Crypt-OpenSSL-PKCS12
view release on metacpan or search on metacpan
Crypt::OpenSSL::PKCS12 - Perl extension to OpenSSL's PKCS12 API.
=head1 SYNOPSIS
use Crypt::OpenSSL::PKCS12;
my $pass = "your password";
my $pkcs12 = Crypt::OpenSSL::PKCS12->new_from_file('cert.p12');
print $pkcs12->certificate($pass);
print $pkcs12->private_key($pass);
if ($pkcs12->mac_ok($pass)) {
...
# Creating a file
$pkcs12->create('test-cert.pem', 'test-key.pem', $pass, 'out.p12', 'friendly name');
# Creating a string
my $pksc12_data = $pkcs12->create_as_string('test-cert.pem', 'test-key.pem', $pass, 'friendly name');
Create a new Crypt::OpenSSL::PKCS12 instance.
=item * certificate( [C<$pass>] )
Get the Base64 representation of the certificate.
=item * ca_certificate( [C<$pass>] )
Get the Base64 representation of the CA certificate chain.
=item * private_key( [C<$pass>] )
Get the Base64 representation of the private key.
=item * as_string( [C<$pass>] )
Get the binary represenation as a string.
=item * mac_ok( [C<$pass>] )
Verifiy the certificates Message Authentication Code
RETVAL = newSVpvn("",0);
dump_certs_keys_p12(aTHX_ bio, pkcs12, pwd, strlen(pwd), CACERTS|NOKEYS, NULL, NULL);
RETVAL = extractBioString(aTHX_ bio);
OUTPUT:
RETVAL
SV*
private_key(pkcs12, pwd = "")
Crypt::OpenSSL::PKCS12 pkcs12
char *pwd
PREINIT:
BIO *bio;
CODE:
CHECK_OPEN_SSL(bio = BIO_new(BIO_s_mem()));
t/pkcs12-from-scratch.t view on Meta::CPAN
# make PKCS12 object from string
my $pkcs12 = Crypt::OpenSSL::PKCS12->new_from_string($certdata);
# run below code that is completely taken from the test pkcs12.t
ok($pkcs12, 'PKCS object created');
my $pemcert = $pkcs12->certificate($pass);
ok($pemcert, 'PEM certificate created');
my $pemkey = $pkcs12->private_key($pass);
ok($pemkey, 'Asserting PEM key');
ok($pkcs12->mac_ok($pass), 'Asserting mac');
ok($pkcs12->as_string, 'Asserting PKCS12 as string');
SKIP: {
# https://github.com/openssl/openssl/issues/19092
if ($major =~ /^3\./) {
t/pkcs12-string.t view on Meta::CPAN
# make PKCS12 object from string
my $pkcs12 = Crypt::OpenSSL::PKCS12->new_from_string($certdata);
# run below code that is completely taken from the test pkcs12.t
ok($pkcs12, 'PKCS object created');
my $pemcert = $pkcs12->certificate($pass);
ok($pemcert, 'PEM certificate created');
my $pemkey = $pkcs12->private_key($pass);
ok($pemkey, 'Asserting PEM key');
ok($pkcs12->mac_ok($pass), 'Asserting mac');
ok($pkcs12->as_string, 'Asserting PKCS12 as string');
SKIP: {
# https://github.com/openssl/openssl/issues/19092
if ($major =~ /^3\./) {
ok($pkcs12, 'PKCS object created');
my $pemcert = $pkcs12->certificate($pass);
ok($pemcert, 'PEM certificate created');
my $cacert = $pkcs12->ca_certificate($pass);
ok($cacert, 'CA certificate created');
my $pemkey = $pkcs12->private_key($pass);
ok($pemkey, 'Asserting PEM key');
ok($pkcs12->mac_ok($pass), 'Asserting mac');
ok($pkcs12->as_string, 'Asserting PKCS12 as string');
SKIP: {
# https://github.com/openssl/openssl/issues/19092
if ($major =~ /^3\./) {
( run in 0.298 second using v1.01-cache-2.11-cpan-a5abf4f5562 )