcmp(*argv,"-text") == 0)
264 else if (strcmp(*argv,"-C") == 0)
266 else if (strcmp(*argv,"-check") == 0)
268 else if (strcmp (*argv, "-name") == 0)
272 curve_name = *(++argv);
274 else if (strcmp(*argv, "-list_curves") == 0)
276 else if (strcmp(*argv, "-conv_form") == 0)
282 if (strcmp(*argv, "compressed") == 0)
283 form = POINT_CONVERSION_COMPRESSED;
284 else if (strcmp(*argv, "uncompressed") == 0)
285 form = POINT_CONVERSION_UNCOMPRESSED;
286 else if (strcmp(*argv, "hybrid") == 0)
287 form = POINT_CONVERSION_HYBRID;
291 else if (strcmp(*argv, "-param_enc") == 0)
297 if (strcmp(*argv, "named_curve") == 0)
298 asn1_flag = OPENSSL_EC_NAMED_CURVE;
299 else if (strcmp(*argv, "explicit") == 0)
304 else if (strcmp(*argv, "-no_seed") == 0)
306 else if (strcmp(*argv, "-noout") == 0)
308 else if (strcmp(*argv,"-genkey") == 0)
313 else if (strcmp(*argv, "-rand") == 0)
315 if (--argc < 1) goto bad;
319 else if(strcmp(*argv, "-engine") == 0)
321 if (--argc < 1) goto bad;
326 BIO_printf(bio_err,"unknown option %s\n",*argv);
337 BIO_printf(bio_err, "%s [options] <infile >outfile\n",prog);
338 BIO_printf(bio_err, "where options are\n");
339 BIO_printf(bio_err, " -inform arg input format - "
340 "default PEM (DER or PEM)\n");
341 BIO_printf(bio_err, " -outform arg output format - "
343 BIO_printf(bio_err, " -in arg input file - "
345 BIO_printf(bio_err, " -out arg output file - "
347 BIO_printf(bio_err, " -noout do not print the "
349 BIO_printf(bio_err, " -text print the ec "
350 "parameters in text form\n");
351 BIO_printf(bio_err, " -check validate the ec "
353 BIO_printf(bio_err, " -C print a 'C' "
354 "function creating the parameters\n");
355 BIO_printf(bio_err, " -name arg use the "
356 "ec parameters with 'short name' name\n");
357 BIO_printf(bio_err, " -list_curves prints a list of "
358 "all currently available curve\n");
359 BIO_printf(bio_err, " 'short names'\n");
360 BIO_printf(bio_err, " -conv_form arg specifies the "
361 "point conversion form \n");
362 BIO_printf(bio_err, " possible values :"
364 BIO_printf(bio_err, " "
365 " uncompressed (default)\n");
366 BIO_printf(bio_err, " "
368 BIO_printf(bio_err, " -param_enc arg specifies the way"
369 " the ec parameters are encoded\n");
370 BIO_printf(bio_err, " in the asn1 der "
372 BIO_printf(bio_err, " possilbe values :"
373 " named_curve (default)\n");
374 BIO_printf(bio_err," "
376 BIO_printf(bio_err, " -no_seed if 'explicit'"
377 " parameters are choosen do not\n");
378 BIO_printf(bio_err, " use the seed\n");
379 BIO_printf(bio_err, " -genkey generate ecdsa"
381 BIO_printf(bio_err, " -rand file files to use for"
382 " random number input\n");
383 BIO_printf(bio_err, " -engine e use engine e, "
384 "possible a hardware device\n");
388 ERR_load_crypto_strings();
390 in=BIO_new(BIO_s_file());
391 out=BIO_new(BIO_s_file());
392 if ((in == NULL) || (out == NULL))
394 ERR_print_errors(bio_err);
399 BIO_set_fp(in,stdin,BIO_NOCLOSE);
402 if (BIO_read_filename(in,infile) <= 0)
410 BIO_set_fp(out,stdout,BIO_NOCLOSE);
411 #ifdef OPENSSL_SYS_VMS
413 BIO *tmpbio = BIO_new(BIO_f_linebuffer());
414 out = BIO_push(tmpbio, out);
420 if (BIO_write_filename(out,outfile) <= 0)
427 e = setup_engine(bio_err, engine, 0);
433 for (; counter < sizeof(curve_list)/sizeof(char *); counter++)
434 if (BIO_printf(bio_err, " %s\n", curve_list[counter])
441 if (curve_name != NULL)
443 int nid = OBJ_sn2nid(curve_name);
447 BIO_printf(bio_err, "unknown curve name (%s)\n",
452 group = EC_GROUP_new_by_nid(nid);
455 BIO_printf(bio_err, "unable to create curve (%s)\n",
459 EC_GROUP_set_asn1_flag(group, asn1_flag);
460 EC_GROUP_set_point_conversion_form(group, form);
462 else if (informat == FORMAT_ASN1)
464 group = d2i_ECPKParameters_bio(in, NULL);
466 else if (informat == FORMAT_PEM)
468 group = PEM_read_bio_ECPKParameters(in,NULL,NULL,NULL);
472 BIO_printf(bio_err, "bad input format specified\n");
479 "unable to load elliptic curve parameters\n");
480 ERR_print_errors(bio_err);
485 EC_GROUP_set_point_conversion_form(group, form);
488 EC_GROUP_set_asn1_flag(group, asn1_flag);
492 EC_GROUP_set_seed(group, NULL, 0);
497 if (!ECPKParameters_print(out, group, 0))
504 BIO_printf(bio_err, "no elliptic curve parameters\n");
505 BIO_printf(bio_err, "checking elliptic curve parameters: ");
506 if (!EC_GROUP_check(group, NULL))
508 BIO_printf(bio_err, "failed\n");
509 ERR_print_errors(bio_err);
512 BIO_printf(bio_err, "ok\n");
518 size_t buf_len = 0, tmp_len = 0;
519 const EC_POINT *point;
520 int is_prime, len = 0;
521 const EC_METHOD *meth = EC_GROUP_method_of(group);
523 if ((ec_p = BN_new()) == NULL || (ec_a = BN_new()) == NULL ||
524 (ec_b = BN_new()) == NULL || (ec_gen = BN_new()) == NULL ||
525 (ec_order = BN_new()) == NULL ||
526 (ec_cofactor = BN_new()) == NULL )
528 perror("OPENSSL_malloc");
532 is_prime = (EC_METHOD_get_field_type(meth) ==
533 NID_X9_62_prime_field);
537 if (!EC_GROUP_get_curve_GFp(group, ec_p, ec_a,
547 if ((point = EC_GROUP_get0_generator(group)) == NULL)
549 if (!EC_POINT_point2bn(group, point,
550 EC_GROUP_get_point_conversion_form(group), ec_gen,
553 if (!EC_GROUP_get_order(group, ec_order, NULL))
555 if (!EC_GROUP_get_cofactor(group, ec_cofactor, NULL))
558 if (!ec_p || !ec_a || !ec_b || !ec_gen ||
559 !ec_order || !ec_cofactor)
562 len = BN_num_bits(ec_order);
564 if ((tmp_len = (size_t)BN_num_bytes(ec_p)) > buf_len)
566 if ((tmp_len = (size_t)BN_num_bytes(ec_a)) > buf_len)
568 if ((tmp_len = (size_t)BN_num_bytes(ec_b)) > buf_len)
570 if ((tmp_len = (size_t)BN_num_bytes(ec_gen)) > buf_len)
572 if ((tmp_len = (size_t)BN_num_bytes(ec_order)) > buf_len)
574 if ((tmp_len = (size_t)BN_num_bytes(ec_cofactor)) > buf_len)
577 buffer = (unsigned char *)OPENSSL_malloc(buf_len);
581 perror("OPENSSL_malloc");
585 ecparam_print_var(out, ec_p, "ec_p", len, buffer);
586 ecparam_print_var(out, ec_a, "ec_a", len, buffer);
587 ecparam_print_var(out, ec_b, "ec_b", len, buffer);
588 ecparam_print_var(out, ec_gen, "ec_gen", len, buffer);
589 ecparam_print_var(out, ec_order, "ec_order", len, buffer);
590 ecparam_print_var(out, ec_cofactor, "ec_cofactor", len,
593 BIO_printf(out, "\n\n");
595 BIO_printf(out, "EC_GROUP *get_ec_group_%d(void)\n\t{\n", len);
596 BIO_printf(out, "\tint ok=0;\n");
597 BIO_printf(out, "\tEC_GROUP *group = NULL;\n");
598 BIO_printf(out, "\tEC_POINT *point = NULL;\n");
599 BIO_printf(out, "\tBIGNUM *tmp_1 = NULL, *tmp_2 = NULL, "
600 "*tmp_3 = NULL;\n\n");
601 BIO_printf(out, "\tif ((tmp_1 = BN_bin2bn(ec_p_%d, "
602 "sizeof(ec_p_%d), NULL)) == NULL)\n\t\t"
603 "goto err;\n", len, len);
604 BIO_printf(out, "\tif ((tmp_2 = BN_bin2bn(ec_a_%d, "
605 "sizeof(ec_a_%d), NULL)) == NULL)\n\t\t"
606 "goto err;\n", len, len);
607 BIO_printf(out, "\tif ((tmp_3 = BN_bin2bn(ec_b_%d, "
608 "sizeof(ec_b_%d), NULL)) == NULL)\n\t\t"
609 "goto err;\n", len, len);
612 BIO_printf(out, "\tif ((group = EC_GROUP_new_curve_"
613 "GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL)"
614 "\n\t\tgoto err;\n\n");
621 BIO_printf(out, "\t/* build generator */\n");
622 BIO_printf(out, "\tif ((tmp_1 = BN_bin2bn(ec_gen_%d, "
623 "sizeof(ec_gen_%d), tmp_1)) == NULL)"
624 "\n\t\tgoto err;\n", len, len);
625 BIO_printf(out, "\tpoint = EC_POINT_bn2point(group, tmp_1, "
627 BIO_printf(out, "\tif (point == NULL)\n\t\tgoto err;\n");
628 BIO_printf(out, "\tif ((tmp_2 = BN_bin2bn(ec_order_%d, "
629 "sizeof(ec_order_%d), tmp_2)) == NULL)"
630 "\n\t\tgoto err;\n", len, len);
631 BIO_printf(out, "\tif ((tmp_3 = BN_bin2bn(ec_cofactor_%d, "
632 "sizeof(ec_cofactor_%d), tmp_3)) == NULL)"
633 "\n\t\tgoto err;\n", len, len);
634 BIO_printf(out, "\tif (!EC_GROUP_set_generator(group, point,"
635 " tmp_2, tmp_3))\n\t\tgoto err;\n");
636 BIO_printf(out, "\n\tok=1;\n");
637 BIO_printf(out, "err:\n");
638 BIO_printf(out, "\tif (tmp_1)\n\t\tBN_free(tmp_1);\n");
639 BIO_printf(out, "\tif (tmp_2)\n\t\tBN_free(tmp_2);\n");
640 BIO_printf(out, "\tif (tmp_3)\n\t\tBN_free(tmp_3);\n");
641 BIO_printf(out, "\tif (point)\n\t\tEC_POINT_free(point);\n");
642 BIO_printf(out, "\tif (!ok)\n");
643 BIO_printf(out, "\t\t{\n");
644 BIO_printf(out, "\t\tEC_GROUP_free(group);\n");
645 BIO_printf(out, "\t\tgroup = NULL;\n");
646 BIO_printf(out, "\t\t}\n");
647 BIO_printf(out, "\treturn(group);\n\t}\n");
652 if (outformat == FORMAT_ASN1)
653 i = i2d_ECPKParameters_bio(out, group);
654 else if (outformat == FORMAT_PEM)
655 i = PEM_write_bio_ECPKParameters(out, group);
658 BIO_printf(bio_err,"bad output format specified for"
664 BIO_printf(bio_err, "unable to write elliptic "
665 "curve parameters\n");
666 ERR_print_errors(bio_err);
673 app_RAND_load_file(NULL, bio_err, (inrand != NULL));
675 BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
676 app_RAND_load_files(inrand));
681 EC_KEY *eckey = EC_KEY_new();
688 eckey->group = group;
690 if (!EC_KEY_generate_key(eckey))
696 if (outformat == FORMAT_ASN1)
697 i = i2d_ECPrivateKey_bio(out, eckey);
698 else if (outformat == FORMAT_PEM)
699 i = PEM_write_bio_ECPrivateKey(out, eckey, NULL,
700 NULL, 0, NULL, NULL);
703 BIO_printf(bio_err, "bad output format specified "
714 app_RAND_write_file(NULL, bio_err);
729 BN_free(ec_cofactor);
731 OPENSSL_free(buffer);
737 EC_GROUP_free(group);
742 int ecparam_print_var(BIO *out, BIGNUM *in, const char *var,
743 int len, unsigned char *buffer)
745 BIO_printf(out, "static unsigned char %s_%d[] = {", var, len);
747 BIO_printf(out, "\n\t0x00");
752 l = BN_bn2bin(in, buffer);
753 for (i=0; i<l-1; i++)
756 BIO_printf(out, "\n\t");
757 BIO_printf(out, "0x%02X,", buffer[i]);
760 BIO_printf(out, "\n\t");
761 BIO_printf(out, "0x%02X", buffer[i]);
763 BIO_printf(out, "\n\t};\n\n");