Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(AutoIt) Validate JWS with Multiple Signatures using the General JSON Serialization FormatValidates and recovers data and headers from a JSON Web Signature (JWS) containing 3 signatures. Note: Chilkat supports all of the following JWS algorithms: +--------------+-------------------------------+--------------------+ | "alg" Param | Digital Signature or MAC | Implementation | | Value | Algorithm | Requirements | +--------------+-------------------------------+--------------------+ | HS256 | HMAC using SHA-256 | Required | | HS384 | HMAC using SHA-384 | Optional | | HS512 | HMAC using SHA-512 | Optional | | RS256 | RSASSA-PKCS1-v1_5 using | Recommended | | | SHA-256 | | | RS384 | RSASSA-PKCS1-v1_5 using | Optional | | | SHA-384 | | | RS512 | RSASSA-PKCS1-v1_5 using | Optional | | | SHA-512 | | | ES256 | ECDSA using P-256 and SHA-256 | Recommended+ | | ES384 | ECDSA using P-384 and SHA-384 | Optional | | ES512 | ECDSA using P-521 and SHA-512 | Optional | | PS256 | RSASSA-PSS using SHA-256 and | Optional | | | MGF1 with SHA-256 | | | PS384 | RSASSA-PSS using SHA-384 and | Optional | | | MGF1 with SHA-384 | | | PS512 | RSASSA-PSS using SHA-512 and | Optional | | | MGF1 with SHA-512 | | +--------------+-------------------------------+--------------------+ Note: This example requires Chilkat v9.5.0.66 or greater.
; This requires the Chilkat API to have been previously unlocked. ; See Global Unlock Sample for sample code. ; Note: This example requires Chilkat v9.5.0.66 or greater. ; First, prepare the public keys that will be needed for each signature. ; --------------------------------------------------- ; Use the following RSA key loaded from JWK format. $oSbRsaJwk = ObjCreate("Chilkat.StringBuilder") $oSbRsaJwk.Append("{""kty"":""RSA"",") $oSbRsaJwk.Append("""n"":""ofgWCuLjybRlzo0tZWJjNiuSfb4p4fAkd_wWJcyQoTbji9k0l8W26mPddx") $oSbRsaJwk.Append("HmfHQp-Vaw-4qPCJrcS2mJPMEzP1Pt0Bm4d4QlL-yRT-SFd2lZS-pCgNMs") $oSbRsaJwk.Append("D1W_YpRPEwOWvG6b32690r2jZ47soMZo9wGzjb_7OMg0LOL-bSf63kpaSH") $oSbRsaJwk.Append("SXndS5z5rexMdbBYUsLA9e-KXBdQOS-UTo7WTBEMa2R2CapHg665xsmtdV") $oSbRsaJwk.Append("MTBQY4uDZlxvb3qCo5ZwKh9kG4LT6_I5IhlJH7aGhyxXFvUK-DWNmoudF8") $oSbRsaJwk.Append("NAco9_h9iaGNj8q2ethFkMLs91kzk2PAcDTW9gb54h4FRWyuXpoQ"",") $oSbRsaJwk.Append("""e"":""AQAB""") $oSbRsaJwk.Append("}") $oRsaKey = ObjCreate("Chilkat.PublicKey") Local $bSuccess = $oRsaKey.LoadFromString($oSbRsaJwk.GetAsString()) If ($bSuccess <> True) Then ConsoleWrite($oRsaKey.LastErrorText & @CRLF) Exit EndIf ; --------------------------------------------------- ; Use the following ECC public key loaded from JWK format. $oSbEccJwk = ObjCreate("Chilkat.StringBuilder") $oSbEccJwk.Append("{""kty"":""EC"",") $oSbEccJwk.Append("""crv"":""P-256"",") $oSbEccJwk.Append("""x"":""f83OJ3D2xF1Bg8vub9tLe1gHMzV76e8Tus9uPHvRVEU"",") $oSbEccJwk.Append("""y"":""x_FEzRu9m36HLN_tue659LNpXW6pCyStikYjKIWI5a0""") $oSbEccJwk.Append("}") $oEccKey = ObjCreate("Chilkat.PublicKey") $bSuccess = $oEccKey.LoadFromString($oSbEccJwk.GetAsString()) If ($bSuccess <> True) Then ConsoleWrite($oEccKey.LastErrorText & @CRLF) Exit EndIf ; --------------------------------------------------- ; The HMAC key (in base64url format) Local $sHmacKey = "AyM1SysPpbyDfgZld3umj1qzKObwVMkoqQ-EstJQLr_T-1qS0gZH75aKtMN3Yj0iPS4hcgUuTwjAzZr1Z9CAow" ; The code below will verify each of the signatures in this JWS: ; { ; "payload": "SW4gb3VyIHZpbGxhZ2UsIGZvbGtzIHNheSBHb2QgY3J1bWJsZXMgdXAgdGhlIG9sZCBtb29uIGludG8gc3RhcnMu", ; "signatures": [ ; { ; "protected": "eyJhbGciOiJSUzI1NiIsImtpZCI6Im15UnNhS2V5In0", ; "signature": "IPMQ02niTQDwLzsRZSCaEm9VEyAX_AVe3HWjniNt9kW-a8d6ZVbd2k6jGae8s1yIh0cgxDnXQ6-p6_sBI0cnMO0xpuJANhh2vFtNJl5lisad94-H3mB3lSfafRqxeYp5D8bh39BPv7y3PrUNVMQdKEJp_D5oJ0ROPTIYx3EG8eJQOx1HO0KqhcUo401XR6KSsIyFm5joBLNKTVzxZUTT1RRZZtwTdeZkbGevugIOX_9gHAtARpV6WaFA4Vvjnq8X9wPgqjWNCQRupadhTPz0JAsa-wy5vXQjsFlXAn43mDPpMfna5Ab3F5pS4yDwkbX6nRn7XBxH1SnnNJRFholQZw" ; }, ; { ; "protected": "eyJhbGciOiJFUzI1NiIsImtpZCI6Im15RWNLZXkifQ", ; "signature": "1OQtaT3pgZmkDxvlfghvxL_8kX16WIen6u1MadEq1pA4qytA0--_EwZDNk00GDPWFpoJtKznibMZzLOg_UhHIw" ; }, ; { ; "protected": "eyJhbGciOiJIUzI1NiIsImtpZCI6Im15TWFjS2V5In0", ; "signature": "YY8yVjmJJfy7YJOn3uUydG8WCY2PEuCvOLil5Ks5lnw" ; } ; ] ; } $oSbJws = ObjCreate("Chilkat.StringBuilder") $oSbJws.Append("{ ") $oSbJws.Append(" ""payload"": ""SW4gb3VyIHZpbGxhZ2UsIGZvbGtzIHNheSBHb2QgY3J1bWJsZXMgdXAgdGhlIG9sZCBtb29uIGludG8gc3RhcnMu"",") $oSbJws.Append(" ""signatures"": [") $oSbJws.Append(" { ") $oSbJws.Append(" ""protected"": ""eyJhbGciOiJSUzI1NiIsImtpZCI6Im15UnNhS2V5In0"",") $oSbJws.Append(" ""signature"": ""IPMQ02niTQDwLzsRZSCaEm9VEyAX_AVe3HWjniNt9kW-a8d6ZVbd2k6jGae8s1yIh0cgxDnXQ6-p6_sBI0cnMO0xpuJANhh2vFtNJl5lisad94-H3mB3lSfafRqxeYp5D8bh39BPv7y3PrUNVMQdKEJp_D5oJ0ROPTIYx3EG8eJQOx1HO0KqhcUo401XR6KSsIyFm5joBLNKTVzxZUTT1RRZZtwTdeZkbGevugIOX_9gHAtARpV6WaFA4Vvjnq8X9wPgqjWNCQRupadhTPz0JAsa-wy5vXQjsFlXAn43mDPpMfna5Ab3F5pS4yDwkbX6nRn7XBxH1SnnNJRFholQZw""") $oSbJws.Append(" },") $oSbJws.Append(" { ") $oSbJws.Append(" ""protected"": ""eyJhbGciOiJFUzI1NiIsImtpZCI6Im15RWNLZXkifQ"",") $oSbJws.Append(" ""signature"": ""1OQtaT3pgZmkDxvlfghvxL_8kX16WIen6u1MadEq1pA4qytA0--_EwZDNk00GDPWFpoJtKznibMZzLOg_UhHIw""") $oSbJws.Append(" },") $oSbJws.Append(" { ") $oSbJws.Append(" ""protected"": ""eyJhbGciOiJIUzI1NiIsImtpZCI6Im15TWFjS2V5In0"",") $oSbJws.Append(" ""signature"": ""YY8yVjmJJfy7YJOn3uUydG8WCY2PEuCvOLil5Ks5lnw""") $oSbJws.Append(" }") $oSbJws.Append(" ]") $oSbJws.Append("}") $oJws = ObjCreate("Chilkat.Jws") $bSuccess = $oJws.LoadJwsSb($oSbJws) If ($bSuccess <> True) Then ConsoleWrite($oJws.LastErrorText & @CRLF) Exit EndIf ; The payload is easily accessible: ConsoleWrite("Payload: " & $oJws.GetPayload("utf-8") & @CRLF) Local $oProtHeader $oSbKeyId = ObjCreate("Chilkat.StringBuilder") Local $bCaseSensitive = False Local $iNumSignatures = $oJws.NumSignatures Local $i = 0 While $i < $iNumSignatures $oProtHeader = $oJws.GetProtectedHeader($i) ConsoleWrite("--------------------------" & @CRLF) ConsoleWrite($i & ": " & @CRLF) ; Get the protected header. $oProtHeader.EmitCompact = False ConsoleWrite($oProtHeader.Emit() & @CRLF) ; Get the key ID ("kid") member. ; Note: In this example, the "kid" values are contained in the protected headers. ; They could've just as easily been located in unprotected headers. In that case, ; we would've called GetUnprotectedHeader(i) instead of GetProtectedHeader(i). $oSbKeyId.Clear $oSbKeyId.Append($oProtHeader.StringOf("kid")) ; Set the key based on key ID. If ($oSbKeyId.ContentsEqual("myRsaKey",$bCaseSensitive) = True) Then $oJws.SetPublicKey($i,$oRsaKey) EndIf If ($oSbKeyId.ContentsEqual("myEcKey",$bCaseSensitive) = True) Then $oJws.SetPublicKey($i,$oEccKey) EndIf If ($oSbKeyId.ContentsEqual("myMacKey",$bCaseSensitive) = True) Then $oJws.SetMacKey($i,$sHmacKey,"base64url") EndIf ; Validate this signature. Local $iV = $oJws.Validate($i) If ($iV < 0) Then ; Perhaps Chilkat was not unlocked or the trial expired.. ConsoleWrite("Validate failed for some other reason." & @CRLF) ConsoleWrite($oJws.LastErrorText & @CRLF) Else If ($iV = 0) Then ConsoleWrite("Invalid signature. The key was incorrect, the JWS was invalid, or both." & @CRLF) Else ConsoleWrite("Signature validated." & @CRLF) EndIf EndIf $i = $i + 1 Wend ; The output of this program is: ; Payload: In our village, folks say God crumbles up the old moon into stars. ; -------------------------- ; 0: ; { ; "alg": "RS256", ; "kid": "myRsaKey" ; } ; ; Signature validated. ; -------------------------- ; 1: ; { ; "alg": "ES256", ; "kid": "myEcKey" ; } ; ; Signature validated. ; -------------------------- ; 2: ; { ; "alg": "HS256", ; "kid": "myMacKey" ; } ; ; Signature validated. |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.