summaryrefslogtreecommitdiff
path: root/doc/tex/ex-crq.tex
diff options
context:
space:
mode:
Diffstat (limited to 'doc/tex/ex-crq.tex')
-rw-r--r--doc/tex/ex-crq.tex132
1 files changed, 132 insertions, 0 deletions
diff --git a/doc/tex/ex-crq.tex b/doc/tex/ex-crq.tex
new file mode 100644
index 0000000000..2fce84a2be
--- /dev/null
+++ b/doc/tex/ex-crq.tex
@@ -0,0 +1,132 @@
+\begin{verbatim}
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <gnutls/gnutls.h>
+#include <gnutls/x509.h>
+#include <time.h>
+
+/* This example will generate a private key and a certificate
+ * request.
+ */
+
+int main()
+{
+ gnutls_x509_crq crq;
+ gnutls_x509_privkey key;
+ unsigned char buffer[10*1024];
+ int buffer_size = sizeof(buffer);
+ int ret;
+
+ gnutls_global_init();
+
+ /* Initialize an empty certificate request, and
+ * an empty private key.
+ */
+ ret = gnutls_x509_crq_init(&crq);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ ret = gnutls_x509_privkey_init(&key);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ /* Generate a 1024 bit RSA private key.
+ */
+ ret = gnutls_x509_privkey_generate(key, GNUTLS_PK_RSA, 1024, 0);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+
+ /* Add stuff to the distinguished name
+ */
+ ret =
+ gnutls_x509_crq_set_dn_by_oid(crq, GNUTLS_OID_X520_COUNTRY_NAME,
+ "GR", 2);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ ret =
+ gnutls_x509_crq_set_dn_by_oid(crq, GNUTLS_OID_X520_COMMON_NAME,
+ "Nikos", strlen("Nikos"));
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ /* Set the request version.
+ */
+ ret = gnutls_x509_crq_set_version(crq, 0);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ /* Set a challenge password.
+ */
+ ret = gnutls_x509_crq_set_challenge_password(crq, "fuck you");
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ /* Associate the request with the private key
+ */
+ ret = gnutls_x509_crq_set_key(crq, key);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ /* Self sign the certificate request.
+ */
+ ret = gnutls_x509_crq_sign(crq, key);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ /* Export the PEM encoded certificate request, and
+ * display it.
+ */
+ ret =
+ gnutls_x509_crq_export(crq, GNUTLS_X509_FMT_PEM, buffer,
+ &buffer_size);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ printf("Certificate Request: \n%s", buffer);
+
+
+ /* Export the PEM encoded private key, and
+ * display it.
+ */
+ buffer_size = sizeof(buffer);
+ ret =
+ gnutls_x509_privkey_export(key, GNUTLS_X509_FMT_PEM, buffer,
+ &buffer_size);
+ if (ret < 0) {
+ fprintf(stderr, "ret: %s\n", gnutls_strerror(ret));
+ exit(1);
+ }
+
+ printf("\n\nPrivate key: \n%s", buffer);
+
+ gnutls_x509_crq_deinit(crq);
+ gnutls_x509_privkey_deinit(key);
+
+ return 0;
+
+}
+
+\end{verbatim}