Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Sign Manifest File to Generate a Passbook .pkpass fileDemonstrates how to create a Passbook .pkpass archive by creating a signature of a manifest file and then zipping to a .pkpass archive.
#include <C_CkJsonObjectW.h> #include <C_CkCrypt2W.h> #include <C_CkZipW.h> #include <C_CkStringBuilderW.h> #include <C_CkXmlCertVaultW.h> #include <C_CkCertW.h> void ChilkatSample(void) { BOOL success; HCkJsonObjectW manifest; HCkCrypt2W crypt; HCkZipW zip; const wchar_t *fileHash; const wchar_t *filePath; HCkStringBuilderW sbJson; const wchar_t *manifestPath; HCkXmlCertVaultW certVault; HCkCertW appleWwdrCert; const wchar_t *pfxPath; const wchar_t *pfxPassword; HCkCertW cert; HCkJsonObjectW jsonSignedAttrs; const wchar_t *sigPath; // Note: Requires Chilkat v9.5.0.75 or greater. // This requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // --------------------------------------------------------------------------------------------- // Note: Chilkat also has the capability to do everything in-memory (no files would be involved). // See this example: Sign Manifest File to Generate a Passbook .pkpass in Memory // --------------------------------------------------------------------------------------------- // First create the manifest.json manifest = CkJsonObjectW_Create(); crypt = CkCrypt2W_Create(); zip = CkZipW_Create(); CkZipW_NewZip(zip,L"qa_data/p7s/pass-wallet/example.pkpass"); // Set the AppendFromDir property to prevent that relative paths from being stored in the .pkpass archive. CkZipW_putAppendFromDir(zip,L"qa_data/p7s/pass-wallet/"); CkCrypt2W_putHashAlgorithm(crypt,L"sha1"); // Return hashes as lowercase hex. CkCrypt2W_putEncodingMode(crypt,L"hexlower"); filePath = L"qa_data/p7s/pass-wallet/icon.png"; fileHash = CkCrypt2W_hashFileENC(crypt,filePath); CkZipW_AppendOneFileOrDir(zip,L"icon.png",FALSE); CkJsonObjectW_UpdateString(manifest,L"\"icon.png\"",fileHash); filePath = L"qa_data/p7s/pass-wallet/icon@2x.png"; fileHash = CkCrypt2W_hashFileENC(crypt,filePath); CkZipW_AppendOneFileOrDir(zip,L"icon@2x.png",FALSE); CkJsonObjectW_UpdateString(manifest,L"\"icon@2x.png\"",fileHash); filePath = L"qa_data/p7s/pass-wallet/logo.png"; fileHash = CkCrypt2W_hashFileENC(crypt,filePath); CkZipW_AppendOneFileOrDir(zip,L"logo.png",FALSE); CkJsonObjectW_UpdateString(manifest,L"\"logo.png\"",fileHash); filePath = L"qa_data/p7s/pass-wallet/logo@2x.png"; fileHash = CkCrypt2W_hashFileENC(crypt,filePath); CkZipW_AppendOneFileOrDir(zip,L"logo@2x.png",FALSE); CkJsonObjectW_UpdateString(manifest,L"\"logo@2x.png\"",fileHash); filePath = L"qa_data/p7s/pass-wallet/pass.json"; fileHash = CkCrypt2W_hashFileENC(crypt,filePath); CkZipW_AppendOneFileOrDir(zip,L"pass.json",FALSE); CkJsonObjectW_UpdateString(manifest,L"\"pass.json\"",fileHash); sbJson = CkStringBuilderW_Create(); CkJsonObjectW_EmitSb(manifest,sbJson); manifestPath = L"qa_data/p7s/pass-wallet/manifest.json"; CkStringBuilderW_WriteFile(sbJson,manifestPath,L"utf-8",FALSE); CkZipW_AppendOneFileOrDir(zip,L"manifest.json",FALSE); // Make sure we have the Apple WWDR intermediate certificate available for // the cert chain in the signature. certVault = CkXmlCertVaultW_Create(); appleWwdrCert = CkCertW_Create(); success = CkCertW_LoadByCommonName(appleWwdrCert,L"Apple Worldwide Developer Relations Certification Authority"); if (success != TRUE) { wprintf(L"The Apple WWDR intermediate certificate is not installed.\n"); wprintf(L"It is available at https://developer.apple.com/certificationauthority/AppleWWDRCA.cer\n"); wprintf(L"You may alternatively load the .cer like this...\n"); success = CkCertW_LoadFromFile(appleWwdrCert,L"qa_data/certs/AppleWWDRCA.cer"); if (success != TRUE) { wprintf(L"%s\n",CkCertW_lastErrorText(appleWwdrCert)); CkJsonObjectW_Dispose(manifest); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkStringBuilderW_Dispose(sbJson); CkXmlCertVaultW_Dispose(certVault); CkCertW_Dispose(appleWwdrCert); return; } } CkXmlCertVaultW_AddCert(certVault,appleWwdrCert); CkCrypt2W_UseCertVault(crypt,certVault); // Use a digital certificate and private key from a PFX file (.pfx or .p12). pfxPath = L"qa_data/pfx/cert_test123.pfx"; pfxPassword = L"test123"; cert = CkCertW_Create(); success = CkCertW_LoadPfxFile(cert,pfxPath,pfxPassword); if (success != TRUE) { wprintf(L"%s\n",CkCertW_lastErrorText(cert)); CkJsonObjectW_Dispose(manifest); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkStringBuilderW_Dispose(sbJson); CkXmlCertVaultW_Dispose(certVault); CkCertW_Dispose(appleWwdrCert); CkCertW_Dispose(cert); return; } // Provide the signing cert (with associated private key). success = CkCrypt2W_SetSigningCert(crypt,cert); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkJsonObjectW_Dispose(manifest); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkStringBuilderW_Dispose(sbJson); CkXmlCertVaultW_Dispose(certVault); CkCertW_Dispose(appleWwdrCert); CkCertW_Dispose(cert); return; } // Specify the signed attributes to be included. // (These attributes appear to not be necessary, but we're including // them just in case they become necessary in the future.) jsonSignedAttrs = CkJsonObjectW_Create(); CkJsonObjectW_UpdateInt(jsonSignedAttrs,L"contentType",1); CkJsonObjectW_UpdateInt(jsonSignedAttrs,L"signingTime",1); CkCrypt2W_putSigningAttributes(crypt,CkJsonObjectW_emit(jsonSignedAttrs)); // Sign the manifest JSON file to produce a file named "signature". sigPath = L"qa_data/p7s/pass-wallet/signature"; // Create the "signature" file. success = CkCrypt2W_CreateP7S(crypt,manifestPath,sigPath); if (success == FALSE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkJsonObjectW_Dispose(manifest); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkStringBuilderW_Dispose(sbJson); CkXmlCertVaultW_Dispose(certVault); CkCertW_Dispose(appleWwdrCert); CkCertW_Dispose(cert); CkJsonObjectW_Dispose(jsonSignedAttrs); return; } CkZipW_AppendOneFileOrDir(zip,L"signature",FALSE); // --------------------------------------------------------------------------------------------- // Note: Chilkat also has the capability to do everything in-memory (no files would be involved). // If this is of interest, please send email to support@chilkatsoft.com // --------------------------------------------------------------------------------------------- // Create the .pkipass archive (which is a .zip archive containing the required files). success = CkZipW_WriteZipAndClose(zip); if (success != TRUE) { wprintf(L"%s\n",CkZipW_lastErrorText(zip)); CkJsonObjectW_Dispose(manifest); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkStringBuilderW_Dispose(sbJson); CkXmlCertVaultW_Dispose(certVault); CkCertW_Dispose(appleWwdrCert); CkCertW_Dispose(cert); CkJsonObjectW_Dispose(jsonSignedAttrs); return; } wprintf(L"Success.\n"); CkJsonObjectW_Dispose(manifest); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkStringBuilderW_Dispose(sbJson); CkXmlCertVaultW_Dispose(certVault); CkCertW_Dispose(appleWwdrCert); CkCertW_Dispose(cert); CkJsonObjectW_Dispose(jsonSignedAttrs); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.