Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C++) EuroCert Cloud Sign XMLSee more Signing in the Cloud ExamplesDemonstrates how to sign XML using the EuroCert cloud provider. The signing of the hash happens on a hardware token on the EuroCert server. Everything else involving the updating the XML to add the signature happens locally within Chilkat. Note: This example requires Chilkat v9.5.0.96 or later.
#include <CkPkcs11W.h> #include <CkCertW.h> #include <CkXmlW.h> #include <CkXmlDSigGenW.h> #include <CkStringBuilderW.h> void ChilkatSample(void) { // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: Chilkat's PKCS11 implementation runs on Windows, Linux, Mac OS X, and other supported operating systems. CkPkcs11W pkcs11; // Provide the path to the EuroCert Cloud PKCS11 driver. // If your application runs as a 64-bit process, use the path to the 64-bit ECSPKCS11.dll pkcs11.put_SharedLibPath(L"C:\\Users\\Public\\ECSIGNER\\PKCS11\\32\\ECSPKCS11.dll"); // At this time, we don't know what should be used for the PIN. // Perhaps it is documented online by EuroCert? const wchar_t *pin = L"user:password"; int userType = 1; bool success = pkcs11.QuickSession(userType,pin); if (success == false) { wprintf(L"%s\n",pkcs11.lastErrorText()); return; } CkCertW cert; success = cert.LoadFromFile(L"qa_data/certs/myCert.cer"); if (success == false) { wprintf(L"%s\n",cert.lastErrorText()); return; } // Tell the certificate to link with the PKCS11 session. // The cert's private key should be installed on the CloudHSM. // If there are multiple private keys on the CloudHSM, then Chilkat will automatically // locate and use the private key corresponding to the certificate. success = cert.LinkPkcs11(pkcs11); if (success == false) { wprintf(L"%s\n",cert.lastErrorText()); return; } // -------------------------------------------------------------------------- // At this point, we have the cert to be used for signing. // Our XML signing code is the same as for a cert obtained from any other source.. // First generate the following XML to be signed: // Use this online tool to generate code from sample XML: // Generate Code to Create XML // <?xml version="1.0" encoding="UTF-8" standalone="no" ?> // <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"> // <SOAP-ENV:Header> // <wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" SOAP-ENV:mustUnderstand="1"></wsse:Security> // </SOAP-ENV:Header> // <SOAP-ENV:Body xmlns:SOAP-SEC="http://schemas.xmlsoap.org/soap/security/2000-12" SOAP-SEC:id="Body"> // <z:FooBar xmlns:z="http://example.com" /> // </SOAP-ENV:Body> // </SOAP-ENV:Envelope> CkXmlW xml; xml.put_Tag(L"SOAP-ENV:Envelope"); xml.AddAttribute(L"xmlns:SOAP-ENV",L"http://schemas.xmlsoap.org/soap/envelope/"); xml.UpdateAttrAt(L"SOAP-ENV:Header|wsse:Security",true,L"xmlns:wsse",L"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"); xml.UpdateAttrAt(L"SOAP-ENV:Header|wsse:Security",true,L"SOAP-ENV:mustUnderstand",L"1"); xml.UpdateAttrAt(L"SOAP-ENV:Body",true,L"xmlns:SOAP-SEC",L"http://schemas.xmlsoap.org/soap/security/2000-12"); xml.UpdateAttrAt(L"SOAP-ENV:Body",true,L"SOAP-SEC:id",L"Body"); xml.UpdateAttrAt(L"SOAP-ENV:Body|z:FooBar",true,L"xmlns:z",L"http://example.com"); CkXmlDSigGenW gen; // Indicate where the Signature will be inserted. gen.put_SigLocation(L"SOAP-ENV:Envelope|SOAP-ENV:Header|wsse:Security"); // Add a reference to the fragment of the XML to be signed. // Note: "Body" refers to the XML element having an "id" equal to "Body", where "id" is case insensitive // and where any namespace might qualify the attribute. In this case, the SOAP-ENV:Body fragment is signed // NOT because the tag = "Body", but because it has SOAP-SEC:id="Body" gen.AddSameDocRef(L"Body",L"sha1",L"EXCL_C14N",L"",L""); // (You can read about the SignedInfoPrefixList in the online reference documentation. It's optional..) gen.put_SignedInfoPrefixList(L"wsse SOAP-ENV"); // Provide the private key for signing via the certificate, and indicate that // we want the base64 of the certificate embedded in the KeyInfo. gen.put_KeyInfoType(L"X509Data"); gen.put_X509Type(L"Certificate"); bool bUsePrivateKey = true; success = gen.SetX509Cert(cert,bUsePrivateKey); if (success != true) { wprintf(L"%s\n",gen.lastErrorText()); success = pkcs11.CloseSession(); return; } // Everything's specified. Now create and insert the Signature CkStringBuilderW sbXml; xml.put_EmitCompact(true); xml.GetXmlSb(sbXml); success = gen.CreateXmlDSigSb(sbXml); if (success != true) { wprintf(L"%s\n",gen.lastErrorText()); success = pkcs11.CloseSession(); return; } // Examine the XML with the digital signature inserted wprintf(L"%s\n",sbXml.getAsString()); // -------------------------------------------------------------------------- // Revert to an unauthenticated session by calling Logout. success = pkcs11.Logout(); if (success == false) { wprintf(L"%s\n",pkcs11.lastErrorText()); success = pkcs11.CloseSession(); return; } // When finished, close the session. // It is important to close the session (memory leaks will occur if the session is not properly closed). success = pkcs11.CloseSession(); if (success == false) { wprintf(L"%s\n",pkcs11.lastErrorText()); return; } wprintf(L"Success.\n"); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.