Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) RSASSA-PSS Sign String to Create Base64 PCKS7 SignatureSigns a string to create a PKCS7 signature in the base64 encoding. The signature algorithm is RSASSA-PSS with SHA256. Note: This example requires Chilkat v9.5.0.67 or greater.
#include <C_CkCrypt2W.h> #include <C_CkPfxW.h> #include <C_CkCertW.h> void ChilkatSample(void) { HCkCrypt2W crypt; HCkPfxW pfx; BOOL success; HCkCertW cert; const wchar_t *originalText; const wchar_t *pkcs7sig; const wchar_t *opaqueSig; const wchar_t *origTxt; // This example requires the Chilkat Crypt API to have been previously unlocked. // See Unlock Chilkat Crypt for sample code. crypt = CkCrypt2W_Create(); // Get a digital certificate with private key from a .pfx // (Chilkat has many different ways to provide a cert + private key for siging. // Using a PFX is just one possible option.) pfx = CkPfxW_Create(); success = CkPfxW_LoadPfxFile(pfx,L"qa_data/rsassa-pss/privatekey.pfx",L"PFX_PASSWORD"); if (success != TRUE) { wprintf(L"%s\n",CkPfxW_lastErrorText(pfx)); CkCrypt2W_Dispose(crypt); CkPfxW_Dispose(pfx); return; } // Get the certificate to be used for signing. // (The typical case for a PFX is that it contains a cert with an associated private key, // as well as other certificates in the chain of authentication. The cert with the private // key should be in the first position at index 0.) cert = CkPfxW_GetCert(pfx,0); if (CkPfxW_getLastMethodSuccess(pfx) != TRUE) { wprintf(L"%s\n",CkPfxW_lastErrorText(pfx)); CkCrypt2W_Dispose(crypt); CkPfxW_Dispose(pfx); return; } CkCrypt2W_SetSigningCert(crypt,cert); // Indicate that RSASSA-PSS with SHA256 should be used. CkCrypt2W_putSigningAlg(crypt,L"pss"); CkCrypt2W_putHashAlgorithm(crypt,L"sha256"); CkCrypt2W_putEncodingMode(crypt,L"base64"); // Sign a string and return the base64 PKCS7 detached signature originalText = L"This is a test"; pkcs7sig = CkCrypt2W_signStringENC(crypt,originalText); wprintf(L"Detached Signature:\n"); wprintf(L"%s\n",pkcs7sig); // This signature looks like this: // MIIG5wYJKoZIhvcNAQcCoIIG2DCCBtQCAQExDzANBgl .. YToLqEwTdU87ox5g7rvw== // The ASN.1 of the signature can be examined by browsing to https://lapo.it/asn1js/ , // then copy-and-paste the Base64 signature into the form and decode.. // The signature can be verified against the original data like this: success = CkCrypt2W_VerifyStringENC(crypt,originalText,pkcs7sig); wprintf(L"Signature verified: %d\n",success); success = CkCrypt2W_VerifyStringENC(crypt,L"Not the original text",pkcs7sig); wprintf(L"Signature verified: %d\n",success); // Now we'll create an opaque signature (the opposite of a detached signature). // An opaque signature is a PKCS7 message that contains both the original data and // the signature. The verification process extracts the original data. opaqueSig = CkCrypt2W_opaqueSignStringENC(crypt,originalText); wprintf(L"Opaque Signature:\n"); wprintf(L"%s\n",opaqueSig); // The ASN.1 of the signature can be examined by browsing to https://lapo.it/asn1js/ , // then copy-and-paste the Base64 signature into the form and decode.. // We can verify and extract the original data: origTxt = CkCrypt2W_opaqueVerifyStringENC(crypt,opaqueSig); if (CkCrypt2W_getLastMethodSuccess(crypt) != TRUE) { wprintf(L"Signature verification failed.\n"); wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkCertW_Dispose(cert); CkCrypt2W_Dispose(crypt); CkPfxW_Dispose(pfx); return; } wprintf(L"Signature verified.\n"); wprintf(L"Extracted text:%s\n",origTxt); CkCertW_Dispose(cert); CkCrypt2W_Dispose(crypt); CkPfxW_Dispose(pfx); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.