Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(PowerBuilder) Read JCEKS Containing Secret KeysDemonstrates how to read a JCEKS keystore file containing symmetric secret keys (for AES, Blowfish, HMAC SHA25, ChaCha, etc.) This example uses the jceks sample file that you may download from Sample JCEKS with Secret Keys The file password is "filePassword". The password for each secret key contained in the JCEKS is "secret". This example requires Chilkat v9.5.0.66 or greater.
integer li_rc oleobject loo_Jceks integer li_Success string ls_KeyPassword integer i integer li_NumSecretKeys // IMPORTANT: This example requires Chilkat v9.5.0.66 or greater. // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. loo_Jceks = create oleobject // Use "Chilkat_9_5_0.JavaKeyStore" for versions of Chilkat < 10.0.0 li_rc = loo_Jceks.ConnectToNewObject("Chilkat.JavaKeyStore") if li_rc < 0 then destroy loo_Jceks MessageBox("Error","Connecting to COM object failed") return end if li_Success = loo_Jceks.LoadFile("filePassword","qa_data/jks/secretKeys_filePassword.jceks") if li_Success <> 1 then Write-Debug loo_Jceks.LastErrorText destroy loo_Jceks return end if ls_KeyPassword = "secret" // Iterate over each secret key and get the key bytes and aliases.. i = 0 li_NumSecretKeys = loo_Jceks.NumSecretKeys do while i < li_NumSecretKeys Write-Debug "---- Secret Key " + string(i) Write-Debug "Alias: " + loo_Jceks.GetSecretKeyAlias(i) // Get the secret key bytes in a desired encoding (base64, hex, base64url, etc.) Write-Debug "Key Bytes (hex): " + loo_Jceks.GetSecretKey(ls_KeyPassword,i,"hex") Write-Debug "Key Bytes (base64): " + loo_Jceks.GetSecretKey(ls_KeyPassword,i,"base64") i = i + 1 loop // The output: // ---- Secret Key 0 // Alias: aes_key // Key Bytes (hex): CB3632FD12FF3256E0048C100DDE8DEF // Key Bytes (base64): yzYy/RL/MlbgBIwQDd6N7w== // ---- Secret Key 1 // Alias: chacha_key // Key Bytes (hex): B37C73871C7B8F8D488DDE2F1A78CF51B6D74FFAF0E9B338B9609510A4688136 // Key Bytes (base64): s3xzhxx7j41Ijd4vGnjPUbbXT/rw6bM4uWCVEKRogTY= // ---- Secret Key 2 // Alias: hmac_sha256_key // Key Bytes (hex): 3C644B53F904A3BF161D3EAD1364E52EAE6C6EC8C61133B974A2484B894539C0 // Key Bytes (base64): PGRLU/kEo78WHT6tE2TlLq5sbsjGETO5dKJIS4lFOcA= // ---- Secret Key 3 // Alias: blowfish_key // Key Bytes (hex): FFE0574DE04B50F1E2FE79B4160B3B2183ACFF41721C46BFF9764CF24CA40E3C // Key Bytes (base64): /+BXTeBLUPHi/nm0Fgs7IYOs/0FyHEa/+XZM8kykDjw= destroy loo_Jceks |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.