Session_SignVerify
This API verifies the signature of message text using RSA or EC public key.
URL
./Session_SignVerify
Input Parameters
Parameters | Description |
---|---|
keyname | Name of RSA or EC key pair containing public key. |
messagetext | Message for signing verification. It must be in the same format as specified in the messageformat parameter. |
signature | signature of RSA or EC signing for verification in Hex. |
transformation | Transformation to be used. Provide one of the RSA/EC signverify transformations supported by CADP for Java . |
format | Format to be used. This is an optional parameter. Supported signing CMS formats are: — cms/detached/der/enveloped — cms/detached/der — cms/detached/smime/enveloped — cms/detached/smime |
messageformat | Message format to be used. This is an optional parameter. Supported message formats are: — HEX — STR(default) |
caname | Name of the CA used for verifying. This is an optional parameter. |
Note
The following transformations don't support CMS format:
— SHA1withRSAPSSPadding
— SHA256withRSAPSSPadding
— SHA384withRSAPSSPadding
— SHA512withRSAPSSPadding
— ECDSA
— SHA1withECDSA
— SHA256withECDSA
— SHA384withECDSA
— SHA512withECDSA
— RSA
— RSAPSSPaddingSHA1
— RSAPSSPaddingSHA256
— RSAPSSPaddingSHA384
— RSAPSSPaddingSHA512For KeySecure 8.12.5 onward, following transformations are added to sign the data based on pre-calculated hash: RSA, RSAPSSPaddingSHA1, RSAPSSPaddingSHA256, RSAPSSPaddingSHA384, and RSAPSSPaddingSHA512. These transformations support saltlength parameter.
Session_RSA_Verify Sample with saltlength
<prot:Session_SignVerify>
<keyname>certpkcs12</keyname>
<messagetext>eqwewewqeqqeqeqwe</messagetext>
<signature>3082087B06092A864886F70D010703A082086C30820868020100318201C0308201BC0201003081A330819B310B3009060355040613025553310B3009060355040813024341311530130603550407130C526564776F6F64204369747931143012060355040A130B536166656E657420496E6331143012060355040B130B456E67696E65657[… sample truncated for brevity … ]</signature>
<transformation> SHA1withECDSA</transformation>
<!--Optional:-->
<messageformat>STR</messageformat>
<!--Optional:-->
<caname>sample_ca</caname>
</prot:Session_SignVerify>
Output
boolean – result of verification.
<ns2:Session_SignVerifyResponse xmlns:ns2="http://dsws.org/protectappws/">true</ns2:Session_SignVerifyResponse>