![]()  | 
  
Chilkat  HOME  Android™  AutoIt  C  C#  C++  Chilkat2-Python  CkPython  Classic ASP  DataFlex  Delphi DLL  Go  Java  Node.js  Objective-C  PHP Extension  Perl  PowerBuilder  PowerShell  PureBasic  Ruby  SQL Server  Swift  Tcl  Unicode C  Unicode C++  VB.NET  VBScript  Visual Basic 6.0  Visual FoxPro  Xojo Plugin
 
      (Ruby) RSA Sign with PKCS8 Encrypted KeyDemonstrates how to load a private key from an encrypted PKCS8 file and create an RSA digital signature (and then verify it). Note: This example requires Chilkat v11.0.0 or greater. 
 require 'chilkat' success = false # This example assumes the Chilkat API to have been previously unlocked. # See Global Unlock Sample for sample code. privKey = Chilkat::CkPrivateKey.new() # Load the private key from an RSA PEM file: success = privKey.LoadAnyFormatFile("raul_privateKey.key","a0123456789") if (success == false) print privKey.lastErrorText() + "\n"; exit end rsa = Chilkat::CkRsa.new() # Import the private key into the RSA component: success = rsa.UsePrivateKey(privKey) if (success == false) print rsa.lastErrorText() + "\n"; exit end # This example will sign a string, and receive the signature # in a hex-encoded string. Therefore, set the encoding mode # to "hex": rsa.put_EncodingMode("hex") strData = "This is the string to be signed." # Sign the string using the sha256 hash algorithm. # Other valid choices are sha1, sha384, sha512 and others. hexSig = rsa.signStringENC(strData,"sha256") if (rsa.get_LastMethodSuccess() == false) print rsa.lastErrorText() + "\n"; exit end print hexSig + "\n"; # Now verify with the public key. # This example shows how to use the public key from # a digital certificate (.cer file) cert = Chilkat::CkCert.new() success = cert.LoadFromFile("raul_publicKey.cer") if (success == false) print cert.lastErrorText() + "\n"; exit end pubKey = Chilkat::CkPublicKey.new() cert.GetPublicKey(pubKey) rsa2 = Chilkat::CkRsa.new() success = rsa2.UsePublicKey(pubKey) if (success == false) print rsa2.lastErrorText() + "\n"; exit end # Verify the signature against the original data: rsa2.put_EncodingMode("hex") success = rsa2.VerifyStringENC(strData,"sha256",hexSig) if (success == false) print rsa2.lastErrorText() + "\n"; exit end print "Signature verified!" + "\n"; # Verify with incorrect data: success = rsa2.VerifyStringENC("something else","sha256",hexSig) if (success != true) print "Signature not verified! (which was expected in this case)" + "\n"; else print "Hmmm... that's not right..." + "\n"; end  | 
  ||||
© 2000-2025 Chilkat Software, Inc. All Rights Reserved.