Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Validate a .pkpass ArchiveOpens a .pkpass archive (which is just a .zip renamed to .pkpass) and validates the contents. The hashes in the manifest are compared with the computed hash values for each individual file. If all computed hash values match, then the signature is verified.
#include <C_CkCrypt2W.h> #include <C_CkZipW.h> #include <C_CkZipEntryW.h> #include <C_CkBinDataW.h> #include <C_CkJsonObjectW.h> #include <C_CkStringBuilderW.h> void ChilkatSample(void) { HCkCrypt2W crypt; HCkZipW zip; BOOL success; HCkZipEntryW ent; HCkBinDataW bdManifest; HCkJsonObjectW json; BOOL someHashesFailed; const wchar_t *filename; HCkStringBuilderW sbHashHex; HCkBinDataW bdFileData; int numMembers; int i; const wchar_t *computedHashHex; HCkBinDataW bdSignature; BOOL verified; // This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. crypt = CkCrypt2W_Create(); zip = CkZipW_Create(); success = CkZipW_OpenZip(zip,L"qa_data/pkpass/invalid.pkpass"); if (success == FALSE) { wprintf(L"%s\n",CkZipW_lastErrorText(zip)); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); return; } // Get the contents of the manifest.json file, which contains something like this: // { // "icon.png" : "0296b01347b3173e98438a003b0e88986340b2d8", // "logo.png" : "25de09e2d3b01ce1fe00c2ca9a90a2be1aaa05cf", // "icon@2x.png" : "5afd9585b08c65fdf105a90c8bd643407cba2787", // "pass.json" : "145ea5a5db784fff485126c77ecf7a1fc2a88ee7", // "strip@2x.png" : "468fa7bc93e6b55342b56fda09bdce7c829d7d46", // "strip.png" : "736d01f84cb73d06e8a9932e43076d68f19461ff" // } ent = CkZipW_GetEntryByName(zip,L"manifest.json"); if (CkZipW_getLastMethodSuccess(zip) == FALSE) { wprintf(L"manifest.json entry not found.\n"); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); return; } // Get the exact content of the manifest.json for later signature verification. bdManifest = CkBinDataW_Create(); success = CkZipEntryW_UnzipToBd(ent,bdManifest); json = CkJsonObjectW_Create(); CkJsonObjectW_putEmitCompact(json,FALSE); CkJsonObjectW_Load(json,CkZipEntryW_unzipToString(ent,0,L"utf-8")); wprintf(L"%s\n",CkJsonObjectW_emit(json)); CkZipEntryW_Dispose(ent); // For each file in the JSON, get the filename and hex hash value. CkCrypt2W_putEncodingMode(crypt,L"hexlower"); CkCrypt2W_putHashAlgorithm(crypt,L"sha1"); someHashesFailed = FALSE; sbHashHex = CkStringBuilderW_Create(); bdFileData = CkBinDataW_Create(); numMembers = CkJsonObjectW_getSize(json); i = 0; while (i < numMembers) { filename = CkJsonObjectW_nameAt(json,i); CkStringBuilderW_Clear(sbHashHex); CkStringBuilderW_Append(sbHashHex,CkJsonObjectW_stringAt(json,i)); ent = CkZipW_GetEntryByName(zip,filename); if (CkZipW_getLastMethodSuccess(zip) == FALSE) { wprintf(L"%s not found in the pkpass file.\n",filename); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkBinDataW_Dispose(bdManifest); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbHashHex); CkBinDataW_Dispose(bdFileData); return; } // Get the data for this file. CkBinDataW_Clear(bdFileData); success = CkZipEntryW_UnzipToBd(ent,bdFileData); computedHashHex = CkCrypt2W_hashBdENC(crypt,bdFileData); if (CkStringBuilderW_ContentsEqual(sbHashHex,computedHashHex,FALSE) == FALSE) { wprintf(L"Computed hash does not match stored hash for %s\n",filename); wprintf(L" computed: %s\n",computedHashHex); wprintf(L" stored: %s\n",CkStringBuilderW_getAsString(sbHashHex)); someHashesFailed = TRUE; } else { wprintf(L"hash verified for %s(%s)\n",filename,computedHashHex); } CkZipEntryW_Dispose(ent); i = i + 1; } if (someHashesFailed == TRUE) { wprintf(L"Some hashes failed.\n"); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkBinDataW_Dispose(bdManifest); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbHashHex); CkBinDataW_Dispose(bdFileData); return; } // Let's verify the signature.. // First get the signature. ent = CkZipW_GetEntryByName(zip,L"signature"); if (CkZipW_getLastMethodSuccess(zip) == FALSE) { wprintf(L"signature not found in the pkpass file.\n"); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkBinDataW_Dispose(bdManifest); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbHashHex); CkBinDataW_Dispose(bdFileData); return; } bdSignature = CkBinDataW_Create(); success = CkZipEntryW_UnzipToBd(ent,bdSignature); CkZipEntryW_Dispose(ent); // Show the contents of the signature in base64 encoding. wprintf(L"Signature:\n"); wprintf(L"%s\n",CkBinDataW_getEncoded(bdSignature,L"base64_mime")); wprintf(L"----\n"); // Verify the signature against the manifest.json CkCrypt2W_putEncodingMode(crypt,L"base64"); verified = CkCrypt2W_VerifyBdENC(crypt,bdManifest,CkBinDataW_getEncoded(bdSignature,L"base64")); if (verified == FALSE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); } wprintf(L"signature verified = %d\n",verified); CkCrypt2W_Dispose(crypt); CkZipW_Dispose(zip); CkBinDataW_Dispose(bdManifest); CkJsonObjectW_Dispose(json); CkStringBuilderW_Dispose(sbHashHex); CkBinDataW_Dispose(bdFileData); CkBinDataW_Dispose(bdSignature); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.