Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Swift 3,4,5...) Signed SOAP for www.sist.puglia.it/Schemas/PDD_SIST/SCATEL/ using BinarySecurityTokenCreates a signed SOAP request for www.sist.puglia.it/Schemas/PDD_SIST/SCATEL/ using a BinarySecurityToken.
func chilkatTest() { // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Create the following pre-signed SOAP XML: // Note: We'll be constructing a placeholder for the wseBinarySecurityToken in the soapenv:Header. // Chilkat will automatically replace the "BinarySecurityToken_Base64Binary_Content" with actual data when signing the XML. // However: Your application should insert the actual desired timestamp values for wsu:Created and wsuExpires // Typically this is the current system date/time and a few minutes from the current system date/time. // The example below shows a 5 minute window. We'll write code below to insert the current date/time and the current date/time + 5 minutes.. // <?xml version="1.0" encoding="utf-8"?> // <soapenv:Envelope // xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" // xmlns:scat="www.sist.puglia.it/Schemas/PDD_SIST/SCATEL/" // xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" // xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" // xmlns:ds="http://www.w3.org/2000/09/xmldsig#" // xmlns:exc14n="http://www.w3.org/2001/10/xml-exc-c14n#"> // <soapenv:Header xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"> // <wsse:Security soapenv:mustUnderstand="1"> // <wsse:BinarySecurityToken // ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" // EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" // wsu:Id="X509Token">BinarySecurityToken_Base64Binary_Content</wsse:BinarySecurityToken> // <wsu:Timestamp wsu:Id="_1"> // <wsu:Created>2020-03-20T18:08:19Z</wsu:Created> // <wsu:Expires>2020-03-20T18:13:19Z</wsu:Expires> // </wsu:Timestamp> // </wsse:Security> // <wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"/> // </soapenv:Header> // <soapenv:Body> // <scat:getRuoliStruttureOperatore> // <scat:codFiscaleOperatore>CLDxxxxxxxxxxxxL</scat:codFiscaleOperatore> // </scat:getRuoliStruttureOperatore> // </soapenv:Body> // </soapenv:Envelope> var success: Bool = true // Create the XML to be signed... let xmlToSign = CkoXml()! xmlToSign.tag = "soapenv:Envelope" xmlToSign.addAttribute("xmlns:soapenv", value: "http://schemas.xmlsoap.org/soap/envelope/") xmlToSign.addAttribute("xmlns:scat", value: "www.sist.puglia.it/Schemas/PDD_SIST/SCATEL/") xmlToSign.addAttribute("xmlns:wsse", value: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd") xmlToSign.addAttribute("xmlns:wsu", value: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd") xmlToSign.addAttribute("xmlns:ds", value: "http://www.w3.org/2000/09/xmldsig#") xmlToSign.addAttribute("xmlns:exc14n", value: "http://www.w3.org/2001/10/xml-exc-c14n#") xmlToSign.updateAttr(at: "soapenv:Header", autoCreate: true, attrName: "xmlns:wsu", attrValue: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd") xmlToSign.updateAttr(at: "soapenv:Header|wsse:Security", autoCreate: true, attrName: "soapenv:mustUnderstand", attrValue: "1") xmlToSign.updateAttr(at: "soapenv:Header|wsse:Security|wsse:BinarySecurityToken", autoCreate: true, attrName: "ValueType", attrValue: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3") xmlToSign.updateAttr(at: "soapenv:Header|wsse:Security|wsse:BinarySecurityToken", autoCreate: true, attrName: "EncodingType", attrValue: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary") xmlToSign.updateAttr(at: "soapenv:Header|wsse:Security|wsse:BinarySecurityToken", autoCreate: true, attrName: "wsu:Id", attrValue: "X509Token") xmlToSign.updateChildContent("soapenv:Header|wsse:Security|wsse:BinarySecurityToken", value: "BinarySecurityToken_Base64Binary_Content") xmlToSign.updateAttr(at: "soapenv:Header|wsse:Security|wsu:Timestamp", autoCreate: true, attrName: "wsu:Id", attrValue: "_1") // Insert a 5-minute timestampe window. let dtNow = CkoDateTime()! dtNow.setFromCurrentSystemTime() xmlToSign.updateChildContent("soapenv:Header|wsse:Security|wsu:Timestamp|wsu:Created", value: dtNow.getAsTimestamp(false)) // Add 5 minutes to the time. dtNow.addSeconds(300) xmlToSign.updateChildContent("soapenv:Header|wsse:Security|wsu:Timestamp|wsu:Expires", value: dtNow.getAsTimestamp(false)) xmlToSign.updateAttr(at: "soapenv:Header|wsse:Security[1]", autoCreate: true, attrName: "xmlns:wsse", attrValue: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd") xmlToSign.updateChildContent("soapenv:Body|scat:getRuoliStruttureOperatore|scat:codFiscaleOperatore", value: "CLDxxxxxxxxxxxxL") print("XML to sign:") print("\(xmlToSign.getXml()!)") let gen = CkoXmlDSigGen()! gen.sigLocation = "soapenv:Envelope|soapenv:Header|wsse:Security" gen.sigLocationMod = 0 gen.sigNamespacePrefix = "ds" gen.sigNamespaceUri = "http://www.w3.org/2000/09/xmldsig#" gen.signedInfoCanonAlg = "EXCL_C14N" gen.signedInfoDigestMethod = "sha1" // Set the KeyInfoId before adding references.. gen.keyInfoId = "X509KeyId" // -------- Reference 1 -------- gen.addSameDocRef("_1", digestMethod: "sha1", canonMethod: "EXCL_C14N", prefixList: "", refType: "") // Provide a certificate + private key. (PFX password is test123) let cert = CkoCert()! success = cert.loadPfxFile("qa_data/pfx/cert_test123.pfx", password: "test123") if success != true { print("\(cert.lastErrorText!)") return } gen.setX509Cert(cert, usePrivateKey: true) gen.keyInfoType = "Custom" // Create the custom KeyInfo XML.. let xmlCustomKeyInfo = CkoXml()! xmlCustomKeyInfo.tag = "wsse:SecurityTokenReference" xmlCustomKeyInfo.addAttribute("wsu:Id", value: "X509TokenReference") xmlCustomKeyInfo.updateAttr(at: "wsse:Reference", autoCreate: true, attrName: "URI", attrValue: "#X509Token") xmlCustomKeyInfo.updateAttr(at: "wsse:Reference", autoCreate: true, attrName: "ValueType", attrValue: "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3") xmlCustomKeyInfo.emitXmlDecl = false gen.customKeyInfoXml = xmlCustomKeyInfo.getXml() // Load XML to be signed... let sbXml = CkoStringBuilder()! xmlToSign.getSb(sbXml) // Update BinarySecurityToken_Base64Binary_Content with the actual X509 of the signing cert. let bdCert = CkoBinData()! cert.exportDerBd(bdCert) let sbCert64 = CkoStringBuilder()! bdCert.getEncodedSb("base64", sb: sbCert64) var nReplaced: Int = sbXml.replace("BinarySecurityToken_Base64Binary_Content", replacement: sbCert64.getAsString()).intValue gen.behaviors = "IndentedSignature" // Sign the XML... success = gen.createXmlDSigSb(sbXml) if success != true { print("\(gen.lastErrorText!)") return } // ----------------------------------------------- // Save the signed XML to a file. success = sbXml.writeFile("qa_output/signedXml.xml", charset: "utf-8", emitBom: false) print("\(sbXml.getAsString()!)") // Produces the following signed XML: // Note: The following has been edited for readability. Therefore, what you see here will not actually validate because it's been modified. // <?xml version="1.0" encoding="utf-8"?> // <soapenv:Envelope // xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" // xmlns:scat="www.sist.puglia.it/Schemas/PDD_SIST/SCATEL/" // xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" // xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" // xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:exc14n="http://www.w3.org/2001/10/xml-exc-c14n#"> // <soapenv:Header xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"> // <wsse:Security soapenv:mustUnderstand="1"> // <wsse:BinarySecurityToken ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" wsu:Id="X509Token">MIIFNTCCBB2gAwIBAgIQHozVnBl1lTsusAh26u6WZTANBgkqhkiG9w0BAQsFADCB // lzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G // A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxPTA7BgNV // BAMTNENPTU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUg // RW1haWwgQ0EwHhcNMTcxMjE0MDAwMDAwWhcNMTgxMjE0MjM1OTU5WjAmMSQwIgYJ // KoZIhvcNAQkBFhVhc2Rhc2Rhc2Rhc2RkQGJ5b20uZGUwggEiMA0GCSqGSIb3DQEB // AQUAA4IBDwAwggEKAoIBAQC96oQe50EDoiuJVITeKJzy6GzVq74cEa14eFypjMNb // YVyedfCI6cn9pVClLqL7dlwxFGCRA62bbNE9woKLBT3SO1IvgoFDVIrbJm+84GEo // qQReZe8HpZnF06d3DWwhUjjcuO1z2yliGdSymSee8/1OaztxEAEOWaZR+4MkfSNc // AzzjGtKcKjVMSdiiO0JGAG/IXEwzlulfkF8zVdqDGkQTQesvT4WBys4BYwTDI64d // sM7rcC9vwuK6gvpkUi9i1Wzu0W4v9T3iHAbl3rLihPcjQ95c4q7+NjwpRqQW1VXR // enR/0iyLEFOek0D4JvOoscUwJ0LYd8f9SxFEWIzc4iAfAgMBAAGjggHrMIIB5zAf // BgNVHSMEGDAWgBSCr2yM+MX+lmF86B89K3FIXsSLwDAdBgNVHQ4EFgQUrC0DOyBB // AgOWgo2EfVZbppe3xfEwDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwIAYD // VR0lBBkwFwYIKwYBBQUHAwQGCysGAQQBsjEBAwUCMBEGCWCGSAGG+EIBAQQEAwIF // IDBGBgNVHSAEPzA9MDsGDCsGAQQBsjEBAgEBATArMCkGCCsGAQUFBwIBFh1odHRw // czovL3NlY3VyZS5jb21vZG8ubmV0L0NQUzBaBgNVHR8EUzBRME+gTaBLhklodHRw // Oi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50aWNhdGlv // bmFuZFNlY3VyZUVtYWlsQ0EuY3JsMIGLBggrBgEFBQcBAQR/MH0wVQYIKwYBBQUH // MAKGSWh0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9ET1JTQUNsaWVudEF1dGhl // bnRpY2F0aW9uYW5kU2VjdXJlRW1haWxDQS5jcnQwJAYIKwYBBQUHMAGGGGh0dHA6 // Ly9vY3NwLmNvbW9kb2NhLmNvbTAgBgNVHREEGTAXgRVhc2Rhc2Rhc2Rhc2RkQGJ5 // b20uZGUwDQYJKoZIhvcNAQELBQADggEBAHEQTr0WFcwHVk0xozn26P3s6i3RWEco // kNr8AdOtEvU0UYf1AfyVxUs04rS3Fs0lu2TD0840S3R687xF4HXhLYxSdD0QoZyU // S2mgxxyVxCqhwptmLn7ZQjUKEuK6Kv6wZ3/XugsBoNrMYWlYX8g2jWVDBCJ+Z0eT // QkaYkeSxzBSMQP3DxJS/bWh5LfwSyWYk4a3SVRJV4QVyBDXKt2uwjj1wWfxfGtiw // 6uAd2F3YIymZKsRVdrU6+h0gXMnmtpX8T+SDV6M72PP2/ZzF6gVVItyyrIScK1J8 // mcEaR5GGkLBk1s9qQM9esp3FRlACVeb1Qlytr4vgc5FlCqn0rMtjlF4= // </wsse:BinarySecurityToken> // <wsu:Timestamp wsu:Id="_1"> // <wsu:Created>2020-03-26T17:19:50Z</wsu:Created> // <wsu:Expires>2020-03-26T17:24:50Z</wsu:Expires> // </wsu:Timestamp> // </wsse:Security> // <wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> // <ds:SignedInfo> // <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> // <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/> // <ds:Reference URI="#_1"> // <ds:Transforms> // <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> // </ds:Transforms> // <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/> // <ds:DigestValue>cwrTw7wFZqNc50NxE//UT11qZCY=</ds:DigestValue> // </ds:Reference> // </ds:SignedInfo> // <ds:SignatureValue>s2UmYNVDz9dm3eU ... 619qSZqw==</ds:SignatureValue> // <ds:KeyInfo Id="X509KeyId"><wsse:SecurityTokenReference wsu:Id="X509TokenReference"> // <wsse:Reference URI="#X509Token" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/> // </wsse:SecurityTokenReference> // </ds:KeyInfo> // </ds:Signature></wsse:Security> // </soapenv:Header> // <soapenv:Body> // <scat:getRuoliStruttureOperatore> // <scat:codFiscaleOperatore>CLDxxxxxxxxxxxxL</scat:codFiscaleOperatore> // </scat:getRuoliStruttureOperatore> // </soapenv:Body> // </soapenv:Envelope> // ---------------------------------------- // Verify the signatures we just produced... let verifier = CkoXmlDSig()! success = verifier.loadSignatureSb(sbXml) if success != true { print("\(verifier.lastErrorText!)") return } var numSigs: Int = verifier.numSignatures.intValue var verifyIdx: Int = 0 while verifyIdx < numSigs { verifier.selector = verifyIdx var verified: Bool = verifier.verifySignature(true) if verified != true { print("\(verifier.lastErrorText!)") return } verifyIdx = verifyIdx + 1 } print("All signatures were successfully verified.") } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.