mirror of
https://github.com/moparisthebest/curl
synced 2024-11-15 22:15:13 -05:00
139 lines
4.5 KiB
C
139 lines
4.5 KiB
C
/***************************************************************************
|
|
* _ _ ____ _
|
|
* Project ___| | | | _ \| |
|
|
* / __| | | | |_) | |
|
|
* | (__| |_| | _ <| |___
|
|
* \___|\___/|_| \_\_____|
|
|
*
|
|
* Copyright (C) 1998 - 2012, Daniel Stenberg, <daniel@haxx.se>, et al.
|
|
*
|
|
* This software is licensed as described in the file COPYING, which
|
|
* you should have received as part of this distribution. The terms
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
|
*
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
*
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
* KIND, either express or implied.
|
|
*
|
|
***************************************************************************/
|
|
#include <stdio.h>
|
|
|
|
#include <curl/curl.h>
|
|
|
|
/* some requirements for this to work:
|
|
1. set pCertFile to the file with the client certificate
|
|
2. if the key is passphrase protected, set pPassphrase to the
|
|
passphrase you use
|
|
3. if you are using a crypto engine:
|
|
3.1. set a #define USE_ENGINE
|
|
3.2. set pEngine to the name of the crypto engine you use
|
|
3.3. set pKeyName to the key identifier you want to use
|
|
4. if you don't use a crypto engine:
|
|
4.1. set pKeyName to the file name of your client key
|
|
4.2. if the format of the key file is DER, set pKeyType to "DER"
|
|
|
|
!! verify of the server certificate is not implemented here !!
|
|
|
|
**** This example only works with libcurl 7.9.3 and later! ****
|
|
|
|
*/
|
|
|
|
int main(void)
|
|
{
|
|
int i;
|
|
CURL *curl;
|
|
CURLcode res;
|
|
FILE *headerfile;
|
|
const char *pPassphrase = NULL;
|
|
|
|
static const char *pCertFile = "testcert.pem";
|
|
static const char *pCACertFile="cacert.pem";
|
|
|
|
const char *pKeyName;
|
|
const char *pKeyType;
|
|
|
|
const char *pEngine;
|
|
|
|
#ifdef USE_ENGINE
|
|
pKeyName = "rsa_test";
|
|
pKeyType = "ENG";
|
|
pEngine = "chil"; /* for nChiper HSM... */
|
|
#else
|
|
pKeyName = "testkey.pem";
|
|
pKeyType = "PEM";
|
|
pEngine = NULL;
|
|
#endif
|
|
|
|
headerfile = fopen("dumpit", "w");
|
|
|
|
curl_global_init(CURL_GLOBAL_DEFAULT);
|
|
|
|
curl = curl_easy_init();
|
|
if(curl) {
|
|
/* what call to write: */
|
|
curl_easy_setopt(curl, CURLOPT_URL, "HTTPS://your.favourite.ssl.site");
|
|
curl_easy_setopt(curl, CURLOPT_HEADERDATA, headerfile);
|
|
|
|
for(i = 0; i < 1; i++) /* single-iteration loop, just to break out from */
|
|
{
|
|
if (pEngine) /* use crypto engine */
|
|
{
|
|
if (curl_easy_setopt(curl, CURLOPT_SSLENGINE,pEngine) != CURLE_OK)
|
|
{ /* load the crypto engine */
|
|
fprintf(stderr,"can't set crypto engine\n");
|
|
break;
|
|
}
|
|
if (curl_easy_setopt(curl, CURLOPT_SSLENGINE_DEFAULT,1L) != CURLE_OK)
|
|
{ /* set the crypto engine as default */
|
|
/* only needed for the first time you load
|
|
a engine in a curl object... */
|
|
fprintf(stderr,"can't set crypto engine as default\n");
|
|
break;
|
|
}
|
|
}
|
|
/* cert is stored PEM coded in file... */
|
|
/* since PEM is default, we needn't set it for PEM */
|
|
curl_easy_setopt(curl,CURLOPT_SSLCERTTYPE,"PEM");
|
|
|
|
/* set the cert for client authentication */
|
|
curl_easy_setopt(curl,CURLOPT_SSLCERT,pCertFile);
|
|
|
|
/* sorry, for engine we must set the passphrase
|
|
(if the key has one...) */
|
|
if (pPassphrase)
|
|
curl_easy_setopt(curl,CURLOPT_KEYPASSWD,pPassphrase);
|
|
|
|
/* if we use a key stored in a crypto engine,
|
|
we must set the key type to "ENG" */
|
|
curl_easy_setopt(curl,CURLOPT_SSLKEYTYPE,pKeyType);
|
|
|
|
/* set the private key (file or ID in engine) */
|
|
curl_easy_setopt(curl,CURLOPT_SSLKEY,pKeyName);
|
|
|
|
/* set the file with the certs vaildating the server */
|
|
curl_easy_setopt(curl,CURLOPT_CAINFO,pCACertFile);
|
|
|
|
/* disconnect if we can't validate server's cert */
|
|
curl_easy_setopt(curl,CURLOPT_SSL_VERIFYPEER,1L);
|
|
|
|
/* Perform the request, res will get the return code */
|
|
res = curl_easy_perform(curl);
|
|
/* Check for errors */
|
|
if(res != CURLE_OK)
|
|
fprintf(stderr, "curl_easy_perform() failed: %s\n",
|
|
curl_easy_strerror(res));
|
|
|
|
/* we are done... */
|
|
}
|
|
/* always cleanup */
|
|
curl_easy_cleanup(curl);
|
|
}
|
|
|
|
curl_global_cleanup();
|
|
|
|
return 0;
|
|
}
|