Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Compute JWK Thumbprint for RSA and EC Private KeysDemonstrates how to compute a JSON Web Key thumbprint for a private key (RSA or ECC). Note: This example requires Chilkat v9.5.0.66 or greater.
#include <C_CkPrivateKeyW.h> #include <C_CkStringBuilderW.h> void ChilkatSample(void) { HCkPrivateKeyW privKey; HCkStringBuilderW sbPem; BOOL bCrlf; BOOL success; privKey = CkPrivateKeyW_Create(); // A private key can be loaded from any format (binary DER, PEM, etc.) // This example will load the private keys from PEM format, // and will then compute the JWK thumbprint. // First do it for this RSA private key... sbPem = CkStringBuilderW_Create(); bCrlf = TRUE; CkStringBuilderW_AppendLine(sbPem,L"-----BEGIN RSA PRIVATE KEY-----",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"Proc-Type: 4,ENCRYPTED",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"DEK-Info: DES-EDE3-CBC,2E65118E6C7B5207",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"7cYUTW4ZBdmVZ4ILB08hcTdm5ib0E0zcy+I7pHpNQfJHtI7BJ4omys5S19ufJPBJ",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"IzYjeO7oTVqI37F6EUmjZqG4WVE2UQbQDkosZbZN82O4Ipu1lFAPEbwjqePMKufz",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"snSQHKfnbyyDPEVNlJbs19NXC8v6g+pQay5rH/I6N2iBxgsTmuemZ54EhNQMZyEN",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"R/CiheArWEH9H8/4hd2gc9Tb2s0MwGHILL4kbbNm5tp3xw4ik7OYWNrj3m+nG6Xb",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"vKXh2xEanAZAyMXTqDJTHdn7/CEqusQPJjZGV+Mf1kjKu7p4qcXFnIXP5ILnTW7b",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"lHoWC4eweDzKOMRzXmbABEVSUvx2SmPl4TcoC5L1SCAHEmZaKbaY7S5l53u6gl0f",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"ULuQbt7Hr3THznlNFKkGT1/yVNt2QOm1emZd55LaNe8E7XsNSlhl0grYQ+Ue8Jba",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"x85OapltVjxM9wVCwbgFyi04ihdKHo9e+uYKeTGKv0hU5O7HEH1ev6t/s2u/UG6h",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"TqEsYrVp0CMHpt5uAF6nZyK6GZ/CHTxh/rz1hADMofem59+e6tVtjnPGA3EjnJT8",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"BMOw/D2QIDxjxj2GUzz+YJp50ENhWrL9oSDkG2nzv4NVL77QIy+T/2/f4PgokUDO",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"QJjIfxPWE40cHGHpnQtZvEPoxP0H3T0YhmEVwuJxX3uaWOY/8Fa1c7Ln0SwWdfV5",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"gYvJV8o6c3sumcq1O3agPDlHC5O4IxG7AZQ8CHRDyASogzfkY6P579ZOGYaO4al7",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"WA1YIpsHs3/1f4SByMuWe0NVkFfvXckjpqGrBQpTmqQzk6baa0VQ0cwU3XlkwHac",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"WB/fQ4jylwFzZDcp5JAo53n6aU72zgNvDlGTNKwdXXZI5U3JPocH0AiZgFFWYJLd",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"63PJLDnjyE3i6XMVlxifXKkXVv0RYSz+ByS7Oz9aCgnQhNU8ycv+UxtfkPQih5zE",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"/0Y2EEFknajmFJpNXczzF8OEzaswmR0AOjcCiklZKRf61rf5faJxJhhqKEEBJuL6",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"oodDVRk3OGU1yQSBazT8nK3V+e6FMo3tWkra2BXFCD+pKxTy014Cp59S1w6F1Fjt",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"WX7eMWSLWfQ56j2kLMBHq5gb2arqlqH3fsYOTD3TNjCYF3Sgx309kVPuOK5vw61P",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"pnL/LN3iGY42WR+9lfAyNN2qj9zvwKwscyYs5+DPQoPmcPcVGc3v/u66bLcOGbEU",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"OlGa/6gdD4GCp5E4fP/7GbnEY/PW2abquFhGB+pVdl3/4+1U/8kItlfWNZoG4FhE",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"gjMd7glmrdFiNJFFpf5ks1lVXGqJ4mZxqtEZrxUEwciZjm4V27a+E2KyV9NnksZ6",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"xF4tGPKIPsvNTV5o8ZqjiacxgbYmr2ywqDXKCgpU/RWSh1sLapqSQqbH/w0MquUj",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"VhVX0RMYH/foKtjagZf/KO1/mnCITl86treIdachGgR4wr/qqMjrpPUaPLCRY3JQ",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"00XUP1Mu6YPE0SnMYAVxZheqKHly3a1pg4Xp7YWlM671oUORs3+VENfnbIxgr+2D",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"TiJT9PxwpfK53Oh7RBSWHJZRuAdLUXE8DG+bl0N/QkJM6pFUxTI1AQ==",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"-----END RSA PRIVATE KEY-----",bCrlf); // The actual password for the above PEM is "passwd". success = CkPrivateKeyW_LoadEncryptedPem(privKey,CkStringBuilderW_getAsString(sbPem),L"passwd"); if (success != TRUE) { wprintf(L"%s\n",CkPrivateKeyW_lastErrorText(privKey)); CkPrivateKeyW_Dispose(privKey); CkStringBuilderW_Dispose(sbPem); return; } // Generate the JWK thumbprint: wprintf(L"JWK thumbprint: %s\n",CkPrivateKeyW_getJwkThumbprint(privKey,L"SHA256")); // Output: // JWK thumbprint: QzUpUAW1Y5iksGxq3r1o3JMROR6D7FLwvRlHmDQVg0I // -------------------------------------------------------------- // Now let's do an EC private key. The following is an unencrypted PEM containing a 384-bit EC key.. CkStringBuilderW_Clear(sbPem); CkStringBuilderW_AppendLine(sbPem,L"-----BEGIN PRIVATE KEY-----",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"MIG2AgEAMBAGByqGSM49AgEGBSuBBAAiBIGeMIGbAgEBBDAamStb0Xep3y3sWw2u",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"SSAdUPkgQ9Rvhlnx8XEVOYy2teh69T0on77ja02m03n8t8WhZANiAARUNSar38Rz",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"lKPyZFsNSGUanzpNRth0C+MikVEH8FAlDHMMpAs34dyF4IK0uxgbiEe9bQ+ieLrl",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"6xwFR0yaTivuwoyXC+ScGUnwnpaXmid6UUgw4ypbneHsaKuZ9JLdMAo=",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"-----END PRIVATE KEY-----",bCrlf); success = CkPrivateKeyW_LoadPem(privKey,CkStringBuilderW_getAsString(sbPem)); if (success != TRUE) { wprintf(L"%s\n",CkPrivateKeyW_lastErrorText(privKey)); CkPrivateKeyW_Dispose(privKey); CkStringBuilderW_Dispose(sbPem); return; } // Generate the JWK thumbprint: wprintf(L"JWK thumbprint: %s\n",CkPrivateKeyW_getJwkThumbprint(privKey,L"SHA256")); // Output: // JWK thumbprint: ABAUUfNSONFsZYvZ_o_0bsPT3qeG3jttXB09VC_ETWQ CkPrivateKeyW_Dispose(privKey); CkStringBuilderW_Dispose(sbPem); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.