Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) PKCS11 Generate a RSA Key that stays on the HSMSee more PKCS11 ExamplesGenerates an RSA key on the smart card or token and returns the public and private key handles. The generated RSA key stays on the HSM even after the PKCS11 session has ended. Note: This example requires Chilkat v9.5.0.96 or later.
#include <C_CkPkcs11W.h> #include <C_CkJsonObjectW.h> #include <C_CkPublicKeyW.h> void ChilkatSample(void) { HCkPkcs11W pkcs11; const wchar_t *pin; int userType; BOOL success; HCkJsonObjectW pubKeyAttr; const wchar_t *keyId; const wchar_t *keyLabel; HCkJsonObjectW privKeyAttr; HCkJsonObjectW jsonHandles; HCkPublicKeyW pubKey; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: Chilkat's PKCS11 implementation runs on Windows, Linux, Mac OS X, and other supported operating systems. pkcs11 = CkPkcs11W_Create(); // Use the PKCS11 driver (.dll, .so, .dylib) for your particular HSM. // (The format of the path will change with the operating system. Obviously, "C:/" is not used on non-Windows systems. CkPkcs11W_putSharedLibPath(pkcs11,L"C:/Program Files (x86)/Gemalto/IDGo 800 PKCS#11/IDPrimePKCS1164.dll"); // Establish a logged-on session. // Use your actual PIN here. pin = L"0000"; userType = 1; success = CkPkcs11W_QuickSession(pkcs11,userType,pin); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); CkPkcs11W_Dispose(pkcs11); return; } // Specify attributes and abilities (how this key can be used) by providing a JSON template. // One template is for the public key, and the other for the private key. pubKeyAttr = CkJsonObjectW_Create(); // Generate a RSA key that remains on the HSM by setting the "token" attribute equal to TRUE CkJsonObjectW_UpdateBool(pubKeyAttr,L"token",TRUE); // Given that our key will reside on the token, we should give it two attributes (id and label) to help us // find it in future sessions. // First, we can give it an arbitrary ID. ID's are binary, so we specify bytes as either // "id_hex" for hexidecimal bytes, // "id_ascii" for the bytes of an ascii string, // "id" for bytes in base64 format. keyId = L"48656C6C6F"; CkJsonObjectW_UpdateString(pubKeyAttr,L"id_hex",keyId); // We can also give our key a label with any descriptive string. keyLabel = L"2048-bit RSA key for testing"; CkJsonObjectW_UpdateString(pubKeyAttr,L"label",keyLabel); // ----------------------------------------------------------------------------------- // IMPORTANT: The ID for the public key must be the same as the ID for the private key. // ----------------------------------------------------------------------------------- // Allow the public key to be used for encryption, signature verification, and symmetric key wrapping. // These attributes are optional. CkJsonObjectW_UpdateBool(pubKeyAttr,L"encrypt",TRUE); CkJsonObjectW_UpdateBool(pubKeyAttr,L"verify",TRUE); CkJsonObjectW_UpdateBool(pubKeyAttr,L"wrap",TRUE); // Generate a 2048-bit RSA key. // This attribute is required. CkJsonObjectW_UpdateInt(pubKeyAttr,L"modulus_bits",2048); privKeyAttr = CkJsonObjectW_Create(); // Generate a RSA key that remains on the HSM by setting the "token" attribute equal to TRUE CkJsonObjectW_UpdateBool(privKeyAttr,L"token",TRUE); // Make sure we give the private key the same ID as the public key. CkJsonObjectW_UpdateString(privKeyAttr,L"id_hex",keyId); // We can also give our key a label with any descriptive string. // (Best to use the same label as for the public key) CkJsonObjectW_UpdateString(privKeyAttr,L"label",keyLabel); // Allow the private key to be used for signing and decryption. CkJsonObjectW_UpdateBool(privKeyAttr,L"sign",TRUE); CkJsonObjectW_UpdateBool(privKeyAttr,L"decrypt",TRUE); // Do not allow the private key to be extracted. CkJsonObjectW_UpdateBool(privKeyAttr,L"extractable",FALSE); // Provide a JSON object to receive the public and private key handles. jsonHandles = CkJsonObjectW_Create(); CkJsonObjectW_putEmitCompact(jsonHandles,FALSE); // Provide a Chilkat public key object to receive the public key. pubKey = CkPublicKeyW_Create(); success = CkPkcs11W_GenRsaKey(pkcs11,pubKeyAttr,privKeyAttr,jsonHandles,pubKey); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); wprintf(L"Failed to generate an RSA key.\n"); } else { // Sample JSON handles: // { // "public_key_handle": 18415630, // "private_key_handle": 74842125 // } wprintf(L"%s\n",CkJsonObjectW_emit(jsonHandles)); wprintf(L"public_key_handle: %u\n",CkJsonObjectW_UIntOf(jsonHandles,L"public_key_handle")); wprintf(L"private_key_handle: %u\n",CkJsonObjectW_UIntOf(jsonHandles,L"private_key_handle")); wprintf(L"public key JWK:\n"); wprintf(L"%s\n",CkPublicKeyW_getJwk(pubKey)); // Sample JWK: // {"kty":"RSA","n":"1sQMSAntY80L .... If9jqfMp4omQ","e":"AQAB"} wprintf(L"Success.\n"); } CkPkcs11W_Logout(pkcs11); CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); CkJsonObjectW_Dispose(pubKeyAttr); CkJsonObjectW_Dispose(privKeyAttr); CkJsonObjectW_Dispose(jsonHandles); CkPublicKeyW_Dispose(pubKey); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.