Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C++) Ibanity HTTP Signature for XS2A, Isabel Connect, Ponto ConnectSee more Ibanity ExamplesDemonstrates how to add a Signature header for Ibanity HTTP requests. For more information, see https://documentation.ibanity.com/http-signature
#include <CkJsonObjectW.h> #include <CkDateTimeW.h> #include <CkCrypt2W.h> #include <CkStringBuilderW.h> #include <CkPrivateKeyW.h> #include <CkRsaW.h> void ChilkatSample(void) { // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. bool success; // In order to sign your HTTP requests, you have to add 2 headers to the HTTP request: Digest: the digest of the request payload and Signature: the actual signature of the request. // POST /xs2a/customer-access-tokens HTTP/1.1 // Host: api.ibanity.com // Content-Type: application/json // Digest: SHA-512=z4PhNX7vuL3xVChQ1m2AB9Yg5AULVxXcg/SpIdNs6c5H0NE8XYXysP+DGNKHfuwvY7kxvUdBeoGlODJ6+SfaPg== // Ibanity-Idempotency-Key: 61f02718-eeee-46e1-b5eb-e8fd6e799c2d // Signature: keyId="62f02718-eeee-46e1-b5eb-e8fd6e799c2e",created=1599659223,algorithm="hs2019",headers="(request-target) host digest (created) ibanity-idempotency-key",signature="SjWJWbWN7i0...zsbM=" // // {"data":{"type":"customerAccessToken", "attributes":{"applicationCustomerReference":"15874569"}}} // The payload (body) of the above HTTP request is the JSON. // Build the JSON above. // Use this online tool to generate code from sample JSON: // Generate Code to Create JSON CkJsonObjectW json; json.UpdateString(L"data.type",L"customerAccessToken"); json.UpdateString(L"data.attributes.applicationCustomerReference",L"15874569"); const wchar_t *payload = json.emit(); wprintf(L"payload = %s\n",payload); // Step 1: Build the (created) virtual header CkDateTimeW dtNow; dtNow.SetFromCurrentSystemTime(); const wchar_t *created = dtNow.getAsUnixTimeStr(false); wprintf(L"created = %s\n",created); // Step 2: Build the Digest header CkCrypt2W crypt; crypt.put_HashAlgorithm(L"sha512"); crypt.put_EncodingMode(L"base64"); crypt.put_Charset(L"utf-8"); CkStringBuilderW sbDigestHdrValue; sbDigestHdrValue.Append(L"SHA-512="); sbDigestHdrValue.Append(crypt.hashStringENC(json.emit())); wprintf(L"%s\n",sbDigestHdrValue.getAsString()); // Step 3: Build the (request target) virtual header // In order to build the signature you will need a virtual header named (request-target) (the parentheses are important). // The (request-target) is the string concatenation of the HTTP method (in lowercase) with the path and query parameters. const wchar_t *request_target = L"post /xs2a/customer-access-tokens"; // Step 4: Build the signing string // The signing string is the concatenation of the signed header names (in lowercase) and values separated by a LF. // You must always sign the following headers: (request-target), host, (created), digest. // If used, you must also sign the authorization header and any ibanity-* headers, such as ibanity-idempotency-key. CkStringBuilderW sbSigningString; sbSigningString.Append(L"(request-target): "); sbSigningString.AppendLine(request_target,false); sbSigningString.Append(L"host: "); sbSigningString.AppendLine(L"api.ibanity.com",false); sbSigningString.Append(L"digest: "); sbSigningString.AppendLine(sbDigestHdrValue.getAsString(),false); sbSigningString.Append(L"(created): "); sbSigningString.AppendLine(created,false); sbSigningString.Append(L"ibanity-idempotency-key: "); const wchar_t *idempotencyKey = crypt.generateUuid(); sbSigningString.Append(idempotencyKey); // Step 5: Build the signed headers list // To allow Ibanity to check the signed headers, you must provide a list of the header names. They should be lowercase and in the same order used to create the signing string. const wchar_t *signed_headers_list = L"(request-target) host digest (created) ibanity-idempotency-key"; // Step 6: Build the Signature header // This is where the real signing happens. The signature header is a combination of several sub-headers - // // keyId: the identifier for the application's signature certificate, obtained from the Developer Portal // algorithm: the digital signature algorithm used to generate the signature (must be hs2019) // headers: The list of HTTP headers created in step 5 // signature: the Base64-encoded digital signature of the signing string created in step 4. CkPrivateKeyW privKey; success = privKey.LoadEncryptedPemFile(L"my_ibanity_signature_private_key.pem",L"pem_password"); if (success == false) { wprintf(L"%s\n",privKey.lastErrorText()); return; } CkRsaW rsa; rsa.put_PssSaltLen(32); rsa.put_EncodingMode(L"base64"); // Use the RSASSA-PSS signature algorithm rsa.put_OaepPadding(true); success = rsa.ImportPrivateKeyObj(privKey); if (success == false) { wprintf(L"%s\n",rsa.lastErrorText()); return; } // Sign the signing string. const wchar_t *sigBase64 = rsa.signStringENC(sbSigningString.getAsString(),L"sha-256"); if (rsa.get_LastMethodSuccess() == false) { wprintf(L"%s\n",rsa.lastErrorText()); return; } // Build the signature header value. CkStringBuilderW sbSigHeaderValue; sbSigHeaderValue.Append(L"keyId=\""); // Use your identifier for the application's signature certificate, obtained from the Developer Portal sbSigHeaderValue.Append(L"62f02718-eeee-46e1-b5eb-e8fd6e799c2e"); sbSigHeaderValue.Append(L"\",created="); sbSigHeaderValue.Append(created); sbSigHeaderValue.Append(L",algorithm=\"hs2019\",headers=\""); sbSigHeaderValue.Append(signed_headers_list); sbSigHeaderValue.Append(L"\",signature=\""); sbSigHeaderValue.Append(sigBase64); sbSigHeaderValue.Append(L"\""); wprintf(L"%s\n",sbSigHeaderValue.getAsString()); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.