Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Classic ASP) A3/A4 Certificate to Create and Verify an Opaque PKCS7/CMS SignatureDemonstrates how to use an A3 or A4 certificate w/ private key on a smartcard or token to create a PKCS7 opaque signature, and also how to verify an opaque signature. An opaque signature is different than a detached PKCS7 signature in that it contains the original data. Verifying an opaque signature retrieves the original content.
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> </head> <body> <% ' This example assumes the Chilkat API to have been previously unlocked. ' See Global Unlock Sample for sample code. ' For versions of Chilkat < 10.0.0, use CreateObject("Chilkat_9_5_0.Crypt2") set crypt = Server.CreateObject("Chilkat.Crypt2") ' A certificate and private key is needed to create a signature. ' Chilkat provides many different ways to load a certificate and private key, such ' as from a smartcards and hardware tokens, PFX/.p12, Java keystore, JWK, Windows registry-based certificate stores, and other sources. ' This example will load the default certificate from the smartcard that is currently in ' the smartcard reader. ' For versions of Chilkat < 10.0.0, use CreateObject("Chilkat_9_5_0.Cert") set cert = Server.CreateObject("Chilkat.Cert") ' If the smartcard or token requires a PIN, we can set it here to avoid the dialog... cert.SmartCardPin = "000000" success = cert.LoadFromSmartcard("") If (success <> 1) Then Response.Write "<pre>" & Server.HTMLEncode( cert.LastErrorText) & "</pre>" Response.End End If ' Tell it to use the cert and private key we've loaded. success = crypt.SetSigningCert(cert) If (success <> 1) Then Response.Write "<pre>" & Server.HTMLEncode( crypt.LastErrorText) & "</pre>" Response.End End If ' Indicate we want the opaque signature in base64 format: crypt.EncodingMode = "base64" ' Sign the string using the "utf-8" byte representation: crypt.Charset = "utf-8" ' Create the opaque signature: originalData = "This is the string to be signed." opaqueSig = crypt.OpaqueSignStringENC(originalData) If (crypt.LastMethodSuccess <> 1) Then Response.Write "<pre>" & Server.HTMLEncode( crypt.LastErrorText) & "</pre>" Response.End End If Response.Write "<pre>" & Server.HTMLEncode( opaqueSig) & "</pre>" ' The output looks like this: ' MIIPgQYJKoZIhvcNAQcCoIIPcjCCD24CAQExCzAJBgUrDgMCGgUAMC8GCSqGSIb3DQEHAaAiBCBUaGlzIGlzIHRoZSBzdHJpbmcgdG8gYmUgc... ' ---------------------------------------------------------------------------------------------- ' Now let's verify the signature and retrieve the original data. ' We'll use a new Crypt2 object to keep things completely separate... ' For versions of Chilkat < 10.0.0, use CreateObject("Chilkat_9_5_0.Crypt2") set vCrypt = Server.CreateObject("Chilkat.Crypt2") ' We only need the certificate to verify a signature (and extract the data from ' an opaque signature). The public key is always embedded within a certificate. success = vCrypt.SetVerifyCert(cert) If (success <> 1) Then Response.Write "<pre>" & Server.HTMLEncode( vCrypt.LastErrorText) & "</pre>" Response.End End If vCrypt.EncodingMode = "base64" vCrypt.Charset = "utf-8" extractedData = vCrypt.OpaqueVerifyStringENC(opaqueSig) If (vCrypt.LastMethodSuccess <> 1) Then Response.Write "<pre>" & Server.HTMLEncode( vCrypt.LastErrorText) & "</pre>" Response.End End If Response.Write "<pre>" & Server.HTMLEncode( "The extracted data: " & extractedData) & "</pre>" ' The output is: ' The extracted data: This is the string to be signed. %> </body> </html> |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.