Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) JWS Using RSASSA-PSS using SHA-256 and MGF1 with SHA-256Creates and validates a JSON Web Signature (JWS) using RSASSA-PSS using SHA-256 and MGF1 with SHA-256. Chilkat supports all of the following JWS algorithms: +--------------+-------------------------------+--------------------+ | "alg" Param | Digital Signature or MAC | Implementation | | Value | Algorithm | Requirements | +--------------+-------------------------------+--------------------+ | HS256 | HMAC using SHA-256 | Required | | HS384 | HMAC using SHA-384 | Optional | | HS512 | HMAC using SHA-512 | Optional | | RS256 | RSASSA-PKCS1-v1_5 using | Recommended | | | SHA-256 | | | RS384 | RSASSA-PKCS1-v1_5 using | Optional | | | SHA-384 | | | RS512 | RSASSA-PKCS1-v1_5 using | Optional | | | SHA-512 | | | ES256 | ECDSA using P-256 and SHA-256 | Recommended+ | | ES384 | ECDSA using P-384 and SHA-384 | Optional | | ES512 | ECDSA using P-521 and SHA-512 | Optional | | PS256 | RSASSA-PSS using SHA-256 and | Optional | | | MGF1 with SHA-256 | | | PS384 | RSASSA-PSS using SHA-384 and | Optional | | | MGF1 with SHA-384 | | | PS512 | RSASSA-PSS using SHA-512 and | Optional | | | MGF1 with SHA-512 | | +--------------+-------------------------------+--------------------+ Note: This example requires Chilkat v9.5.0.66 or greater.
#include <C_CkStringBuilderW.h> #include <C_CkPrivateKeyW.h> #include <C_CkJsonObjectW.h> #include <C_CkJwsW.h> #include <C_CkPublicKeyW.h> void ChilkatSample(void) { HCkStringBuilderW sbJwk; HCkPrivateKeyW rsaKey; BOOL success; HCkJsonObjectW jwsProtHdr; HCkJwsW jws; int signatureIndex; BOOL bIncludeBom; const wchar_t *payloadStr; const wchar_t *jwsCompact; HCkJwsW jws2; HCkPublicKeyW rsaPubKey; int v; HCkJsonObjectW joseHeader; // This requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: This example requires Chilkat v9.5.0.66 or greater. // Use the following RSA key loaded from JWK format. sbJwk = CkStringBuilderW_Create(); CkStringBuilderW_Append(sbJwk,L"{\"kty\":\"RSA\","); CkStringBuilderW_Append(sbJwk,L"\"n\":\"ofgWCuLjybRlzo0tZWJjNiuSfb4p4fAkd_wWJcyQoTbji9k0l8W26mPddx"); CkStringBuilderW_Append(sbJwk,L"HmfHQp-Vaw-4qPCJrcS2mJPMEzP1Pt0Bm4d4QlL-yRT-SFd2lZS-pCgNMs"); CkStringBuilderW_Append(sbJwk,L"D1W_YpRPEwOWvG6b32690r2jZ47soMZo9wGzjb_7OMg0LOL-bSf63kpaSH"); CkStringBuilderW_Append(sbJwk,L"SXndS5z5rexMdbBYUsLA9e-KXBdQOS-UTo7WTBEMa2R2CapHg665xsmtdV"); CkStringBuilderW_Append(sbJwk,L"MTBQY4uDZlxvb3qCo5ZwKh9kG4LT6_I5IhlJH7aGhyxXFvUK-DWNmoudF8"); CkStringBuilderW_Append(sbJwk,L"NAco9_h9iaGNj8q2ethFkMLs91kzk2PAcDTW9gb54h4FRWyuXpoQ\","); CkStringBuilderW_Append(sbJwk,L"\"e\":\"AQAB\","); CkStringBuilderW_Append(sbJwk,L"\"d\":\"Eq5xpGnNCivDflJsRQBXHx1hdR1k6Ulwe2JZD50LpXyWPEAeP88vLNO97I"); CkStringBuilderW_Append(sbJwk,L"jlA7_GQ5sLKMgvfTeXZx9SE-7YwVol2NXOoAJe46sui395IW_GO-pWJ1O0"); CkStringBuilderW_Append(sbJwk,L"BkTGoVEn2bKVRUCgu-GjBVaYLU6f3l9kJfFNS3E0QbVdxzubSu3Mkqzjkn"); CkStringBuilderW_Append(sbJwk,L"439X0M_V51gfpRLI9JYanrC4D4qAdGcopV_0ZHHzQlBjudU2QvXt4ehNYT"); CkStringBuilderW_Append(sbJwk,L"CBr6XCLQUShb1juUO1ZdiYoFaFQT5Tw8bGUl_x_jTj3ccPDVZFD9pIuhLh"); CkStringBuilderW_Append(sbJwk,L"BOneufuBiB4cS98l2SR_RQyGWSeWjnczT0QU91p1DhOVRuOopznQ\","); CkStringBuilderW_Append(sbJwk,L"\"p\":\"4BzEEOtIpmVdVEZNCqS7baC4crd0pqnRH_5IB3jw3bcxGn6QLvnEtfdUdi"); CkStringBuilderW_Append(sbJwk,L"YrqBdss1l58BQ3KhooKeQTa9AB0Hw_Py5PJdTJNPY8cQn7ouZ2KKDcmnPG"); CkStringBuilderW_Append(sbJwk,L"BY5t7yLc1QlQ5xHdwW1VhvKn-nXqhJTBgIPgtldC-KDV5z-y2XDwGUc\","); CkStringBuilderW_Append(sbJwk,L"\"q\":\"uQPEfgmVtjL0Uyyx88GZFF1fOunH3-7cepKmtH4pxhtCoHqpWmT8YAmZxa"); CkStringBuilderW_Append(sbJwk,L"ewHgHAjLYsp1ZSe7zFYHj7C6ul7TjeLQeZD_YwD66t62wDmpe_HlB-TnBA"); CkStringBuilderW_Append(sbJwk,L"-njbglfIsRLtXlnDzQkv5dTltRJ11BKBBypeeF6689rjcJIDEz9RWdc\","); CkStringBuilderW_Append(sbJwk,L"\"dp\":\"BwKfV3Akq5_MFZDFZCnW-wzl-CCo83WoZvnLQwCTeDv8uzluRSnm71I3Q"); CkStringBuilderW_Append(sbJwk,L"CLdhrqE2e9YkxvuxdBfpT_PI7Yz-FOKnu1R6HsJeDCjn12Sk3vmAktV2zb"); CkStringBuilderW_Append(sbJwk,L"34MCdy7cpdTh_YVr7tss2u6vneTwrA86rZtu5Mbr1C1XsmvkxHQAdYo0\","); CkStringBuilderW_Append(sbJwk,L"\"dq\":\"h_96-mK1R_7glhsum81dZxjTnYynPbZpHziZjeeHcXYsXaaMwkOlODsWa"); CkStringBuilderW_Append(sbJwk,L"7I9xXDoRwbKgB719rrmI2oKr6N3Do9U0ajaHF-NKJnwgjMd2w9cjz3_-ky"); CkStringBuilderW_Append(sbJwk,L"NlxAr2v4IKhGNpmM5iIgOS1VZnOZ68m6_pbLBSp3nssTdlqvd0tIiTHU\","); CkStringBuilderW_Append(sbJwk,L"\"qi\":\"IYd7DHOhrWvxkwPQsRM2tOgrjbcrfvtQJipd-DlcxyVuuM9sQLdgjVk2o"); CkStringBuilderW_Append(sbJwk,L"y26F0EmpScGLq2MowX7fhd_QJQ3ydy5cY7YIBi87w93IKLEdfnbJtoOPLU"); CkStringBuilderW_Append(sbJwk,L"W0ITrJReOgo1cq9SbsxYawBgfp_gh6A5603k2-ZQwVK0JKSHuLFkuQ3U\""); CkStringBuilderW_Append(sbJwk,L"}"); rsaKey = CkPrivateKeyW_Create(); // Note: This example loads the RSA key from JWK format. Any format can be loaded // into the private key object. (See the online reference documentation..) success = CkPrivateKeyW_LoadJwk(rsaKey,CkStringBuilderW_getAsString(sbJwk)); if (success != TRUE) { wprintf(L"%s\n",CkPrivateKeyW_lastErrorText(rsaKey)); CkStringBuilderW_Dispose(sbJwk); CkPrivateKeyW_Dispose(rsaKey); return; } // Create the JWS Protected Header jwsProtHdr = CkJsonObjectW_Create(); CkJsonObjectW_AppendString(jwsProtHdr,L"alg",L"PS256"); jws = CkJwsW_Create(); // Set the protected header: signatureIndex = 0; CkJwsW_SetProtectedHeader(jws,signatureIndex,jwsProtHdr); // Set the RSA key: CkJwsW_SetPrivateKey(jws,signatureIndex,rsaKey); // Set the payload. bIncludeBom = FALSE; payloadStr = L"In our village, folks say God crumbles up the old moon into stars."; CkJwsW_SetPayload(jws,payloadStr,L"utf-8",bIncludeBom); // Create the JWS // By default, the compact serialization is used. jwsCompact = CkJwsW_createJws(jws); if (CkJwsW_getLastMethodSuccess(jws) != TRUE) { wprintf(L"%s\n",CkJwsW_lastErrorText(jws)); CkStringBuilderW_Dispose(sbJwk); CkPrivateKeyW_Dispose(rsaKey); CkJsonObjectW_Dispose(jwsProtHdr); CkJwsW_Dispose(jws); return; } wprintf(L"JWS: %s\n",jwsCompact); // Note: RSA PSS padding uses random values, so the output will be different each time a signature is produced. // sample output: // JWS: eyJhbGciOiJQUzI1NiJ9.SW4gb3VyIHZpbGxhZ2UsIGZvbGtzIHNheSBHb2QgY3J1bWJsZXMgdXAgdGhlIG9sZCBtb29uIGludG8gc3RhcnMu.TRWhwRo5dMv9-8OzrInfJTwmUGYgjLfHk8lqF072ND-FmLWEBnUTOpY8oJXp8FdWw2SalbdOeNlrtlJjwk4XK8Ql2iJ_2qMCtxsvLPhKBOqFoAF4aBvTOEDVJDxf0DaBSiydEEtfTVV2iwBcjWabu5J2XieR5y7QZQtuHsn7T3qKBvCcCejN3Y2oqAT3qMHvu1fTms1r_91wBn_K7Wjd9UkZ1n02qQcUHJznR_OF2BgN7_KWIDAF9ZS9keoju2NPpPelO4yxa2XUPnehY3G7dHKoCxUEQR4d2Xc5voqDASTVCDqQS4PVOZdvT3Ein6-SanAlCwbWBbkvT8g6-5PImQ // Now load the JWS, validate, and recover the original text. jws2 = CkJwsW_Create(); // Load the JWS. success = CkJwsW_LoadJws(jws2,jwsCompact); rsaPubKey = CkPrivateKeyW_GetPublicKey(rsaKey); // Set the RSA public key used for validation. signatureIndex = 0; CkJwsW_SetPublicKey(jws2,signatureIndex,rsaPubKey); CkPublicKeyW_Dispose(rsaPubKey); // Validate the 1st (and only) signature at index 0.. v = CkJwsW_Validate(jws2,signatureIndex); if (v < 0) { // Perhaps Chilkat was not unlocked or the trial expired.. wprintf(L"Method call failed for some other reason.\n"); wprintf(L"%s\n",CkJwsW_lastErrorText(jws2)); CkStringBuilderW_Dispose(sbJwk); CkPrivateKeyW_Dispose(rsaKey); CkJsonObjectW_Dispose(jwsProtHdr); CkJwsW_Dispose(jws); CkJwsW_Dispose(jws2); return; } if (v == 0) { wprintf(L"Invalid signature. The RSA key was incorrect, the JWS was invalid, or both.\n"); CkStringBuilderW_Dispose(sbJwk); CkPrivateKeyW_Dispose(rsaKey); CkJsonObjectW_Dispose(jwsProtHdr); CkJwsW_Dispose(jws); CkJwsW_Dispose(jws2); return; } // If we get here, the signature was validated.. wprintf(L"Signature validated.\n"); // Recover the original content: wprintf(L"%s\n",CkJwsW_getPayload(jws2,L"utf-8")); // Examine the protected header: joseHeader = CkJwsW_GetProtectedHeader(jws2,signatureIndex); if (CkJwsW_getLastMethodSuccess(jws2) != TRUE) { wprintf(L"No protected header found at the given index.\n"); CkStringBuilderW_Dispose(sbJwk); CkPrivateKeyW_Dispose(rsaKey); CkJsonObjectW_Dispose(jwsProtHdr); CkJwsW_Dispose(jws); CkJwsW_Dispose(jws2); return; } CkJsonObjectW_putEmitCompact(joseHeader,FALSE); wprintf(L"Protected (JOSE) header:\n"); wprintf(L"%s\n",CkJsonObjectW_emit(joseHeader)); CkJsonObjectW_Dispose(joseHeader); // Output: // Signature validated. // In our village, folks say God crumbles up the old moon into stars. // Protected (JOSE) header: // { // "alg": "PS256" // } CkStringBuilderW_Dispose(sbJwk); CkPrivateKeyW_Dispose(rsaKey); CkJsonObjectW_Dispose(jwsProtHdr); CkJwsW_Dispose(jws); CkJwsW_Dispose(jws2); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.