Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Verify Opaque Signature and Retrieve Signing CertificatesDemonstrates how to verify a PCKS7 opaque digital signature (signed data), extract the original file/data, and then extract the certificate(s) that were used to sign.
#include <C_CkCrypt2W.h> #include <C_CkBinDataW.h> #include <C_CkCertW.h> #include <C_CkCertChainW.h> void ChilkatSample(void) { HCkCrypt2W crypt; BOOL success; HCkBinDataW binData; int numCerts; int i; HCkCertW cert; HCkCertChainW certChain; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. crypt = CkCrypt2W_Create(); // Verify a PKCS7 signed-data (opaque signature) file and extract the original content to a file. success = CkCrypt2W_VerifyP7M(crypt,L"qa_data/p7m/opaqueSig.p7",L"qa_output/originalData.dat"); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkCrypt2W_Dispose(crypt); return; } // Alternatively, we can do it in memory... binData = CkBinDataW_Create(); success = CkBinDataW_LoadFile(binData,L"qa_data/p7m/opaqueSig.p7"); // Your app should check for success, but we'll skip the check for brevity.. // If verified, the signature is unwrapped and binData is replaced with the original data that was signed. success = CkCrypt2W_OpaqueVerifyBd(crypt,binData); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkCrypt2W_Dispose(crypt); CkBinDataW_Dispose(binData); return; } // For our testing, we signed some text, so we can get it from the binData.. wprintf(L"Original Data:\n"); wprintf(L"%s\n",CkBinDataW_getString(binData,L"utf-8")); // After any method call that verifies a signature, the crypt object will contain the certificate(s) // that were used for signing (assuming the X.509 certs were available in the signature, which is typically the case). // Get the number of signing certificates, and get each.. numCerts = CkCrypt2W_getNumSignerCerts(crypt); i = 0; while (i < numCerts) { cert = CkCrypt2W_GetSignerCert(crypt,i); wprintf(L"%s\n",CkCertW_subjectDN(cert)); CkCertW_Dispose(cert); i = i + 1; } // We could also get the complete certificate chain of each signer cert, // assuming the certs in the chain of authentication to the trusted root // are available on the system, or provided to Chilkat by some other means // (such as via the XmlCertVault class, the TrustedRoots class, etc.) i = 0; while (i < numCerts) { certChain = CkCrypt2W_GetSignerCertChain(crypt,i); // You can examine the various properties and methods for certChain in the online // reference documentation... CkCertChainW_Dispose(certChain); i = i + 1; } CkCrypt2W_Dispose(crypt); CkBinDataW_Dispose(binData); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.