Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) RSA Encrypt Hash using SHA256 hash function and SHA1 mask functionNote: This example requires a feature introduced in Chilkat v9.5.0.66 How can this Javascript be duplicated using Chilkat? function a(e, t) { var r = s.pki.publicKeyFromPem(e) , n = r.encrypt(t, "RSA-OAEP", { md: s.md.sha256.create(), mgf1: { md: s.md.sha1.create() } }); return s.util.encode64(n) } Note: The OAEP padding uses random bytes in the padding, and therefore each time encryption happens, even using the same data and key, the result will be different -- but still valid. One should not expect to get the same output.
#include <C_CkPublicKeyW.h> #include <C_CkStringBuilderW.h> #include <C_CkCrypt2W.h> #include <C_CkRsaW.h> void ChilkatSample(void) { HCkPublicKeyW pubkey; HCkStringBuilderW sbPem; BOOL bCrlf; BOOL success; const wchar_t *originalData; HCkCrypt2W crypt; const wchar_t *hashBase64; HCkRsaW rsa; BOOL bUsePrivateKey; const wchar_t *encryptedStr; // Note: This example requires a feature introduced in Chilkat v9.5.0.66 // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. pubkey = CkPublicKeyW_Create(); sbPem = CkStringBuilderW_Create(); bCrlf = TRUE; CkStringBuilderW_AppendLine(sbPem,L"-----BEGIN PUBLIC KEY-----",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA33TqqLR3eeUmDtHS89qF",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"3p4MP7Wfqt2Zjj3lZjLjjCGDvwr9cJNlNDiuKboODgUiT4ZdPWbOiMAfDcDzlOxA",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"04DDnEFGAf+kDQiNSe2ZtqC7bnIc8+KSG/qOGQIVaay4Ucr6ovDkykO5Hxn7OU7s",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"Jp9TP9H0JH8zMQA6YzijYH9LsupTerrY3U6zyihVEDXXOv08vBHk50BMFJbE9iwF",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"wnxCsU5+UZUZYw87Uu0n4LPFS9BT8tUIvAfnRXIEWCha3KbFWmdZQZlyrFw0buUE",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"f0YN3/Q0auBkdbDR/ES2PbgKTJdkjc/rEeM0TxvOUf7HuUNOhrtAVEN1D5uuxE1W",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"SwIDAQAB",bCrlf); CkStringBuilderW_AppendLine(sbPem,L"-----END PUBLIC KEY-----",bCrlf); // Load the public key object from the PEM. success = CkPublicKeyW_LoadFromString(pubkey,CkStringBuilderW_getAsString(sbPem)); if (success != TRUE) { wprintf(L"%s\n",CkPublicKeyW_lastErrorText(pubkey)); CkPublicKeyW_Dispose(pubkey); CkStringBuilderW_Dispose(sbPem); return; } originalData = L"This is the original data to be SHA-256 hashed and RSA encrypted."; // First we SHA-256 hash the original data to get the hash in base64 format: crypt = CkCrypt2W_Create(); CkCrypt2W_putHashAlgorithm(crypt,L"SHA-256"); CkCrypt2W_putEncodingMode(crypt,L"base64"); hashBase64 = CkCrypt2W_hashStringENC(crypt,originalData); // Setup RSA to use OAEP padding with SHA-1 for the mask function. rsa = CkRsaW_Create(); CkRsaW_putOaepPadding(rsa,TRUE); CkRsaW_putOaepHash(rsa,L"SHA1"); CkRsaW_ImportPublicKeyObj(rsa,pubkey); CkRsaW_putEncodingMode(rsa,L"base64"); // Starting in v9.5.0.66, we can provide a binary encoding mode, such as "base64", "hex", "base64url", etc. // for the Charset property. The Charset property was previously limited to character encodings, such as // "utf-8", "iso-8859-1", etc. If a binary encoding is used, then the string passed in is decoded to the binary // bytes as indicated. (If an actual charset, such as "utf-8" is used, then the input string is converted to the // byte representation of the charset, and then encrypted.) // Given that a hash is composed of non-text binary bytes, we'll set the Charset property equal to "base64" // (because we have the base64 hash from above). CkRsaW_putCharset(rsa,L"base64"); // Note: The OAEP padding uses random bytes in the padding, and therefore each time encryption happens, // even using the same data and key, the result will be different -- but still valid. One should not expect // to get the same output. bUsePrivateKey = FALSE; encryptedStr = CkRsaW_encryptStringENC(rsa,hashBase64,bUsePrivateKey); if (CkRsaW_getLastMethodSuccess(rsa) != TRUE) { wprintf(L"%s\n",CkRsaW_lastErrorText(rsa)); CkPublicKeyW_Dispose(pubkey); CkStringBuilderW_Dispose(sbPem); CkCrypt2W_Dispose(crypt); CkRsaW_Dispose(rsa); return; } wprintf(L"Base64 RSA encrypted output: %s\n",encryptedStr); CkPublicKeyW_Dispose(pubkey); CkStringBuilderW_Dispose(sbPem); CkCrypt2W_Dispose(crypt); CkRsaW_Dispose(rsa); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.