Chilkat HOME Android™ Classic ASP C C++ C# Mono C# .NET Core C# C# UWP/WinRT DataFlex Delphi ActiveX Delphi DLL Visual FoxPro Java Lianja MFC Objective-C Perl PHP ActiveX PHP Extension PowerBuilder PowerShell PureBasic CkPython Chilkat2-Python Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ Visual Basic 6.0 VB.NET VB.NET UWP/WinRT VBScript Xojo Plugin Node.js Excel Go
(MFC) JWS Using RSASSA-PSS using SHA-256 and MGF1 with SHA-256Creates and validates a JSON Web Signature (JWS) using RSASSA-PSS using SHA-256 and MGF1 with SHA-256. Chilkat supports all of the following JWS algorithms: +--------------+-------------------------------+--------------------+ | "alg" Param | Digital Signature or MAC | Implementation | | Value | Algorithm | Requirements | +--------------+-------------------------------+--------------------+ | HS256 | HMAC using SHA-256 | Required | | HS384 | HMAC using SHA-384 | Optional | | HS512 | HMAC using SHA-512 | Optional | | RS256 | RSASSA-PKCS1-v1_5 using | Recommended | | | SHA-256 | | | RS384 | RSASSA-PKCS1-v1_5 using | Optional | | | SHA-384 | | | RS512 | RSASSA-PKCS1-v1_5 using | Optional | | | SHA-512 | | | ES256 | ECDSA using P-256 and SHA-256 | Recommended+ | | ES384 | ECDSA using P-384 and SHA-384 | Optional | | ES512 | ECDSA using P-521 and SHA-512 | Optional | | PS256 | RSASSA-PSS using SHA-256 and | Optional | | | MGF1 with SHA-256 | | | PS384 | RSASSA-PSS using SHA-384 and | Optional | | | MGF1 with SHA-384 | | | PS512 | RSASSA-PSS using SHA-512 and | Optional | | | MGF1 with SHA-512 | | +--------------+-------------------------------+--------------------+ Note: This example requires Chilkat v9.5.0.66 or greater.
#include <CkStringBuilder.h> #include <CkPrivateKey.h> #include <CkJsonObject.h> #include <CkJws.h> #include <CkPublicKey.h> void ChilkatSample(void) { CkString strOut; // This requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: This example requires Chilkat v9.5.0.66 or greater. // Use the following RSA key loaded from JWK format. CkStringBuilder sbJwk; sbJwk.Append("{\"kty\":\"RSA\","); sbJwk.Append("\"n\":\"ofgWCuLjybRlzo0tZWJjNiuSfb4p4fAkd_wWJcyQoTbji9k0l8W26mPddx"); sbJwk.Append("HmfHQp-Vaw-4qPCJrcS2mJPMEzP1Pt0Bm4d4QlL-yRT-SFd2lZS-pCgNMs"); sbJwk.Append("D1W_YpRPEwOWvG6b32690r2jZ47soMZo9wGzjb_7OMg0LOL-bSf63kpaSH"); sbJwk.Append("SXndS5z5rexMdbBYUsLA9e-KXBdQOS-UTo7WTBEMa2R2CapHg665xsmtdV"); sbJwk.Append("MTBQY4uDZlxvb3qCo5ZwKh9kG4LT6_I5IhlJH7aGhyxXFvUK-DWNmoudF8"); sbJwk.Append("NAco9_h9iaGNj8q2ethFkMLs91kzk2PAcDTW9gb54h4FRWyuXpoQ\","); sbJwk.Append("\"e\":\"AQAB\","); sbJwk.Append("\"d\":\"Eq5xpGnNCivDflJsRQBXHx1hdR1k6Ulwe2JZD50LpXyWPEAeP88vLNO97I"); sbJwk.Append("jlA7_GQ5sLKMgvfTeXZx9SE-7YwVol2NXOoAJe46sui395IW_GO-pWJ1O0"); sbJwk.Append("BkTGoVEn2bKVRUCgu-GjBVaYLU6f3l9kJfFNS3E0QbVdxzubSu3Mkqzjkn"); sbJwk.Append("439X0M_V51gfpRLI9JYanrC4D4qAdGcopV_0ZHHzQlBjudU2QvXt4ehNYT"); sbJwk.Append("CBr6XCLQUShb1juUO1ZdiYoFaFQT5Tw8bGUl_x_jTj3ccPDVZFD9pIuhLh"); sbJwk.Append("BOneufuBiB4cS98l2SR_RQyGWSeWjnczT0QU91p1DhOVRuOopznQ\","); sbJwk.Append("\"p\":\"4BzEEOtIpmVdVEZNCqS7baC4crd0pqnRH_5IB3jw3bcxGn6QLvnEtfdUdi"); sbJwk.Append("YrqBdss1l58BQ3KhooKeQTa9AB0Hw_Py5PJdTJNPY8cQn7ouZ2KKDcmnPG"); sbJwk.Append("BY5t7yLc1QlQ5xHdwW1VhvKn-nXqhJTBgIPgtldC-KDV5z-y2XDwGUc\","); sbJwk.Append("\"q\":\"uQPEfgmVtjL0Uyyx88GZFF1fOunH3-7cepKmtH4pxhtCoHqpWmT8YAmZxa"); sbJwk.Append("ewHgHAjLYsp1ZSe7zFYHj7C6ul7TjeLQeZD_YwD66t62wDmpe_HlB-TnBA"); sbJwk.Append("-njbglfIsRLtXlnDzQkv5dTltRJ11BKBBypeeF6689rjcJIDEz9RWdc\","); sbJwk.Append("\"dp\":\"BwKfV3Akq5_MFZDFZCnW-wzl-CCo83WoZvnLQwCTeDv8uzluRSnm71I3Q"); sbJwk.Append("CLdhrqE2e9YkxvuxdBfpT_PI7Yz-FOKnu1R6HsJeDCjn12Sk3vmAktV2zb"); sbJwk.Append("34MCdy7cpdTh_YVr7tss2u6vneTwrA86rZtu5Mbr1C1XsmvkxHQAdYo0\","); sbJwk.Append("\"dq\":\"h_96-mK1R_7glhsum81dZxjTnYynPbZpHziZjeeHcXYsXaaMwkOlODsWa"); sbJwk.Append("7I9xXDoRwbKgB719rrmI2oKr6N3Do9U0ajaHF-NKJnwgjMd2w9cjz3_-ky"); sbJwk.Append("NlxAr2v4IKhGNpmM5iIgOS1VZnOZ68m6_pbLBSp3nssTdlqvd0tIiTHU\","); sbJwk.Append("\"qi\":\"IYd7DHOhrWvxkwPQsRM2tOgrjbcrfvtQJipd-DlcxyVuuM9sQLdgjVk2o"); sbJwk.Append("y26F0EmpScGLq2MowX7fhd_QJQ3ydy5cY7YIBi87w93IKLEdfnbJtoOPLU"); sbJwk.Append("W0ITrJReOgo1cq9SbsxYawBgfp_gh6A5603k2-ZQwVK0JKSHuLFkuQ3U\""); sbJwk.Append("}"); CkPrivateKey rsaKey; // Note: This example loads the RSA key from JWK format. Any format can be loaded // into the private key object. (See the online reference documentation..) bool success = rsaKey.LoadJwk(sbJwk.getAsString()); if (success != true) { strOut.append(rsaKey.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } // Create the JWS Protected Header CkJsonObject jwsProtHdr; jwsProtHdr.AppendString("alg","PS256"); CkJws jws; // Set the protected header: int signatureIndex = 0; jws.SetProtectedHeader(signatureIndex,jwsProtHdr); // Set the RSA key: jws.SetPrivateKey(signatureIndex,rsaKey); // Set the payload. bool bIncludeBom = false; const char *payloadStr = "In our village, folks say God crumbles up the old moon into stars."; jws.SetPayload(payloadStr,"utf-8",bIncludeBom); // Create the JWS // By default, the compact serialization is used. const char *jwsCompact = jws.createJws(); if (jws.get_LastMethodSuccess() != true) { strOut.append(jws.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } strOut.append("JWS: "); strOut.append(jwsCompact); strOut.append("\r\n"); // Note: RSA PSS padding uses random values, so the output will be different each time a signature is produced. // sample output: // JWS: eyJhbGciOiJQUzI1NiJ9.SW4gb3VyIHZpbGxhZ2UsIGZvbGtzIHNheSBHb2QgY3J1bWJsZXMgdXAgdGhlIG9sZCBtb29uIGludG8gc3RhcnMu.TRWhwRo5dMv9-8OzrInfJTwmUGYgjLfHk8lqF072ND-FmLWEBnUTOpY8oJXp8FdWw2SalbdOeNlrtlJjwk4XK8Ql2iJ_2qMCtxsvLPhKBOqFoAF4aBvTOEDVJDxf0DaBSiydEEtfTVV2iwBcjWabu5J2XieR5y7QZQtuHsn7T3qKBvCcCejN3Y2oqAT3qMHvu1fTms1r_91wBn_K7Wjd9UkZ1n02qQcUHJznR_OF2BgN7_KWIDAF9ZS9keoju2NPpPelO4yxa2XUPnehY3G7dHKoCxUEQR4d2Xc5voqDASTVCDqQS4PVOZdvT3Ein6-SanAlCwbWBbkvT8g6-5PImQ // Now load the JWS, validate, and recover the original text. CkJws jws2; // Load the JWS. success = jws2.LoadJws(jwsCompact); CkPublicKey *rsaPubKey = rsaKey.GetPublicKey(); // Set the RSA public key used for validation. signatureIndex = 0; jws2.SetPublicKey(signatureIndex,*rsaPubKey); delete rsaPubKey; // Validate the 1st (and only) signature at index 0.. int v = jws2.Validate(signatureIndex); if (v < 0) { // Perhaps Chilkat was not unlocked or the trial expired.. strOut.append("Method call failed for some other reason."); strOut.append("\r\n"); strOut.append(jws2.lastErrorText()); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } if (v == 0) { strOut.append("Invalid signature. The RSA key was incorrect, the JWS was invalid, or both."); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } // If we get here, the signature was validated.. strOut.append("Signature validated."); strOut.append("\r\n"); // Recover the original content: strOut.append(jws2.getPayload("utf-8")); strOut.append("\r\n"); // Examine the protected header: CkJsonObject *joseHeader = jws2.GetProtectedHeader(signatureIndex); if (jws2.get_LastMethodSuccess() != true) { strOut.append("No protected header found at the given index."); strOut.append("\r\n"); SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); return; } joseHeader->put_EmitCompact(false); strOut.append("Protected (JOSE) header:"); strOut.append("\r\n"); strOut.append(joseHeader->emit()); strOut.append("\r\n"); delete joseHeader; // Output: // Signature validated. // In our village, folks say God crumbles up the old moon into stars. // Protected (JOSE) header: // { // "alg": "PS256" // } SetDlgItemText(IDC_EDIT1,strOut.getUnicode()); } |
© 2000-2022 Chilkat Software, Inc. All Rights Reserved.