Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(PowerBuilder) Compute JWK Thumbprint for RSA and EC Private KeysDemonstrates how to compute a JSON Web Key thumbprint for a private key (RSA or ECC). Note: This example requires Chilkat v9.5.0.66 or greater.
integer li_rc oleobject loo_PrivKey oleobject loo_SbPem integer li_BCrlf integer li_Success loo_PrivKey = create oleobject // Use "Chilkat_9_5_0.PrivateKey" for versions of Chilkat < 10.0.0 li_rc = loo_PrivKey.ConnectToNewObject("Chilkat.PrivateKey") if li_rc < 0 then destroy loo_PrivKey MessageBox("Error","Connecting to COM object failed") return end if // A private key can be loaded from any format (binary DER, PEM, etc.) // This example will load the private keys from PEM format, // and will then compute the JWK thumbprint. // First do it for this RSA private key... loo_SbPem = create oleobject // Use "Chilkat_9_5_0.StringBuilder" for versions of Chilkat < 10.0.0 li_rc = loo_SbPem.ConnectToNewObject("Chilkat.StringBuilder") li_BCrlf = 1 loo_SbPem.AppendLine("-----BEGIN RSA PRIVATE KEY-----",li_BCrlf) loo_SbPem.AppendLine("Proc-Type: 4,ENCRYPTED",li_BCrlf) loo_SbPem.AppendLine("DEK-Info: DES-EDE3-CBC,2E65118E6C7B5207",li_BCrlf) loo_SbPem.AppendLine("",li_BCrlf) loo_SbPem.AppendLine("7cYUTW4ZBdmVZ4ILB08hcTdm5ib0E0zcy+I7pHpNQfJHtI7BJ4omys5S19ufJPBJ",li_BCrlf) loo_SbPem.AppendLine("IzYjeO7oTVqI37F6EUmjZqG4WVE2UQbQDkosZbZN82O4Ipu1lFAPEbwjqePMKufz",li_BCrlf) loo_SbPem.AppendLine("snSQHKfnbyyDPEVNlJbs19NXC8v6g+pQay5rH/I6N2iBxgsTmuemZ54EhNQMZyEN",li_BCrlf) loo_SbPem.AppendLine("R/CiheArWEH9H8/4hd2gc9Tb2s0MwGHILL4kbbNm5tp3xw4ik7OYWNrj3m+nG6Xb",li_BCrlf) loo_SbPem.AppendLine("vKXh2xEanAZAyMXTqDJTHdn7/CEqusQPJjZGV+Mf1kjKu7p4qcXFnIXP5ILnTW7b",li_BCrlf) loo_SbPem.AppendLine("lHoWC4eweDzKOMRzXmbABEVSUvx2SmPl4TcoC5L1SCAHEmZaKbaY7S5l53u6gl0f",li_BCrlf) loo_SbPem.AppendLine("ULuQbt7Hr3THznlNFKkGT1/yVNt2QOm1emZd55LaNe8E7XsNSlhl0grYQ+Ue8Jba",li_BCrlf) loo_SbPem.AppendLine("x85OapltVjxM9wVCwbgFyi04ihdKHo9e+uYKeTGKv0hU5O7HEH1ev6t/s2u/UG6h",li_BCrlf) loo_SbPem.AppendLine("TqEsYrVp0CMHpt5uAF6nZyK6GZ/CHTxh/rz1hADMofem59+e6tVtjnPGA3EjnJT8",li_BCrlf) loo_SbPem.AppendLine("BMOw/D2QIDxjxj2GUzz+YJp50ENhWrL9oSDkG2nzv4NVL77QIy+T/2/f4PgokUDO",li_BCrlf) loo_SbPem.AppendLine("QJjIfxPWE40cHGHpnQtZvEPoxP0H3T0YhmEVwuJxX3uaWOY/8Fa1c7Ln0SwWdfV5",li_BCrlf) loo_SbPem.AppendLine("gYvJV8o6c3sumcq1O3agPDlHC5O4IxG7AZQ8CHRDyASogzfkY6P579ZOGYaO4al7",li_BCrlf) loo_SbPem.AppendLine("WA1YIpsHs3/1f4SByMuWe0NVkFfvXckjpqGrBQpTmqQzk6baa0VQ0cwU3XlkwHac",li_BCrlf) loo_SbPem.AppendLine("WB/fQ4jylwFzZDcp5JAo53n6aU72zgNvDlGTNKwdXXZI5U3JPocH0AiZgFFWYJLd",li_BCrlf) loo_SbPem.AppendLine("63PJLDnjyE3i6XMVlxifXKkXVv0RYSz+ByS7Oz9aCgnQhNU8ycv+UxtfkPQih5zE",li_BCrlf) loo_SbPem.AppendLine("/0Y2EEFknajmFJpNXczzF8OEzaswmR0AOjcCiklZKRf61rf5faJxJhhqKEEBJuL6",li_BCrlf) loo_SbPem.AppendLine("oodDVRk3OGU1yQSBazT8nK3V+e6FMo3tWkra2BXFCD+pKxTy014Cp59S1w6F1Fjt",li_BCrlf) loo_SbPem.AppendLine("WX7eMWSLWfQ56j2kLMBHq5gb2arqlqH3fsYOTD3TNjCYF3Sgx309kVPuOK5vw61P",li_BCrlf) loo_SbPem.AppendLine("pnL/LN3iGY42WR+9lfAyNN2qj9zvwKwscyYs5+DPQoPmcPcVGc3v/u66bLcOGbEU",li_BCrlf) loo_SbPem.AppendLine("OlGa/6gdD4GCp5E4fP/7GbnEY/PW2abquFhGB+pVdl3/4+1U/8kItlfWNZoG4FhE",li_BCrlf) loo_SbPem.AppendLine("gjMd7glmrdFiNJFFpf5ks1lVXGqJ4mZxqtEZrxUEwciZjm4V27a+E2KyV9NnksZ6",li_BCrlf) loo_SbPem.AppendLine("xF4tGPKIPsvNTV5o8ZqjiacxgbYmr2ywqDXKCgpU/RWSh1sLapqSQqbH/w0MquUj",li_BCrlf) loo_SbPem.AppendLine("VhVX0RMYH/foKtjagZf/KO1/mnCITl86treIdachGgR4wr/qqMjrpPUaPLCRY3JQ",li_BCrlf) loo_SbPem.AppendLine("00XUP1Mu6YPE0SnMYAVxZheqKHly3a1pg4Xp7YWlM671oUORs3+VENfnbIxgr+2D",li_BCrlf) loo_SbPem.AppendLine("TiJT9PxwpfK53Oh7RBSWHJZRuAdLUXE8DG+bl0N/QkJM6pFUxTI1AQ==",li_BCrlf) loo_SbPem.AppendLine("-----END RSA PRIVATE KEY-----",li_BCrlf) // The actual password for the above PEM is "passwd". li_Success = loo_PrivKey.LoadEncryptedPem(loo_SbPem.GetAsString(),"passwd") if li_Success <> 1 then Write-Debug loo_PrivKey.LastErrorText destroy loo_PrivKey destroy loo_SbPem return end if // Generate the JWK thumbprint: Write-Debug "JWK thumbprint: " + loo_PrivKey.GetJwkThumbprint("SHA256") // Output: // JWK thumbprint: QzUpUAW1Y5iksGxq3r1o3JMROR6D7FLwvRlHmDQVg0I // -------------------------------------------------------------- // Now let's do an EC private key. The following is an unencrypted PEM containing a 384-bit EC key.. loo_SbPem.Clear() loo_SbPem.AppendLine("-----BEGIN PRIVATE KEY-----",li_BCrlf) loo_SbPem.AppendLine("MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDAamStb0Xep3y3sWw2u",li_BCrlf) loo_SbPem.AppendLine("SSAdUPkgQ9Rvhlnx8XEVOYy2teh69T0on77ja02m03n8t8WhZANiAARUNSar38Rz",li_BCrlf) loo_SbPem.AppendLine("lKPyZFsNSGUanzpNRth0C+MikVEH8FAlDHMMpAs34dyF4IK0uxgbiEe9bQ+ieLrl",li_BCrlf) loo_SbPem.AppendLine("6xwFR0yaTivuwoyXC+ScGUnwnpaXmid6UUgw4ypbneHsaKuZ9JLdMAo=",li_BCrlf) loo_SbPem.AppendLine("-----END PRIVATE KEY-----",li_BCrlf) li_Success = loo_PrivKey.LoadPem(loo_SbPem.GetAsString()) if li_Success <> 1 then Write-Debug loo_PrivKey.LastErrorText destroy loo_PrivKey destroy loo_SbPem return end if // Generate the JWK thumbprint: Write-Debug "JWK thumbprint: " + loo_PrivKey.GetJwkThumbprint("SHA256") // Output: // JWK thumbprint: ABAUUfNSONFsZYvZ_o_0bsPT3qeG3jttXB09VC_ETWQ destroy loo_PrivKey destroy loo_SbPem |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.