Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Tcl) A3/A4 Certificate to Create and Verify an Opaque PKCS7/CMS SignatureDemonstrates how to use an A3 or A4 certificate w/ private key on a smartcard or token to create a PKCS7 opaque signature, and also how to verify an opaque signature. An opaque signature is different than a detached PKCS7 signature in that it contains the original data. Verifying an opaque signature retrieves the original content.
load ./chilkat.dll # This example assumes the Chilkat API to have been previously unlocked. # See Global Unlock Sample for sample code. set crypt [new_CkCrypt2] # A certificate and private key is needed to create a signature. # Chilkat provides many different ways to load a certificate and private key, such # as from a smartcards and hardware tokens, PFX/.p12, Java keystore, JWK, Windows registry-based certificate stores, and other sources. # This example will load the default certificate from the smartcard that is currently in # the smartcard reader. set cert [new_CkCert] # If the smartcard or token requires a PIN, we can set it here to avoid the dialog... CkCert_put_SmartCardPin $cert "000000" set success [CkCert_LoadFromSmartcard $cert ""] if {$success != 1} then { puts [CkCert_lastErrorText $cert] delete_CkCrypt2 $crypt delete_CkCert $cert exit } # Tell it to use the cert and private key we've loaded. set success [CkCrypt2_SetSigningCert $crypt $cert] if {$success != 1} then { puts [CkCrypt2_lastErrorText $crypt] delete_CkCrypt2 $crypt delete_CkCert $cert exit } # Indicate we want the opaque signature in base64 format: CkCrypt2_put_EncodingMode $crypt "base64" # Sign the string using the "utf-8" byte representation: CkCrypt2_put_Charset $crypt "utf-8" # Create the opaque signature: set originalData "This is the string to be signed." set opaqueSig [CkCrypt2_opaqueSignStringENC $crypt $originalData] if {[CkCrypt2_get_LastMethodSuccess $crypt] != 1} then { puts [CkCrypt2_lastErrorText $crypt] delete_CkCrypt2 $crypt delete_CkCert $cert exit } puts "$opaqueSig" # The output looks like this: # MIIPgQYJKoZIhvcNAQcCoIIPcjCCD24CAQExCzAJBgUrDgMCGgUAMC8GCSqGSIb3DQEHAaAiBCBUaGlzIGlzIHRoZSBzdHJpbmcgdG8gYmUgc... # ---------------------------------------------------------------------------------------------- # Now let's verify the signature and retrieve the original data. # We'll use a new Crypt2 object to keep things completely separate... set vCrypt [new_CkCrypt2] # We only need the certificate to verify a signature (and extract the data from # an opaque signature). The public key is always embedded within a certificate. set success [CkCrypt2_SetVerifyCert $vCrypt $cert] if {$success != 1} then { puts [CkCrypt2_lastErrorText $vCrypt] delete_CkCrypt2 $crypt delete_CkCert $cert delete_CkCrypt2 $vCrypt exit } CkCrypt2_put_EncodingMode $vCrypt "base64" CkCrypt2_put_Charset $vCrypt "utf-8" set extractedData [CkCrypt2_opaqueVerifyStringENC $vCrypt $opaqueSig] if {[CkCrypt2_get_LastMethodSuccess $vCrypt] != 1} then { puts [CkCrypt2_lastErrorText $vCrypt] delete_CkCrypt2 $crypt delete_CkCert $cert delete_CkCrypt2 $vCrypt exit } puts "The extracted data: $extractedData" # The output is: # The extracted data: This is the string to be signed. delete_CkCrypt2 $crypt delete_CkCert $cert delete_CkCrypt2 $vCrypt |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.