Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Tcl) Duplicate OpensSSL to Sign File and Output Binary DERThis example duplicates the following: openssl smime -sign -in INPUT.xml -signer SIGN.PEM -passin pass:MYPASS -outform der -binary -nodetach -out SIGNED.P7M Note: Although "smime" is the OpenSSL command, it's not actually producing S/MIME. The arguments "-outform der -binary" indicates that the output is binary DER (i.e. the PKCS7 binary signature). The input can be any type of file: XML, PDF, JPG, ... *anything*...
load ./chilkat.dll # This example requires the Chilkat API to have been previously unlocked. # See Global Unlock Sample for sample code. set crypt [new_CkCrypt2] # Load the PEM containing cert + private key. set pem [new_CkPem] set success [CkPem_LoadPemFile $pem "qa_data/pem/myPem.pem" "password"] if {$success != 1} then { puts [CkPem_lastErrorText $pem] delete_CkCrypt2 $crypt delete_CkPem $pem exit } # privkey is a CkPrivateKey set privkey [CkPem_GetPrivateKey $pem 0] if {[CkPem_get_LastMethodSuccess $pem] != 1} then { puts [CkPem_lastErrorText $pem] delete_CkCrypt2 $crypt delete_CkPem $pem exit } # cert is a CkCert set cert [CkPem_GetCert $pem 0] if {[CkPem_get_LastMethodSuccess $pem] != 1} then { delete_CkPrivateKey $privkey puts [CkPem_lastErrorText $pem] delete_CkCrypt2 $crypt delete_CkPem $pem exit } set success [CkCrypt2_SetSigningCert2 $crypt $cert $privkey] if {$success != 1} then { delete_CkPrivateKey $privkey delete_CkCert $cert puts [CkCrypt2_lastErrorText $crypt] delete_CkCrypt2 $crypt delete_CkPem $pem exit } delete_CkPrivateKey $privkey delete_CkCert $cert # Alternatively, we could use a .pfx/.p12 file. # (Chilkat also supports other formats/sources for cert/private keys...) set certFromP12 [new_CkCert] set success [CkCert_LoadPfxFile $certFromP12 "qa_data/p12/myP12.p12" "password"] if {$success != 1} then { puts [CkCert_lastErrorText $certFromP12] delete_CkCrypt2 $crypt delete_CkPem $pem delete_CkCert $certFromP12 exit } # The certificate, when loaded from a .pfx/.p12, will automatically # include the associated private key, assuming it's present in the .p12. # We don't have to explicitly provide the private key as in the # lines of code above that use the PEM file. set success [CkCrypt2_SetSigningCert $crypt $certFromP12] if {$success != 1} then { puts [CkCrypt2_lastErrorText $crypt] delete_CkCrypt2 $crypt delete_CkPem $pem delete_CkCert $certFromP12 exit } # Create the opaque signature (PKCS7 binary DER that contains both the signature and original file data). set success [CkCrypt2_CreateP7M $crypt "qa_data/infile.anything" "qa_output/outfile.p7m"] if {$success != 1} then { puts [CkCrypt2_lastErrorText $crypt] delete_CkCrypt2 $crypt delete_CkPem $pem delete_CkCert $certFromP12 exit } puts "Success." delete_CkCrypt2 $crypt delete_CkPem $pem delete_CkCert $certFromP12 |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.