Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Visual FoxPro) Compute JWK Thumbprint for RSA and EC Private KeysDemonstrates how to compute a JSON Web Key thumbprint for a private key (RSA or ECC). Note: This example requires Chilkat v9.5.0.66 or greater.
LOCAL loPrivKey LOCAL loSbPem LOCAL lnBCrlf LOCAL lnSuccess * For versions of Chilkat < 10.0.0, use CreateObject('Chilkat_9_5_0.PrivateKey') loPrivKey = CreateObject('Chilkat.PrivateKey') * A private key can be loaded from any format (binary DER, PEM, etc.) * This example will load the private keys from PEM format, * and will then compute the JWK thumbprint. * First do it for this RSA private key... * For versions of Chilkat < 10.0.0, use CreateObject('Chilkat_9_5_0.StringBuilder') loSbPem = CreateObject('Chilkat.StringBuilder') lnBCrlf = 1 loSbPem.AppendLine("-----BEGIN RSA PRIVATE KEY-----",lnBCrlf) loSbPem.AppendLine("Proc-Type: 4,ENCRYPTED",lnBCrlf) loSbPem.AppendLine("DEK-Info: DES-EDE3-CBC,2E65118E6C7B5207",lnBCrlf) loSbPem.AppendLine("",lnBCrlf) loSbPem.AppendLine("7cYUTW4ZBdmVZ4ILB08hcTdm5ib0E0zcy+I7pHpNQfJHtI7BJ4omys5S19ufJPBJ",lnBCrlf) loSbPem.AppendLine("IzYjeO7oTVqI37F6EUmjZqG4WVE2UQbQDkosZbZN82O4Ipu1lFAPEbwjqePMKufz",lnBCrlf) loSbPem.AppendLine("snSQHKfnbyyDPEVNlJbs19NXC8v6g+pQay5rH/I6N2iBxgsTmuemZ54EhNQMZyEN",lnBCrlf) loSbPem.AppendLine("R/CiheArWEH9H8/4hd2gc9Tb2s0MwGHILL4kbbNm5tp3xw4ik7OYWNrj3m+nG6Xb",lnBCrlf) loSbPem.AppendLine("vKXh2xEanAZAyMXTqDJTHdn7/CEqusQPJjZGV+Mf1kjKu7p4qcXFnIXP5ILnTW7b",lnBCrlf) loSbPem.AppendLine("lHoWC4eweDzKOMRzXmbABEVSUvx2SmPl4TcoC5L1SCAHEmZaKbaY7S5l53u6gl0f",lnBCrlf) loSbPem.AppendLine("ULuQbt7Hr3THznlNFKkGT1/yVNt2QOm1emZd55LaNe8E7XsNSlhl0grYQ+Ue8Jba",lnBCrlf) loSbPem.AppendLine("x85OapltVjxM9wVCwbgFyi04ihdKHo9e+uYKeTGKv0hU5O7HEH1ev6t/s2u/UG6h",lnBCrlf) loSbPem.AppendLine("TqEsYrVp0CMHpt5uAF6nZyK6GZ/CHTxh/rz1hADMofem59+e6tVtjnPGA3EjnJT8",lnBCrlf) loSbPem.AppendLine("BMOw/D2QIDxjxj2GUzz+YJp50ENhWrL9oSDkG2nzv4NVL77QIy+T/2/f4PgokUDO",lnBCrlf) loSbPem.AppendLine("QJjIfxPWE40cHGHpnQtZvEPoxP0H3T0YhmEVwuJxX3uaWOY/8Fa1c7Ln0SwWdfV5",lnBCrlf) loSbPem.AppendLine("gYvJV8o6c3sumcq1O3agPDlHC5O4IxG7AZQ8CHRDyASogzfkY6P579ZOGYaO4al7",lnBCrlf) loSbPem.AppendLine("WA1YIpsHs3/1f4SByMuWe0NVkFfvXckjpqGrBQpTmqQzk6baa0VQ0cwU3XlkwHac",lnBCrlf) loSbPem.AppendLine("WB/fQ4jylwFzZDcp5JAo53n6aU72zgNvDlGTNKwdXXZI5U3JPocH0AiZgFFWYJLd",lnBCrlf) loSbPem.AppendLine("63PJLDnjyE3i6XMVlxifXKkXVv0RYSz+ByS7Oz9aCgnQhNU8ycv+UxtfkPQih5zE",lnBCrlf) loSbPem.AppendLine("/0Y2EEFknajmFJpNXczzF8OEzaswmR0AOjcCiklZKRf61rf5faJxJhhqKEEBJuL6",lnBCrlf) loSbPem.AppendLine("oodDVRk3OGU1yQSBazT8nK3V+e6FMo3tWkra2BXFCD+pKxTy014Cp59S1w6F1Fjt",lnBCrlf) loSbPem.AppendLine("WX7eMWSLWfQ56j2kLMBHq5gb2arqlqH3fsYOTD3TNjCYF3Sgx309kVPuOK5vw61P",lnBCrlf) loSbPem.AppendLine("pnL/LN3iGY42WR+9lfAyNN2qj9zvwKwscyYs5+DPQoPmcPcVGc3v/u66bLcOGbEU",lnBCrlf) loSbPem.AppendLine("OlGa/6gdD4GCp5E4fP/7GbnEY/PW2abquFhGB+pVdl3/4+1U/8kItlfWNZoG4FhE",lnBCrlf) loSbPem.AppendLine("gjMd7glmrdFiNJFFpf5ks1lVXGqJ4mZxqtEZrxUEwciZjm4V27a+E2KyV9NnksZ6",lnBCrlf) loSbPem.AppendLine("xF4tGPKIPsvNTV5o8ZqjiacxgbYmr2ywqDXKCgpU/RWSh1sLapqSQqbH/w0MquUj",lnBCrlf) loSbPem.AppendLine("VhVX0RMYH/foKtjagZf/KO1/mnCITl86treIdachGgR4wr/qqMjrpPUaPLCRY3JQ",lnBCrlf) loSbPem.AppendLine("00XUP1Mu6YPE0SnMYAVxZheqKHly3a1pg4Xp7YWlM671oUORs3+VENfnbIxgr+2D",lnBCrlf) loSbPem.AppendLine("TiJT9PxwpfK53Oh7RBSWHJZRuAdLUXE8DG+bl0N/QkJM6pFUxTI1AQ==",lnBCrlf) loSbPem.AppendLine("-----END RSA PRIVATE KEY-----",lnBCrlf) * The actual password for the above PEM is "passwd". lnSuccess = loPrivKey.LoadEncryptedPem(loSbPem.GetAsString(),"passwd") IF (lnSuccess <> 1) THEN ? loPrivKey.LastErrorText RELEASE loPrivKey RELEASE loSbPem CANCEL ENDIF * Generate the JWK thumbprint: ? "JWK thumbprint: " + loPrivKey.GetJwkThumbprint("SHA256") * Output: * JWK thumbprint: QzUpUAW1Y5iksGxq3r1o3JMROR6D7FLwvRlHmDQVg0I * -------------------------------------------------------------- * Now let's do an EC private key. The following is an unencrypted PEM containing a 384-bit EC key.. loSbPem.Clear() loSbPem.AppendLine("-----BEGIN PRIVATE KEY-----",lnBCrlf) loSbPem.AppendLine("MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDAamStb0Xep3y3sWw2u",lnBCrlf) loSbPem.AppendLine("SSAdUPkgQ9Rvhlnx8XEVOYy2teh69T0on77ja02m03n8t8WhZANiAARUNSar38Rz",lnBCrlf) loSbPem.AppendLine("lKPyZFsNSGUanzpNRth0C+MikVEH8FAlDHMMpAs34dyF4IK0uxgbiEe9bQ+ieLrl",lnBCrlf) loSbPem.AppendLine("6xwFR0yaTivuwoyXC+ScGUnwnpaXmid6UUgw4ypbneHsaKuZ9JLdMAo=",lnBCrlf) loSbPem.AppendLine("-----END PRIVATE KEY-----",lnBCrlf) lnSuccess = loPrivKey.LoadPem(loSbPem.GetAsString()) IF (lnSuccess <> 1) THEN ? loPrivKey.LastErrorText RELEASE loPrivKey RELEASE loSbPem CANCEL ENDIF * Generate the JWK thumbprint: ? "JWK thumbprint: " + loPrivKey.GetJwkThumbprint("SHA256") * Output: * JWK thumbprint: ABAUUfNSONFsZYvZ_o_0bsPT3qeG3jttXB09VC_ETWQ RELEASE loPrivKey RELEASE loSbPem |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.