Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) PKCS11 Import a Private Key onto the HSMSee more PKCS11 ExamplesDemonstrates how to import an existing RSA private key onto the smartcard/token. The imported key is a token object, meaning it stays on the HSM and exists beyond the end of the PKCS11 session. Note: This example requires Chilkat v9.5.0.96 or later.
#include <C_CkPkcs11W.h> #include <C_CkCertW.h> #include <C_CkPrivateKeyW.h> #include <C_CkJsonObjectW.h> void ChilkatSample(void) { HCkPkcs11W pkcs11; const wchar_t *pin; int userType; BOOL success; HCkCertW cert; HCkPrivateKeyW privKey; HCkJsonObjectW jsonTemplate; unsigned long keyHandle; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: Chilkat's PKCS11 implementation runs on Windows, Linux, Mac OS X, and other supported operating systems. pkcs11 = CkPkcs11W_Create(); // Use the PKCS11 driver (.dll, .so, .dylib) for your particular HSM. // (The format of the path will change with the operating system. Obviously, "C:/" is not used on non-Windows systems. CkPkcs11W_putSharedLibPath(pkcs11,L"C:/Program Files (x86)/Gemalto/IDGo 800 PKCS#11/IDPrimePKCS1164.dll"); // Establish a logged-on session. pin = L"0000"; userType = 1; success = CkPkcs11W_QuickSession(pkcs11,userType,pin); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); CkPkcs11W_Dispose(pkcs11); return; } // Let's import a certificate's private key onto the HSM. // First, we'll load the certificate from a .pfx (also known as .p12), which is a file format // that also includes the certificate's private key. cert = CkCertW_Create(); success = CkCertW_LoadPfxFile(cert,L"qa_data/pfx/ehealth.fgov.be_testing.p12",L"p12_password"); if (success == FALSE) { wprintf(L"%s\n",CkCertW_lastErrorText(cert)); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); return; } // Let's get the certificate's private key. privKey = CkCertW_ExportPrivateKey(cert); if (CkCertW_getLastMethodSuccess(cert) == FALSE) { wprintf(L"%s\n",CkCertW_lastErrorText(cert)); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); return; } // Build a PKCS11 template to provide additional information about the key to be imported. jsonTemplate = CkJsonObjectW_Create(); // Indicate that the key is to be stored on the token. It is NOT a session object. CkJsonObjectW_UpdateBool(jsonTemplate,L"token",TRUE); // Indicate that the key can be used for signing. CkJsonObjectW_UpdateBool(jsonTemplate,L"sign",TRUE); // Provide an arbitrary ID and label (anything you want). // The information in the ID and/or label provides one means for finding the key in future PKCS11 sessions. CkJsonObjectW_UpdateString(jsonTemplate,L"id_hex",L"010203040A0B0C0D0E0F"); CkJsonObjectW_UpdateString(jsonTemplate,L"label",L"ehealth private key"); // Import the key. The private key handle is returned on success. Otherwise 0 is returned. // If our only task for now is to simply import the key, we can ignore the returned handle, // other than to check for success/failure. Otherwise, the handle can be used in other PKCS11 operations. // This example just creates the key and does not use the returned handle. keyHandle = CkPkcs11W_ImportPrivateKey(pkcs11,privKey,jsonTemplate); if (keyHandle == 0) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); } else { wprintf(L"key handle = %u\n",keyHandle); wprintf(L"Successfully imported a private key onto the HSM.\n"); } CkPrivateKeyW_Dispose(privKey); CkPkcs11W_Logout(pkcs11); CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); CkJsonObjectW_Dispose(jsonTemplate); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.