Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) A3/A4 Certificate to Create and Verify an Opaque PKCS7/CMS SignatureDemonstrates how to use an A3 or A4 certificate w/ private key on a smartcard or token to create a PKCS7 opaque signature, and also how to verify an opaque signature. An opaque signature is different than a detached PKCS7 signature in that it contains the original data. Verifying an opaque signature retrieves the original content.
#include <C_CkCrypt2W.h> #include <C_CkCertW.h> void ChilkatSample(void) { HCkCrypt2W crypt; HCkCertW cert; BOOL success; const wchar_t *originalData; const wchar_t *opaqueSig; HCkCrypt2W vCrypt; const wchar_t *extractedData; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. crypt = CkCrypt2W_Create(); // A certificate and private key is needed to create a signature. // Chilkat provides many different ways to load a certificate and private key, such // as from a smartcards and hardware tokens, PFX/.p12, Java keystore, JWK, Windows registry-based certificate stores, and other sources. // This example will load the default certificate from the smartcard that is currently in // the smartcard reader. cert = CkCertW_Create(); // If the smartcard or token requires a PIN, we can set it here to avoid the dialog... CkCertW_putSmartCardPin(cert,L"000000"); success = CkCertW_LoadFromSmartcard(cert,L""); if (success != TRUE) { wprintf(L"%s\n",CkCertW_lastErrorText(cert)); CkCrypt2W_Dispose(crypt); CkCertW_Dispose(cert); return; } // Tell it to use the cert and private key we've loaded. success = CkCrypt2W_SetSigningCert(crypt,cert); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkCrypt2W_Dispose(crypt); CkCertW_Dispose(cert); return; } // Indicate we want the opaque signature in base64 format: CkCrypt2W_putEncodingMode(crypt,L"base64"); // Sign the string using the "utf-8" byte representation: CkCrypt2W_putCharset(crypt,L"utf-8"); // Create the opaque signature: originalData = L"This is the string to be signed."; opaqueSig = CkCrypt2W_opaqueSignStringENC(crypt,originalData); if (CkCrypt2W_getLastMethodSuccess(crypt) != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkCrypt2W_Dispose(crypt); CkCertW_Dispose(cert); return; } wprintf(L"%s\n",opaqueSig); // The output looks like this: // MIIPgQYJKoZIhvcNAQcCoIIPcjCCD24CAQExCzAJBgUrDgMCGgUAMC8GCSqGSIb3DQEHAaAiBCBUaGlzIGlzIHRoZSBzdHJpbmcgdG8gYmUgc... // ---------------------------------------------------------------------------------------------- // Now let's verify the signature and retrieve the original data. // We'll use a new Crypt2 object to keep things completely separate... vCrypt = CkCrypt2W_Create(); // We only need the certificate to verify a signature (and extract the data from // an opaque signature). The public key is always embedded within a certificate. success = CkCrypt2W_SetVerifyCert(vCrypt,cert); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(vCrypt)); CkCrypt2W_Dispose(crypt); CkCertW_Dispose(cert); CkCrypt2W_Dispose(vCrypt); return; } CkCrypt2W_putEncodingMode(vCrypt,L"base64"); CkCrypt2W_putCharset(vCrypt,L"utf-8"); extractedData = CkCrypt2W_opaqueVerifyStringENC(vCrypt,opaqueSig); if (CkCrypt2W_getLastMethodSuccess(vCrypt) != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(vCrypt)); CkCrypt2W_Dispose(crypt); CkCertW_Dispose(cert); CkCrypt2W_Dispose(vCrypt); return; } wprintf(L"The extracted data: %s\n",extractedData); // The output is: // The extracted data: This is the string to be signed. CkCrypt2W_Dispose(crypt); CkCertW_Dispose(cert); CkCrypt2W_Dispose(vCrypt); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.