Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Classic ASP) Read JCEKS Containing Secret KeysDemonstrates how to read a JCEKS keystore file containing symmetric secret keys (for AES, Blowfish, HMAC SHA25, ChaCha, etc.) This example uses the jceks sample file that you may download from Sample JCEKS with Secret Keys The file password is "filePassword". The password for each secret key contained in the JCEKS is "secret". This example requires Chilkat v9.5.0.66 or greater.
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> </head> <body> <% ' IMPORTANT: This example requires Chilkat v9.5.0.66 or greater. ' This example requires the Chilkat API to have been previously unlocked. ' See Global Unlock Sample for sample code. ' For versions of Chilkat < 10.0.0, use CreateObject("Chilkat_9_5_0.JavaKeyStore") set jceks = Server.CreateObject("Chilkat.JavaKeyStore") success = jceks.LoadFile("filePassword","qa_data/jks/secretKeys_filePassword.jceks") If (success <> 1) Then Response.Write "<pre>" & Server.HTMLEncode( jceks.LastErrorText) & "</pre>" Response.End End If keyPassword = "secret" ' Iterate over each secret key and get the key bytes and aliases.. i = 0 numSecretKeys = jceks.NumSecretKeys Do While i < numSecretKeys Response.Write "<pre>" & Server.HTMLEncode( "---- Secret Key " & i) & "</pre>" Response.Write "<pre>" & Server.HTMLEncode( "Alias: " & jceks.GetSecretKeyAlias(i)) & "</pre>" ' Get the secret key bytes in a desired encoding (base64, hex, base64url, etc.) Response.Write "<pre>" & Server.HTMLEncode( "Key Bytes (hex): " & jceks.GetSecretKey(keyPassword,i,"hex")) & "</pre>" Response.Write "<pre>" & Server.HTMLEncode( "Key Bytes (base64): " & jceks.GetSecretKey(keyPassword,i,"base64")) & "</pre>" i = i + 1 Loop ' The output: ' ---- Secret Key 0 ' Alias: aes_key ' Key Bytes (hex): CB3632FD12FF3256E0048C100DDE8DEF ' Key Bytes (base64): yzYy/RL/MlbgBIwQDd6N7w== ' ---- Secret Key 1 ' Alias: chacha_key ' Key Bytes (hex): B37C73871C7B8F8D488DDE2F1A78CF51B6D74FFAF0E9B338B9609510A4688136 ' Key Bytes (base64): s3xzhxx7j41Ijd4vGnjPUbbXT/rw6bM4uWCVEKRogTY= ' ---- Secret Key 2 ' Alias: hmac_sha256_key ' Key Bytes (hex): 3C644B53F904A3BF161D3EAD1364E52EAE6C6EC8C61133B974A2484B894539C0 ' Key Bytes (base64): PGRLU/kEo78WHT6tE2TlLq5sbsjGETO5dKJIS4lFOcA= ' ---- Secret Key 3 ' Alias: blowfish_key ' Key Bytes (hex): FFE0574DE04B50F1E2FE79B4160B3B2183ACFF41721C46BFF9764CF24CA40E3C ' Key Bytes (base64): /+BXTeBLUPHi/nm0Fgs7IYOs/0FyHEa/+XZM8kykDjw= %> </body> </html> |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.