Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Node.js) Verify Opaque Signature and Retrieve Signing CertificatesDemonstrates how to verify a PCKS7 opaque digital signature (signed data), extract the original file/data, and then extract the certificate(s) that were used to sign.
var os = require('os'); if (os.platform() == 'win32') { if (os.arch() == 'ia32') { var chilkat = require('@chilkat/ck-node21-win-ia32'); } else { var chilkat = require('@chilkat/ck-node21-win64'); } } else if (os.platform() == 'linux') { if (os.arch() == 'arm') { var chilkat = require('@chilkat/ck-node21-arm'); } else if (os.arch() == 'x86') { var chilkat = require('@chilkat/ck-node21-linux32'); } else { var chilkat = require('@chilkat/ck-node21-linux64'); } } else if (os.platform() == 'darwin') { if (os.arch() == 'arm64') { var chilkat = require('@chilkat/ck-node21-mac-m1'); } else { var chilkat = require('@chilkat/ck-node21-macosx'); } } function chilkatExample() { // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. var crypt = new chilkat.Crypt2(); // Verify a PKCS7 signed-data (opaque signature) file and extract the original content to a file. var success = crypt.VerifyP7M("qa_data/p7m/opaqueSig.p7","qa_output/originalData.dat"); if (success !== true) { console.log(crypt.LastErrorText); return; } // Alternatively, we can do it in memory... var binData = new chilkat.BinData(); success = binData.LoadFile("qa_data/p7m/opaqueSig.p7"); // Your app should check for success, but we'll skip the check for brevity.. // If verified, the signature is unwrapped and binData is replaced with the original data that was signed. success = crypt.OpaqueVerifyBd(binData); if (success !== true) { console.log(crypt.LastErrorText); return; } // For our testing, we signed some text, so we can get it from the binData.. console.log("Original Data:"); console.log(binData.GetString("utf-8")); // After any method call that verifies a signature, the crypt object will contain the certificate(s) // that were used for signing (assuming the X.509 certs were available in the signature, which is typically the case). // Get the number of signing certificates, and get each.. var numCerts = crypt.NumSignerCerts; var i = 0; while (i < numCerts) { // cert: Cert var cert = crypt.GetSignerCert(i); console.log(cert.SubjectDN); i = i+1; } // We could also get the complete certificate chain of each signer cert, // assuming the certs in the chain of authentication to the trusted root // are available on the system, or provided to Chilkat by some other means // (such as via the XmlCertVault class, the TrustedRoots class, etc.) i = 0; while (i < numCerts) { // certChain: CertChain var certChain = crypt.GetSignerCertChain(i); // You can examine the various properties and methods for certChain in the online // reference documentation... i = i+1; } } chilkatExample(); |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.