Chilkat HOME Android™ Classic ASP C C++ C# Mono C# .NET Core C# C# UWP/WinRT DataFlex Delphi ActiveX Delphi DLL Visual FoxPro Java Lianja MFC Objective-C Perl PHP ActiveX PHP Extension PowerBuilder PowerShell PureBasic CkPython Chilkat2-Python Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ Visual Basic 6.0 VB.NET VB.NET UWP/WinRT VBScript Xojo Plugin Node.js Excel Go
(MFC) A3/A4 Certificate to Create and Verify an Opaque PKCS7/CMS SignatureDemonstrates how to use an A3 or A4 certificate w/ private key on a smartcard or token to create a PKCS7 opaque signature, and also how to verify an opaque signature. An opaque signature is different than a detached PKCS7 signature in that it contains the original data. Verifying an opaque signature retrieves the original content.
#include <CkCrypt2.h> #include <CkCert.h> void ChilkatSample(void) { CkString strOut; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. CkCrypt2 crypt; // A certificate and private key is needed to create a signature. // Chilkat provides many different ways to load a certificate and private key, such // as from a smartcards and hardware tokens, PFX/.p12, Java keystore, JWK, Windows registry-based certificate stores, and other sources. // This example will load the default certificate from the smartcard that is currently in // the smartcard reader. CkCert cert; // If the smartcard or token requires a PIN, we can set it here to avoid the dialog... cert.put_SmartCardPin("000000"); bool success = cert.LoadFromSmartcard(""); if (success != true) { strOut.append(cert.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } // Tell it to use the cert and private key we've loaded. success = crypt.SetSigningCert(cert); if (success != true) { strOut.append(crypt.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } // Indicate we want the opaque signature in base64 format: crypt.put_EncodingMode("base64"); // Sign the string using the "utf-8" byte representation: crypt.put_Charset("utf-8"); // Create the opaque signature: const char *originalData = "This is the string to be signed."; const char *opaqueSig = crypt.opaqueSignStringENC(originalData); if (crypt.get_LastMethodSuccess() != true) { strOut.append(crypt.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } strOut.append(opaqueSig); strOut.append("\r\n"); // The output looks like this: // MIIPgQYJKoZIhvcNAQcCoIIPcjCCD24CAQExCzAJBgUrDgMCGgUAMC8GCSqGSIb3DQEHAaAiBCBUaGlzIGlzIHRoZSBzdHJpbmcgdG8gYmUgc... // ---------------------------------------------------------------------------------------------- // Now let's verify the signature and retrieve the original data. // We'll use a new Crypt2 object to keep things completely separate... CkCrypt2 vCrypt; // We only need the certificate to verify a signature (and extract the data from // an opaque signature). The public key is always embedded within a certificate. success = vCrypt.SetVerifyCert(cert); if (success != true) { strOut.append(vCrypt.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } vCrypt.put_EncodingMode("base64"); vCrypt.put_Charset("utf-8"); const char *extractedData = vCrypt.opaqueVerifyStringENC(opaqueSig); if (vCrypt.get_LastMethodSuccess() != true) { strOut.append(vCrypt.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } strOut.append("The extracted data: "); strOut.append(extractedData); strOut.append("\r\n"); // The output is: // The extracted data: This is the string to be signed. SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); } |
© 2000-2022 Chilkat Software, Inc. All Rights Reserved.