Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C++) Verify Signature of Alexa Custom Skill RequestThis example verifies the signature of an Alexa Custom Skill Request.
#include <CkHttpW.h> #include <CkStringBuilderW.h> #include <CkPemW.h> #include <CkCertW.h> #include <CkPublicKeyW.h> #include <CkRsaW.h> void ChilkatSample(void) { // This example assumes you have a web service that will receive requests from Alexa. // A sample request sent by Alexa will look like the following: // Connection: Keep-Alive // Content-Length: 2583 // Content-Type: application/json; charset=utf-8 // Accept: application/json // Accept-Charset: utf-8 // Host: your.web.server.com // User-Agent: Apache-HttpClient/4.5.x (Java/1.8.0_172) // Signature: dSUmPwxc9...aKAf8mpEXg== // SignatureCertChainUrl: https://s3.amazonaws.com/echo.api/echo-api-cert-6-ats.pem // // {"version":"1.0","session":{"new":true,"sessionId":"amzn1.echo-api.session.433 ... }} // First, assume we've written code to get the 3 pieces of data we need: const wchar_t *signature = L"dSUmPwxc9...aKAf8mpEXg=="; const wchar_t *certChainUrl = L"https://s3.amazonaws.com/echo.api/echo-api-cert-6-ats.pem"; const wchar_t *jsonBody = L"{\"version\":\"1.0\",\"session\":{\"new\":true,\"sessionId\":\"amzn1.echo-api.session.433 ... }}"; // To validate the signature, we do the following: // First, download the PEM-encoded X.509 certificate chain that Alexa used to sign the message CkHttpW http; CkStringBuilderW sbPem; bool success = http.QuickGetSb(certChainUrl,sbPem); if (success == false) { wprintf(L"%s\n",http.lastErrorText()); return; } CkPemW pem; success = pem.LoadPem(sbPem.getAsString(),L"passwordNotUsed"); if (success == false) { wprintf(L"%s\n",pem.lastErrorText()); return; } // The 1st certificate should be the signing certificate. CkCertW *cert = pem.GetCert(0); if (pem.get_LastMethodSuccess() == false) { wprintf(L"%s\n",pem.lastErrorText()); return; } // Get the public key from the cert. CkPublicKeyW *pubKey = cert->ExportPublicKey(); if (cert->get_LastMethodSuccess() == false) { wprintf(L"%s\n",cert->lastErrorText()); delete cert; return; } delete cert; // Use the public key extracted from the signing certificate to decrypt the encrypted signature to produce the asserted hash value. CkRsaW rsa; success = rsa.ImportPublicKeyObj(*pubKey); if (success == false) { wprintf(L"%s\n",cert->lastErrorText()); delete pubKey; return; } delete pubKey; // RSA "decrypt" the signature. // (Amazon's documentation is confusing, because we're simply verifiying the signature against the SHA-1 hash // of the request body. This happens in a single call to VerifyStringENC...) rsa.put_EncodingMode(L"base64"); bool bVerified = rsa.VerifyStringENC(jsonBody,L"sha1",signature); if (bVerified == true) { wprintf(L"The signature is verified against the JSON body of the request. Yay!\n"); } else { wprintf(L"Sorry, not verified. Crud!\n"); } } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.