diff --git a/certmanager/Makefile b/certmanager/Makefile new file mode 100644 index 00000000..5ca66b23 --- /dev/null +++ b/certmanager/Makefile @@ -0,0 +1,11 @@ +CC=gcc +CFLAGS=-Wall +LIBS= -lwolfssl + +certverify: certverify.o + $(CC) -o $@ $^ $(CFLAGS) $(LIBS) + +.PHONY: clean + +clean: + rm -f *.o certverify diff --git a/certmanager/README.md b/certmanager/README.md new file mode 100644 index 00000000..281fa10f --- /dev/null +++ b/certmanager/README.md @@ -0,0 +1,13 @@ +# wolfSSL CertManager Example + +This directory contains: + +A simple example of using the wolfSSL CertManager to verify a certificate +in a standalone manner, separate from an SSL/TLS connection. + +## Compiling and Running the Example + +``` +$ make +$ ./certverify +``` diff --git a/certmanager/certverify.c b/certmanager/certverify.c new file mode 100644 index 00000000..544529f2 --- /dev/null +++ b/certmanager/certverify.c @@ -0,0 +1,58 @@ +/* standalone.c + * + * Copyright (C) 2006-2015 wolfSSL Inc. + * + * This file is part of wolfSSL. (formerly known as CyaSSL) + * + * wolfSSL is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * wolfSSL is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA + */ + +#include +#include +#include +#include + +int main(void) +{ + int ret; + WOLFSSL_CERT_MANAGER* cm = 0; + + const char* caCert = "../certs/ca-cert.pem"; + const char* verifyCert = "../certs/server-cert.pem"; + + cm = wolfSSL_CertManagerNew(); + if (cm == NULL) { + printf("wolfSSL_CertManagerNew() failed\n"); + return -1; + } + + ret = wolfSSL_CertManagerLoadCA(cm, caCert, 0); + if (ret != SSL_SUCCESS) { + printf("wolfSSL_CertManagerLoadCA() failed (%d): %s\n", + ret, wc_GetErrorString(ret)); + wolfSSL_CertManagerFree(cm); + return -1; + } + + ret = wolfSSL_CertManagerVerify(cm, verifyCert, SSL_FILETYPE_PEM); + if (ret != SSL_SUCCESS) { + printf("wolfSSL_CertManagerVerify() failed (%d): %s\n", + ret, wc_GetErrorString(ret)); + wolfSSL_CertManagerFree(cm); + return -1; + } + printf("Verification Successful!\n"); +} +