Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C++) RFC3161 Timestamp Client - Fetch from Timestamp Authority (TSA) and VerifySends an RFC 3161 timestamp request to a TSA (Timestamp Authority) server and validates the timestamp token response. Note: This example requires Chilkat v9.5.0.75 or greater.
#include <CkCrypt2W.h> #include <CkHttpW.h> #include <CkBinDataW.h> #include <CkHttpResponseW.h> #include <CkCertW.h> #include <CkJsonObjectW.h> #include <CkDtObjW.h> void ChilkatSample(void) { // Note: Requires Chilkat v9.5.0.75 or greater. // This requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // First sha-256 hash the data that is to be timestamped. // In this example, the data is the string "Hello World" bool success; CkCrypt2W crypt; crypt.put_HashAlgorithm(L"sha256"); crypt.put_EncodingMode(L"base64"); const wchar_t *base64Hash = crypt.hashStringENC(L"Hello World"); CkHttpW http; CkBinDataW requestToken; const wchar_t *optionalPolicyOid = L""; bool addNonce = false; bool requestTsaCert = true; // Create a time-stamp request token success = http.CreateTimestampRequest(L"sha256",base64Hash,optionalPolicyOid,addNonce,requestTsaCert,requestToken); if (success != true) { wprintf(L"%s\n",http.lastErrorText()); return; } // Send the time-stamp request token to the TSA. // This is the equivalent of the following CURL command: // curl -H "Content-Type: application/timestamp-query" --data-binary '@file.tsq' https://freetsa.org/tsr > file.tsr const wchar_t *tsaUrl = L"https://freetsa.org/tsr"; // Another timestamp server you could try is: http://timestamp.digicert.com tsaUrl = L"http://timestamp.digicert.com"; CkHttpResponseW *resp = http.PBinaryBd(L"POST",tsaUrl,requestToken,L"application/timestamp-query",false,false); if (http.get_LastMethodSuccess() != true) { wprintf(L"%s\n",http.lastErrorText()); return; } // Get the timestamp reply from the HTTP response object. CkBinDataW timestampReply; resp->GetBodyBd(timestampReply); delete resp; // Show the base64 encoded timestamp reply. wprintf(L"%s\n",timestampReply.getEncoded(L"base64")); // Let's verify the timestamp reply against the TSA's cert, which we've previously downloaded. // See https://freetsa.org/index_en.php CkCertW tsaCert; success = tsaCert.LoadFromFile(L"qa_data/certs/freetsa.org.cer"); if (success != true) { wprintf(L"%s\n",tsaCert.lastErrorText()); return; } // The VerifyTimestampReply method will return one of the following values: // -1: The timestampReply does not contain a valid timestamp reply. // -2: The timestampReply is a valid timestamp reply, but failed verification using the public key of the tsaCert. // 0: Granted and verified. // 1: Granted and verified, with mods (see RFC 3161) // 2: Rejected. // 3: Waiting. // 4: Revocation Warning // 5: Revocation Notification int pkiStatus = http.VerifyTimestampReply(timestampReply,tsaCert); if (pkiStatus < 0) { wprintf(L"%s\n",http.lastErrorText()); return; } wprintf(L"pkiStatus = %d\n",pkiStatus); CkJsonObjectW *json = http.LastJsonData(); json->put_EmitCompact(false); wprintf(L"%s\n",json->emit()); // The LastJsonData looks like the following. // Note: The "timestampReply.pkiStatus" portion of the LastJsonData was added in Chilkat v9.5.0.83 // Use this online tool to generate parsing code from sample JSON: // Generate Parsing Code from JSON // { // "timestampReply": { // "pkiStatus": { // "value": 0, // "meaning": "granted" // } // }, // "pkcs7": { // "verify": { // "digestAlgorithms": [ // "sha256" // ], // "signerInfo": [ // { // "cert": { // "serialNumber": "04CD3F8568AE76C61BB0FE7160CCA76D", // "issuerCN": "DigiCert SHA2 Assured ID Timestamping CA", // "digestAlgOid": "2.16.840.1.101.3.4.2.1", // "digestAlgName": "SHA256" // }, // "contentType": "1.2.840.113549.1.9.16.1.4", // "signingTime": "200405023019Z", // "messageDigest": "f14zOsdnN9vyyV3HjjBiLzNDi1PF28hAFMODxNkNRZs=", // "signingAlgOid": "1.2.840.113549.1.1.1", // "signingAlgName": "RSA-PKCSV-1_5", // "authAttr": { // "1.2.840.113549.1.9.3": { // "name": "contentType", // "oid": "1.2.840.113549.1.9.16.1.4" // }, // "1.2.840.113549.1.9.5": { // "name": "signingTime", // "utctime": "200405023019Z" // }, // "1.2.840.113549.1.9.16.2.12": { // "name": "signingCertificate", // "der": "MBowGDAWBBQDJb1QXtqWMC3CL0+gHkwovig0xQ==" // }, // "1.2.840.113549.1.9.4": { // "name": "messageDigest", // "digest": "f14zOsdnN9vyyV3HjjBiLzNDi1PF28hAFMODxNkNRZs=" // } // } // } // ] // } // } // } // Chilkat functions returning "const char *" return a pointer to temporary internal memory owned and managed by Chilkat. // See this example explaining how this memory should be used: const char * functions. CkDtObjW signingTime; CkDtObjW authAttrSigningTimeUtctime; const wchar_t *strVal = 0; const wchar_t *certSerialNumber = 0; const wchar_t *certIssuerCN = 0; const wchar_t *certDigestAlgOid = 0; const wchar_t *certDigestAlgName = 0; const wchar_t *contentType = 0; const wchar_t *messageDigest = 0; const wchar_t *signingAlgOid = 0; const wchar_t *signingAlgName = 0; const wchar_t *authAttrContentTypeName = 0; const wchar_t *authAttrContentTypeOid = 0; const wchar_t *authAttrSigningTimeName = 0; const wchar_t *authAttrSigningCertificateName = 0; const wchar_t *authAttrSigningCertificateDer = 0; const wchar_t *authAttrMessageDigestName = 0; const wchar_t *authAttrMessageDigestDigest = 0; int timestampReplyPkiStatusValue = json->IntOf(L"timestampReply.pkiStatus.value"); const wchar_t *timestampReplyPkiStatusMeaning = json->stringOf(L"timestampReply.pkiStatus.meaning"); int i = 0; int count_i = json->SizeOfArray(L"pkcs7.verify.digestAlgorithms"); while (i < count_i) { json->put_I(i); strVal = json->stringOf(L"pkcs7.verify.digestAlgorithms[i]"); i = i + 1; } i = 0; count_i = json->SizeOfArray(L"pkcs7.verify.signerInfo"); while (i < count_i) { json->put_I(i); certSerialNumber = json->stringOf(L"pkcs7.verify.signerInfo[i].cert.serialNumber"); certIssuerCN = json->stringOf(L"pkcs7.verify.signerInfo[i].cert.issuerCN"); certDigestAlgOid = json->stringOf(L"pkcs7.verify.signerInfo[i].cert.digestAlgOid"); certDigestAlgName = json->stringOf(L"pkcs7.verify.signerInfo[i].cert.digestAlgName"); contentType = json->stringOf(L"pkcs7.verify.signerInfo[i].contentType"); json->DtOf(L"pkcs7.verify.signerInfo[i].signingTime",false,signingTime); messageDigest = json->stringOf(L"pkcs7.verify.signerInfo[i].messageDigest"); signingAlgOid = json->stringOf(L"pkcs7.verify.signerInfo[i].signingAlgOid"); signingAlgName = json->stringOf(L"pkcs7.verify.signerInfo[i].signingAlgName"); authAttrContentTypeName = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.3\".name"); authAttrContentTypeOid = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.3\".oid"); authAttrSigningTimeName = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.5\".name"); json->DtOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.5\".utctime",false,authAttrSigningTimeUtctime); authAttrSigningCertificateName = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.16.2.12\".name"); authAttrSigningCertificateDer = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.16.2.12\".der"); authAttrMessageDigestName = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.4\".name"); authAttrMessageDigestDigest = json->stringOf(L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.4\".digest"); i = i + 1; } delete json; } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.