Verifying a Digital Signature
The post /v1/cckm/sap/hyok/v1/keystores/{keystore_id}/keys/{external_key_id}/asymmetric-verify
API verifies a digital signature generated using an asymmetric key stored in a keystore on CipherTrust Manager. The key specified in the key_id
path variable MUST be an asymmetric key with SIGN and VERIFY attributes.
The asymmetric verify API accepts the signature and verifies it using the specified algorithm. The message, message type, algorithm and key version ID must be the same as used to generate the signature, otherwise, the signature verification fails.
Request Parameters
Parameter | Type | Description |
---|---|---|
signature | string | The signature to be verified. |
message | string | Message or message digest to sign. The maximum length of the message is 4096 bytes. |
message_type | string | The type of the message. It can be RAW or DIGEST . |
algorithm | string | The algorithm of signing. It can be RSASSA_PSS_SHA_256 , RSASSA_PSS_SHA_384 , or RSASSA_PSS_SHA_512 . |
key_version_id | string | ID of the key version. |
sap_tenant_id | string | ID of the SAP Tenant. |
Example Request
Example Response
Response Codes
Response Code | Description |
---|---|
200 | Ok |
400 | Bad request |
401 | Unauthorized |
404 | Not found |
403 | Forbidden |
500 | Internal server error |
Refer to HTTP status codes for details.