Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) RFC3161 Timestamp Client - Fetch from Timestamp Authority (TSA) and VerifySends an RFC 3161 timestamp request to a TSA (Timestamp Authority) server and validates the timestamp token response. Note: This example requires Chilkat v9.5.0.75 or greater.
#include <C_CkCrypt2W.h> #include <C_CkHttpW.h> #include <C_CkBinDataW.h> #include <C_CkHttpResponseW.h> #include <C_CkCertW.h> #include <C_CkJsonObjectW.h> #include <C_CkDtObjW.h> void ChilkatSample(void) { BOOL success; HCkCrypt2W crypt; const wchar_t *base64Hash; HCkHttpW http; HCkBinDataW requestToken; const wchar_t *optionalPolicyOid; BOOL addNonce; BOOL requestTsaCert; const wchar_t *tsaUrl; HCkHttpResponseW resp; HCkBinDataW timestampReply; HCkCertW tsaCert; int pkiStatus; HCkJsonObjectW json; HCkDtObjW signingTime; HCkDtObjW authAttrSigningTimeUtctime; const wchar_t *strVal; const wchar_t *certSerialNumber; const wchar_t *certIssuerCN; const wchar_t *certDigestAlgOid; const wchar_t *certDigestAlgName; const wchar_t *contentType; const wchar_t *messageDigest; const wchar_t *signingAlgOid; const wchar_t *signingAlgName; const wchar_t *authAttrContentTypeName; const wchar_t *authAttrContentTypeOid; const wchar_t *authAttrSigningTimeName; const wchar_t *authAttrSigningCertificateName; const wchar_t *authAttrSigningCertificateDer; const wchar_t *authAttrMessageDigestName; const wchar_t *authAttrMessageDigestDigest; int timestampReplyPkiStatusValue; const wchar_t *timestampReplyPkiStatusMeaning; int i; int count_i; // Note: Requires Chilkat v9.5.0.75 or greater. // This requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // First sha-256 hash the data that is to be timestamped. // In this example, the data is the string "Hello World" crypt = CkCrypt2W_Create(); CkCrypt2W_putHashAlgorithm(crypt,L"sha256"); CkCrypt2W_putEncodingMode(crypt,L"base64"); base64Hash = CkCrypt2W_hashStringENC(crypt,L"Hello World"); http = CkHttpW_Create(); requestToken = CkBinDataW_Create(); optionalPolicyOid = L""; addNonce = FALSE; requestTsaCert = TRUE; // Create a time-stamp request token success = CkHttpW_CreateTimestampRequest(http,L"sha256",base64Hash,optionalPolicyOid,addNonce,requestTsaCert,requestToken); if (success != TRUE) { wprintf(L"%s\n",CkHttpW_lastErrorText(http)); CkCrypt2W_Dispose(crypt); CkHttpW_Dispose(http); CkBinDataW_Dispose(requestToken); return; } // Send the time-stamp request token to the TSA. // This is the equivalent of the following CURL command: // curl -H "Content-Type: application/timestamp-query" --data-binary '@file.tsq' https://freetsa.org/tsr > file.tsr tsaUrl = L"https://freetsa.org/tsr"; // Another timestamp server you could try is: http://timestamp.digicert.com tsaUrl = L"http://timestamp.digicert.com"; resp = CkHttpW_PBinaryBd(http,L"POST",tsaUrl,requestToken,L"application/timestamp-query",FALSE,FALSE); if (CkHttpW_getLastMethodSuccess(http) != TRUE) { wprintf(L"%s\n",CkHttpW_lastErrorText(http)); CkCrypt2W_Dispose(crypt); CkHttpW_Dispose(http); CkBinDataW_Dispose(requestToken); return; } // Get the timestamp reply from the HTTP response object. timestampReply = CkBinDataW_Create(); CkHttpResponseW_GetBodyBd(resp,timestampReply); CkHttpResponseW_Dispose(resp); // Show the base64 encoded timestamp reply. wprintf(L"%s\n",CkBinDataW_getEncoded(timestampReply,L"base64")); // Let's verify the timestamp reply against the TSA's cert, which we've previously downloaded. // See https://freetsa.org/index_en.php tsaCert = CkCertW_Create(); success = CkCertW_LoadFromFile(tsaCert,L"qa_data/certs/freetsa.org.cer"); if (success != TRUE) { wprintf(L"%s\n",CkCertW_lastErrorText(tsaCert)); CkCrypt2W_Dispose(crypt); CkHttpW_Dispose(http); CkBinDataW_Dispose(requestToken); CkBinDataW_Dispose(timestampReply); CkCertW_Dispose(tsaCert); return; } // The VerifyTimestampReply method will return one of the following values: // -1: The timestampReply does not contain a valid timestamp reply. // -2: The timestampReply is a valid timestamp reply, but failed verification using the public key of the tsaCert. // 0: Granted and verified. // 1: Granted and verified, with mods (see RFC 3161) // 2: Rejected. // 3: Waiting. // 4: Revocation Warning // 5: Revocation Notification pkiStatus = CkHttpW_VerifyTimestampReply(http,timestampReply,tsaCert); if (pkiStatus < 0) { wprintf(L"%s\n",CkHttpW_lastErrorText(http)); CkCrypt2W_Dispose(crypt); CkHttpW_Dispose(http); CkBinDataW_Dispose(requestToken); CkBinDataW_Dispose(timestampReply); CkCertW_Dispose(tsaCert); return; } wprintf(L"pkiStatus = %d\n",pkiStatus); json = CkHttpW_LastJsonData(http); CkJsonObjectW_putEmitCompact(json,FALSE); wprintf(L"%s\n",CkJsonObjectW_emit(json)); // The LastJsonData looks like the following. // Note: The "timestampReply.pkiStatus" portion of the LastJsonData was added in Chilkat v9.5.0.83 // Use this online tool to generate parsing code from sample JSON: // Generate Parsing Code from JSON // { // "timestampReply": { // "pkiStatus": { // "value": 0, // "meaning": "granted" // } // }, // "pkcs7": { // "verify": { // "digestAlgorithms": [ // "sha256" // ], // "signerInfo": [ // { // "cert": { // "serialNumber": "04CD3F8568AE76C61BB0FE7160CCA76D", // "issuerCN": "DigiCert SHA2 Assured ID Timestamping CA", // "digestAlgOid": "2.16.840.1.101.3.4.2.1", // "digestAlgName": "SHA256" // }, // "contentType": "1.2.840.113549.1.9.16.1.4", // "signingTime": "200405023019Z", // "messageDigest": "f14zOsdnN9vyyV3HjjBiLzNDi1PF28hAFMODxNkNRZs=", // "signingAlgOid": "1.2.840.113549.1.1.1", // "signingAlgName": "RSA-PKCSV-1_5", // "authAttr": { // "1.2.840.113549.1.9.3": { // "name": "contentType", // "oid": "1.2.840.113549.1.9.16.1.4" // }, // "1.2.840.113549.1.9.5": { // "name": "signingTime", // "utctime": "200405023019Z" // }, // "1.2.840.113549.1.9.16.2.12": { // "name": "signingCertificate", // "der": "MBowGDAWBBQDJb1QXtqWMC3CL0+gHkwovig0xQ==" // }, // "1.2.840.113549.1.9.4": { // "name": "messageDigest", // "digest": "f14zOsdnN9vyyV3HjjBiLzNDi1PF28hAFMODxNkNRZs=" // } // } // } // ] // } // } // } // Chilkat functions returning "const char *" return a pointer to temporary internal memory owned and managed by Chilkat. // See this example explaining how this memory should be used: const char * functions. signingTime = CkDtObjW_Create(); authAttrSigningTimeUtctime = CkDtObjW_Create(); timestampReplyPkiStatusValue = CkJsonObjectW_IntOf(json,L"timestampReply.pkiStatus.value"); timestampReplyPkiStatusMeaning = CkJsonObjectW_stringOf(json,L"timestampReply.pkiStatus.meaning"); i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.digestAlgorithms"); while (i < count_i) { CkJsonObjectW_putI(json,i); strVal = CkJsonObjectW_stringOf(json,L"pkcs7.verify.digestAlgorithms[i]"); i = i + 1; } i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.signerInfo"); while (i < count_i) { CkJsonObjectW_putI(json,i); certSerialNumber = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.serialNumber"); certIssuerCN = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.issuerCN"); certDigestAlgOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.digestAlgOid"); certDigestAlgName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.digestAlgName"); contentType = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].contentType"); CkJsonObjectW_DtOf(json,L"pkcs7.verify.signerInfo[i].signingTime",FALSE,signingTime); messageDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].messageDigest"); signingAlgOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].signingAlgOid"); signingAlgName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].signingAlgName"); authAttrContentTypeName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.3\".name"); authAttrContentTypeOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.3\".oid"); authAttrSigningTimeName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.5\".name"); CkJsonObjectW_DtOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.5\".utctime",FALSE,authAttrSigningTimeUtctime); authAttrSigningCertificateName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.16.2.12\".name"); authAttrSigningCertificateDer = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.16.2.12\".der"); authAttrMessageDigestName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.4\".name"); authAttrMessageDigestDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.4\".digest"); i = i + 1; } CkJsonObjectW_Dispose(json); CkCrypt2W_Dispose(crypt); CkHttpW_Dispose(http); CkBinDataW_Dispose(requestToken); CkBinDataW_Dispose(timestampReply); CkCertW_Dispose(tsaCert); CkDtObjW_Dispose(signingTime); CkDtObjW_Dispose(authAttrSigningTimeUtctime); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.