Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(C) PKCS11 Generate a Session RSA Key on the HSMSee more PKCS11 ExamplesGenerates an RSA key on the smart card or token and returns the public and private key handles. The generated RSA key exists only for the duration of the PKCS11 session. Note: This example requires Chilkat v9.5.0.96 or later.
#include <C_CkPkcs11.h> #include <C_CkJsonObject.h> #include <C_CkPublicKey.h> void ChilkatSample(void) { HCkPkcs11 pkcs11; const char *pin; int userType; BOOL success; HCkJsonObject pubKeyAttr; HCkJsonObject privKeyAttr; HCkJsonObject jsonHandles; HCkPublicKey pubKey; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: Chilkat's PKCS11 implementation runs on Windows, Linux, Mac OS X, and other supported operating systems. pkcs11 = CkPkcs11_Create(); // Use the PKCS11 driver (.dll, .so, .dylib) for your particular HSM. // (The format of the path will change with the operating system. Obviously, "C:/" is not used on non-Windows systems. CkPkcs11_putSharedLibPath(pkcs11,"C:/Program Files (x86)/Gemalto/IDGo 800 PKCS#11/IDPrimePKCS1164.dll"); // Establish a logged-on session. pin = "0000"; userType = 1; success = CkPkcs11_QuickSession(pkcs11,userType,pin); if (success == FALSE) { printf("%s\n",CkPkcs11_lastErrorText(pkcs11)); CkPkcs11_Dispose(pkcs11); return; } // Specify attributes and abilities (how this key can be used) by providing a JSON template. // One template is for the public key, and the other for the private key. pubKeyAttr = CkJsonObject_Create(); // Allow the public key to be used for encryption, signature verification, and symmetric key wrapping // These attributes are optional. CkJsonObject_UpdateBool(pubKeyAttr,"encrypt",TRUE); CkJsonObject_UpdateBool(pubKeyAttr,"verify",TRUE); CkJsonObject_UpdateBool(pubKeyAttr,"wrap",TRUE); // Generate a 2048-bit RSA key. // This attribute is required. CkJsonObject_UpdateInt(pubKeyAttr,"modulus_bits",2048); privKeyAttr = CkJsonObject_Create(); // Generate a session RSA key. // A session key exists only for the duration of the PKS11 session. // To generate an RSA key that resides on the HSM, set the "token" attribute equal to TRUE CkJsonObject_UpdateBool(privKeyAttr,"token",FALSE); // Allow the private key to be used for signing and decryption. CkJsonObject_UpdateBool(privKeyAttr,"sign",TRUE); CkJsonObject_UpdateBool(privKeyAttr,"decrypt",TRUE); // Do not allow the private key to be extracted. CkJsonObject_UpdateBool(privKeyAttr,"extractable",FALSE); // Provide a JSON object to receive the public and private key handles. jsonHandles = CkJsonObject_Create(); CkJsonObject_putEmitCompact(jsonHandles,FALSE); // Provide a Chilkat public key object to receive the public key. pubKey = CkPublicKey_Create(); success = CkPkcs11_GenRsaKey(pkcs11,pubKeyAttr,privKeyAttr,jsonHandles,pubKey); if (success == FALSE) { printf("%s\n",CkPkcs11_lastErrorText(pkcs11)); printf("Failed to generate an RSA key.\n"); } else { // Sample JSON handles: // { // "public_key_handle": 18415630, // "private_key_handle": 74842125 // } printf("%s\n",CkJsonObject_emit(jsonHandles)); printf("public_key_handle: %u\n",CkJsonObject_UIntOf(jsonHandles,"public_key_handle")); printf("private_key_handle: %u\n",CkJsonObject_UIntOf(jsonHandles,"private_key_handle")); printf("public key JWK:\n"); printf("%s\n",CkPublicKey_getJwk(pubKey)); // Sample JWK: // {"kty":"RSA","n":"1sQMSAntY80L .... If9jqfMp4omQ","e":"AQAB"} printf("Success.\n"); } CkPkcs11_Logout(pkcs11); CkPkcs11_CloseSession(pkcs11); CkPkcs11_Dispose(pkcs11); CkJsonObject_Dispose(pubKeyAttr); CkJsonObject_Dispose(privKeyAttr); CkJsonObject_Dispose(jsonHandles); CkPublicKey_Dispose(pubKey); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.