Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Decrypt a SAML ResponseDemonstrates how to decrypt a SAML response. Note: This example requires Chilkat v9.5.0.76 or greater.
#include <C_CkHttpW.h> #include <C_CkStringBuilderW.h> #include <C_CkXmlW.h> #include <C_CkPrivateKeyW.h> #include <C_CkRsaW.h> #include <C_CkBinDataW.h> #include <C_CkCrypt2W.h> void ChilkatSample(void) { HCkHttpW http; HCkStringBuilderW sbSamlResponse; HCkStringBuilderW sbPrivateKeyPem; BOOL success; HCkXmlW xml; HCkPrivateKeyW privkey; HCkRsaW rsa; const wchar_t *encryptedAesKey; HCkBinDataW bdAesKey; HCkStringBuilderW sbRsaAlg; const wchar_t *encrypted64; HCkBinDataW bdEncrypted; HCkCrypt2W crypt; HCkStringBuilderW sbAlg; const wchar_t *decryptedXml; HCkXmlW xmlAssertion; HCkXmlW xmlEncryptedAssertion; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // This example decrypts this SAML response: // <?xml version="1.0" encoding="UTF-8" ?> // <saml2p:Response Destination="https://deskflow-asp2.com/ubc/ubcdfe.dll/cwlacs" ID="_e4585eaeedbcaf7c24dff7f1ee2499f5" IssueInstant="2018-10-11T17:46:20.727Z" Version="2.0" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"> // <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://authentication.stg.id.ubc.ca</saml2:Issuer> // <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> // <ds:SignedInfo> // <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> // <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/> // <ds:Reference URI="#_e4585eaeedbcaf7c24dff7f1ee2499f5"> // <ds:Transforms> // <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/> // <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> // </ds:Transforms> // <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/> // <ds:DigestValue>1ui22tqFyYEOoWI19CMwz4n+ynxNjLDGdTeRMdi60EU=</ds:DigestValue> // </ds:Reference> // </ds:SignedInfo> // <ds:SignatureValue>ROg7FXV6vsp8socVhdo76/i7cRHGGKIveAiScKdujZT0QrHVqIvvbZ/RnwvEMJ9H9i/kJFAQA171 // Eo2kDjSdvNFQ/YcKaJUwMtAwT05yVatGV42RZKEf7ME+vpcCTR1LWZdrhat1FWCg1MNQwNWB0EL5 // fEP2a4jAcSTB8tFbjTAHsv7IWC39E5RVv99mACYXLa7iGZLtORANZxgYu5qQgmH6pUkI6Z1cpmf+ // m9mIjKM6LF0EvLfWOBWL6udZ+GsHPOLjVTJg+1S0xb9FQCYDVW1QhbjSS0icKHKTNNbrsaxllVDY // m4q27YQjRh+XxugPgvsZ61Pxlto8Jbg+6jUlMQ==</ds:SignatureValue> // <ds:KeyInfo> // <ds:X509Data> // <ds:X509Certificate>MIIDTTCCAjWgAwIBAgIVAJccYyIV6wly8XyddumpgnHMJ2JLMA0GCSqGSIb3DQEBCwUAMCcxJTAj // BgNVBAMMHGF1dGhlbnRpY2F0aW9uLnN0Zy5pZC51YmMuY2EwHhcNMTcwMzAxMTk1NDM0WhcNMzcw // ... // xUuh6HuHKIwQqHBz7udxbH3Zbb6jXGDJjiDHt1LRJ8xbVisFIcDlIwsGQQi0HeEJfx4P</ds:X509Certificate> // </ds:X509Data> // </ds:KeyInfo> // </ds:Signature> // <saml2p:Status> // <saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/> // </saml2p:Status> // <saml2:EncryptedAssertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"> // <xenc:EncryptedData Id="_314d80b9cf02d8eda8d686a6ffd626cf" Type="http://www.w3.org/2001/04/xmlenc#Element" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"> // <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"/> // <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> // <xenc:EncryptedKey Id="_d7b6da6fb59a627ebb4a96928441ab79" Recipient="https://ubcdfe.deskflow-asp2.com" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"> // <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"> // <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"/> // </xenc:EncryptionMethod> // <ds:KeyInfo> // <ds:X509Data> // <ds:X509Certificate>MIICuzCCAiQCCQD3bpigRnKMSzANBgkqhkiG9w0BAQsFADCBoTELMAkGA1UEBhMCQ0ExEDAOBgNV // BAgMB09udGFyaW8xEDAOBgNVBAcMB1Rvcm9udG8xJjAkBgNVBAoMHVRhY3RpY2FsIEJ1c2luZXNz // ... // kVRcHd1UK3q7G8FoykWjdQz/0EoMTfEZ+Md56mLOe48eMUZV2ONZuL1kDCEKw1UwkaDQI4Pf8pzx // 82b9rgw9wBDtvu5eFPlUGEGIBw==</ds:X509Certificate> // </ds:X509Data> // </ds:KeyInfo> // <xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"> // <xenc:CipherValue>BNHfUOpgdPE5BgpN2VIZIDthMAv1rxk91qVnWyCZOG9bmUKChJtTUqMpndot7VJwYuyKFshkAdnT // D79KGdlSA1xHKcVeZXXzDWglqSyYjzhDCsyOhPaI4HelMFgCLwyFz89uEpUpqlvfl8ol3Am/XnzQ // Vp7V7oS76hocjUI51Qs=</xenc:CipherValue> // </xenc:CipherData> // </xenc:EncryptedKey> // </ds:KeyInfo> // <xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"> // <xenc:CipherValue>R6l7tmbnXrOfBgB8lA3KnwLYsLH5ZO5omQ7Hp5K05atzw2o55xmCXVMYhNneFxMtxUh6raEyHeZX // PTZNgWrvdqc4GYND/R7MhRrJzk9OAq1WyoOXwbtRpwNDwWA4N2IuprPQJbvjVxaw/PesZMZwZqlp // ... // zm9zAxahyu8Ooe8M4r3HN2cY0JxxxkZtDiulbnyA+rRtXfBRJtangvFQ4iFAnzM/Yg9hMyW9jcu0 // S7FzuRB9ONMxi+nh0IFWgqp+</xenc:CipherValue> // </xenc:CipherData> // </xenc:EncryptedData> // </saml2:EncryptedAssertion> // </saml2p:Response> // The sample encrypted SAML response and RSA private key are available online: http = CkHttpW_Create(); sbSamlResponse = CkStringBuilderW_Create(); sbPrivateKeyPem = CkStringBuilderW_Create(); success = CkHttpW_QuickGetSb(http,L"https://chilkatdownload.com/data/samlresponse.xml",sbSamlResponse); if (success == TRUE) { success = CkHttpW_QuickGetSb(http,L"https://chilkatdownload.com/data/samlresponse_privkey.pem",sbPrivateKeyPem); } if (success != TRUE) { wprintf(L"%s\n",CkHttpW_lastErrorText(http)); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); return; } xml = CkXmlW_Create(); CkXmlW_LoadSb(xml,sbSamlResponse,TRUE); // Load the RSA private key.. privkey = CkPrivateKeyW_Create(); success = CkPrivateKeyW_LoadPem(privkey,CkStringBuilderW_getAsString(sbPrivateKeyPem)); if (success != TRUE) { wprintf(L"%s\n",CkPrivateKeyW_lastErrorText(privkey)); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); return; } // Prepare an RSA object w/ the private key... rsa = CkRsaW_Create(); success = CkRsaW_ImportPrivateKeyObj(rsa,privkey); if (success != TRUE) { wprintf(L"%s\n",CkRsaW_lastErrorText(rsa)); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); CkRsaW_Dispose(rsa); return; } // RSA will be used to decrypt the xenc:EncryptedKey // The bytes to be decrypted are in xenc:CipherValue (in base64 format) encryptedAesKey = CkXmlW_getChildContent(xml,L"saml2:EncryptedAssertion|xenc:EncryptedData|ds:KeyInfo|xenc:EncryptedKey|xenc:CipherData|xenc:CipherValue"); if (CkXmlW_getLastMethodSuccess(xml) != TRUE) { wprintf(L"Encrypted AES key not found.\n"); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); CkRsaW_Dispose(rsa); return; } wprintf(L"Encrypted AES key (base64) = %s\n",encryptedAesKey); bdAesKey = CkBinDataW_Create(); CkBinDataW_AppendEncoded(bdAesKey,encryptedAesKey,L"base64"); sbRsaAlg = CkStringBuilderW_Create(); CkStringBuilderW_Append(sbRsaAlg,CkXmlW_chilkatPath(xml,L"saml2:EncryptedAssertion|xenc:EncryptedData|ds:KeyInfo|xenc:EncryptedKey|xenc:EncryptionMethod|(Algorithm)")); wprintf(L"sbRsaAlg contains: %s\n",CkStringBuilderW_getAsString(sbRsaAlg)); if (CkStringBuilderW_Contains(sbRsaAlg,L"rsa-oaep",TRUE) == TRUE) { CkRsaW_putOaepPadding(rsa,TRUE); } // Note: The DecryptBd method is introduced in Chilkat v9.5.0.76 success = CkRsaW_DecryptBd(rsa,bdAesKey,TRUE); if (success != TRUE) { wprintf(L"%s\n",CkRsaW_lastErrorText(rsa)); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); CkRsaW_Dispose(rsa); CkBinDataW_Dispose(bdAesKey); CkStringBuilderW_Dispose(sbRsaAlg); return; } wprintf(L"Decrypted AES key (hex) = %s\n",CkBinDataW_getEncoded(bdAesKey,L"hex")); // Get the encrypted XML (in base64) to be decrypted w/ the AES key. encrypted64 = CkXmlW_getChildContent(xml,L"saml2:EncryptedAssertion|xenc:EncryptedData|xenc:CipherData|xenc:CipherValue"); if (CkXmlW_getLastMethodSuccess(xml) != TRUE) { wprintf(L"Encrypted data not found.\n"); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); CkRsaW_Dispose(rsa); CkBinDataW_Dispose(bdAesKey); CkStringBuilderW_Dispose(sbRsaAlg); return; } bdEncrypted = CkBinDataW_Create(); CkBinDataW_AppendEncoded(bdEncrypted,encrypted64,L"base64"); // Get the symmetric algorithm: "http://www.w3.org/2001/04/xmlenc#aes128-cbc" // and set the symmetric decrypt properties. crypt = CkCrypt2W_Create(); sbAlg = CkStringBuilderW_Create(); CkStringBuilderW_Append(sbAlg,CkXmlW_chilkatPath(xml,L"saml2:EncryptedAssertion|xenc:EncryptedData|xenc:EncryptionMethod|(Algorithm)")); if (CkStringBuilderW_Contains(sbAlg,L"aes128-cbc",TRUE) == TRUE) { CkCrypt2W_putCryptAlgorithm(crypt,L"aes"); CkCrypt2W_putKeyLength(crypt,128); CkCrypt2W_putCipherMode(crypt,L"cbc"); // The 1st 16 bytes of the encrypted data are the AES IV. CkCrypt2W_SetEncodedIV(crypt,CkBinDataW_getEncodedChunk(bdEncrypted,0,16,L"hex"),L"hex"); CkBinDataW_RemoveChunk(bdEncrypted,0,16); } // Other algorithms, key lengths, etc, can be supported by checking for different Algorithm attribute values.. CkCrypt2W_SetEncodedKey(crypt,CkBinDataW_getEncoded(bdAesKey,L"hex"),L"hex"); // AES decrypt... success = CkCrypt2W_DecryptBd(crypt,bdEncrypted); if (success != TRUE) { wprintf(L"%s\n",CkCrypt2W_lastErrorText(crypt)); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); CkRsaW_Dispose(rsa); CkBinDataW_Dispose(bdAesKey); CkStringBuilderW_Dispose(sbRsaAlg); CkBinDataW_Dispose(bdEncrypted); CkCrypt2W_Dispose(crypt); CkStringBuilderW_Dispose(sbAlg); return; } // Get the decrypted XML decryptedXml = CkBinDataW_getString(bdEncrypted,L"utf-8"); wprintf(L"Decrypted XML:\n"); wprintf(L"%s\n",decryptedXml); // The decrypted XML looks like this: // <saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" ID="_226e565c548db7986d165d7d969b48b4" IssueInstant="2018-10-11T17:46:20.727Z" Version="2.0"> // ... // ... // ... // </saml2:Assertion> xmlAssertion = CkXmlW_Create(); CkXmlW_LoadXml(xmlAssertion,decryptedXml); // Replace the saml2:EncryptedAssertion XML subtree with the saml2:Assertion XML. xmlEncryptedAssertion = CkXmlW_FindChild(xml,L"saml2:EncryptedAssertion"); CkXmlW_SwapTree(xmlEncryptedAssertion,xmlAssertion); CkXmlW_Dispose(xmlEncryptedAssertion); // The decrypted XML assertion has now replaced the encrypted XML assertion. // Examine the fully decrypted XML document: wprintf(L"Full XML SAML document with decrypted assertion:\n"); wprintf(L"%s\n",CkXmlW_getXml(xml)); CkHttpW_Dispose(http); CkStringBuilderW_Dispose(sbSamlResponse); CkStringBuilderW_Dispose(sbPrivateKeyPem); CkXmlW_Dispose(xml); CkPrivateKeyW_Dispose(privkey); CkRsaW_Dispose(rsa); CkBinDataW_Dispose(bdAesKey); CkStringBuilderW_Dispose(sbRsaAlg); CkBinDataW_Dispose(bdEncrypted); CkCrypt2W_Dispose(crypt); CkStringBuilderW_Dispose(sbAlg); CkXmlW_Dispose(xmlAssertion); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.