documented pin_callback expectations.
[gnutls.git] / tests / pkcs12_encode.c
blob3d9e8e6210491c0256e943dfd4a3dc2719284685
1 /*
2 * Copyright (C) 2009-2012 Free Software Foundation, Inc.
4 * Author: Simon Josefsson
6 * This file is part of GnuTLS.
8 * GnuTLS is free software; you can redistribute it and/or modify it
9 * under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 3 of the License, or
11 * (at your option) any later version.
13 * GnuTLS is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * General Public License for more details.
18 * You should have received a copy of the GNU General Public License
19 * along with GnuTLS; if not, write to the Free Software Foundation,
20 * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
23 #ifdef HAVE_CONFIG_H
24 #include <config.h>
25 #endif
27 #include <gnutls/gnutls.h>
28 #include <gnutls/x509.h>
29 #include <gnutls/pkcs12.h>
31 #include "utils.h"
33 #include <error.h>
34 #include <stdio.h>
35 #include <stdlib.h>
37 static char client_pem[] =
38 "-----BEGIN CERTIFICATE-----\n"
39 "MIICHjCCAYmgAwIBAgIERiYdNzALBgkqhkiG9w0BAQUwGTEXMBUGA1UEAxMOR251\n"
40 "VExTIHRlc3QgQ0EwHhcNMDcwNDE4MTMyOTI3WhcNMDgwNDE3MTMyOTI3WjAdMRsw\n"
41 "GQYDVQQDExJHbnVUTFMgdGVzdCBjbGllbnQwgZwwCwYJKoZIhvcNAQEBA4GMADCB\n"
42 "iAKBgLtmQ/Xyxde2jMzF3/WIO7HJS2oOoa0gUEAIgKFPXKPQ+GzP5jz37AR2ExeL\n"
43 "ZIkiW8DdU3w77XwEu4C5KL6Om8aOoKUSy/VXHqLnu7czSZ/ju0quak1o/8kR4jKN\n"
44 "zj2AC41179gAgY8oBAOgIo1hBAf6tjd9IQdJ0glhaZiQo1ipAgMBAAGjdjB0MAwG\n"
45 "A1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDwYDVR0PAQH/BAUDAweg\n"
46 "ADAdBgNVHQ4EFgQUTLkKm/odNON+3svSBxX+odrLaJEwHwYDVR0jBBgwFoAU6Twc\n"
47 "+62SbuYGpFYsouHAUyfI8pUwCwYJKoZIhvcNAQEFA4GBALujmBJVZnvaTXr9cFRJ\n"
48 "jpfc/3X7sLUsMvumcDE01ls/cG5mIatmiyEU9qI3jbgUf82z23ON/acwJf875D3/\n"
49 "U7jyOsBJ44SEQITbin2yUeJMIm1tievvdNXBDfW95AM507ShzP12sfiJkJfjjdhy\n"
50 "dc8Siq5JojruiMizAf0pA7in\n" "-----END CERTIFICATE-----\n";
51 const gnutls_datum_t client_dat = { (void*)client_pem, sizeof (client_pem) };
53 static char ca_pem[] =
54 "-----BEGIN CERTIFICATE-----\n"
55 "MIIB5zCCAVKgAwIBAgIERiYdJzALBgkqhkiG9w0BAQUwGTEXMBUGA1UEAxMOR251\n"
56 "VExTIHRlc3QgQ0EwHhcNMDcwNDE4MTMyOTExWhcNMDgwNDE3MTMyOTExWjAZMRcw\n"
57 "FQYDVQQDEw5HbnVUTFMgdGVzdCBDQTCBnDALBgkqhkiG9w0BAQEDgYwAMIGIAoGA\n"
58 "vuyYeh1vfmslnuggeEKgZAVmQ5ltSdUY7H25WGSygKMUYZ0KT74v8C780qtcNt9T\n"
59 "7EPH/N6RvB4BprdssgcQLsthR3XKA84jbjjxNCcaGs33lvOz8A1nf8p3hD+cKfRi\n"
60 "kfYSW2JazLrtCC4yRCas/SPOUxu78of+3HiTfFm/oXUCAwEAAaNDMEEwDwYDVR0T\n"
61 "AQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwQAMB0GA1UdDgQWBBTpPBz7rZJu5gak\n"
62 "Viyi4cBTJ8jylTALBgkqhkiG9w0BAQUDgYEAiaIRqGfp1jPpNeVhABK60SU0KIAy\n"
63 "njuu7kHq5peUgYn8Jd9zNzExBOEp1VOipGsf6G66oQAhDFp2o8zkz7ZH71zR4HEW\n"
64 "KoX6n5Emn6DvcEH/9pAhnGxNHJAoS7czTKv/JDZJhkqHxyrE1fuLsg5Qv25DTw7+\n"
65 "PfqUpIhz5Bbm7J4=\n" "-----END CERTIFICATE-----\n";
66 const gnutls_datum_t ca_dat = { (void*)ca_pem, sizeof (ca_pem) };
68 static void
69 tls_log_func (int level, const char *str)
71 fprintf (stderr, "|<%d>| %s", level, str);
74 void
75 doit (void)
77 gnutls_pkcs12_t pkcs12;
78 gnutls_x509_crt_t client;
79 gnutls_x509_crt_t ca;
80 gnutls_pkcs12_bag_t bag;
81 unsigned char key_id_buf[20];
82 gnutls_datum_t key_id;
83 int ret, indx;
84 char outbuf[10240];
85 size_t size;
86 int i;
88 ret = gnutls_global_init ();
89 if (ret < 0)
90 error (EXIT_FAILURE, 0, "gnutls_global_init %d", ret);
92 gnutls_global_set_log_function (tls_log_func);
93 if (debug)
94 gnutls_global_set_log_level (4711);
96 /* Read certs. */
97 ret = gnutls_x509_crt_init (&client);
98 if (ret < 0)
99 error (EXIT_FAILURE, 0, "crt_init: %d", ret);
101 ret = gnutls_x509_crt_import (client, &client_dat, GNUTLS_X509_FMT_PEM);
102 if (ret < 0)
103 error (EXIT_FAILURE, 0, "crt_import: %d", ret);
105 ret = gnutls_x509_crt_init (&ca);
106 if (ret < 0)
107 error (EXIT_FAILURE, 0, "ca_init: %d", ret);
109 ret = gnutls_x509_crt_import (ca, &ca_dat, GNUTLS_X509_FMT_PEM);
110 if (ret < 0)
111 error (EXIT_FAILURE, 0, "ca_import: %d", ret);
113 /* Create PKCS#12 structure. */
114 ret = gnutls_pkcs12_init (&pkcs12);
115 if (ret < 0)
116 error (EXIT_FAILURE, 0, "pkcs12_init: %d", ret);
118 /* Generate and add PKCS#12 cert bags. */
119 for (i = 0; i < 2; i++)
121 ret = gnutls_pkcs12_bag_init (&bag);
122 if (ret < 0)
123 error (EXIT_FAILURE, 0, "bag_init: %d", ret);
125 ret = gnutls_pkcs12_bag_set_crt (bag, i == 0 ? client : ca);
126 if (ret < 0)
127 error (EXIT_FAILURE, 0, "set_crt: %d", ret);
129 indx = ret;
131 ret = gnutls_pkcs12_bag_set_friendly_name (bag, indx,
132 i == 0 ? "client" : "ca");
133 if (ret < 0)
134 error (EXIT_FAILURE, 0, "set_friendly_name: %d", ret);
136 size = sizeof (key_id_buf);
137 ret = gnutls_x509_crt_get_key_id (i == 0 ? client : ca, 0,
138 key_id_buf, &size);
139 if (ret < 0)
140 error (EXIT_FAILURE, 0, "get_key_id: %d", ret);
142 key_id.data = key_id_buf;
143 key_id.size = size;
145 ret = gnutls_pkcs12_bag_set_key_id (bag, indx, &key_id);
146 if (ret < 0)
147 error (EXIT_FAILURE, 0, "bag_set_key_id: %d", ret);
149 ret = gnutls_pkcs12_bag_encrypt (bag, "pass",
150 i == 0 ? GNUTLS_PKCS8_USE_PKCS12_3DES
151 : GNUTLS_PKCS_USE_PKCS12_RC2_40);
152 if (ret < 0)
153 error (EXIT_FAILURE, 0, "bag_encrypt: %d: %s", ret,
154 i == 0 ? "3DES" : "RC2-40");
156 ret = gnutls_pkcs12_set_bag (pkcs12, bag);
157 if (ret < 0)
158 error (EXIT_FAILURE, 0, "set_bag: %d", ret);
160 gnutls_pkcs12_bag_deinit (bag);
163 /* MAC the structure, export and print. */
164 ret = gnutls_pkcs12_generate_mac (pkcs12, "pass");
165 if (ret < 0)
166 error (EXIT_FAILURE, 0, "generate_mac: %d", ret);
168 size = sizeof (outbuf);
169 ret = gnutls_pkcs12_export (pkcs12, GNUTLS_X509_FMT_PEM, outbuf, &size);
170 if (ret < 0)
171 error (EXIT_FAILURE, 0, "pkcs12_export: %d", ret);
173 if (debug)
174 fwrite (outbuf, size, 1, stdout);
176 /* Cleanup. */
177 gnutls_pkcs12_deinit (pkcs12);
178 gnutls_x509_crt_deinit (client);
179 gnutls_x509_crt_deinit (ca);
180 gnutls_global_deinit ();