Jwe Unicode C Reference Documentation

Jwe

Current Version: 9.5.0.97

An API for JSON Web Encryption (JWE). Provides the ability to create (encrypt) and decrypt JWE's.

Supported Algorithms:

  • RSAES OAEP 256 (using SHA-256 and MGF1 with SHA-256) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • RSAES OAEP (using SHA-1 and MGF1 with SHA-1) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • RSAES-PKCS1-V1_5 encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • Direct symmetric key encryption with pre-shared key A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM and A256GCM
  • A128KW, A192KW, A256KW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • A128GCMKW, A192GCMKW, A256GCMKW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM

Create/Dispose

HCkJweW instance = CkJweW_Create();
// ...
CkJweW_Dispose(instance);
HCkJweW CkJweW_Create(void);

Creates an instance of the HCkJweW object and returns a handle ("void *" pointer). The handle is passed in the 1st argument for the functions listed on this page.

void CkJweW_Dispose(HCkJweW handle);

Objects created by calling CkJweW_Create must be freed by calling this method. A memory leak occurs if a handle is not disposed by calling this function. Also, any handle returned by a Chilkat "C" function must also be freed by the application by calling the appropriate Dispose method, such as CkJweW_Dispose.

Properties

DebugLogFilePath
void CkJweW_getDebugLogFilePath(HCkJweW cHandle, HCkString retval);
void CkJweW_putDebugLogFilePath(HCkJweW cHandle, const wchar_t *newVal);
const wchar_t *CkJweW_debugLogFilePath(HCkJweW cHandle);

If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.

This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:

  1. a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
  2. the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
  3. there is an internal problem (bug) in the Chilkat code that causes the hang.

top
LastErrorHtml
void CkJweW_getLastErrorHtml(HCkJweW cHandle, HCkString retval);
const wchar_t *CkJweW_lastErrorHtml(HCkJweW cHandle);

Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorText
void CkJweW_getLastErrorText(HCkJweW cHandle, HCkString retval);
const wchar_t *CkJweW_lastErrorText(HCkJweW cHandle);

Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastErrorXml
void CkJweW_getLastErrorXml(HCkJweW cHandle, HCkString retval);
const wchar_t *CkJweW_lastErrorXml(HCkJweW cHandle);

Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

top
LastMethodSuccess
BOOL CkJweW_getLastMethodSuccess(HCkJweW cHandle);
void CkJweW_putLastMethodSuccess(HCkJweW cHandle, BOOL newVal);

Indicate whether the last method call succeeded or failed. A value of TRUE indicates success, a value of FALSE indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:

  • Any method that returns a string.
  • Any method returning a Chilkat object, binary bytes, or a date/time.
  • Any method returning a standard boolean status value where success = TRUE and failure = FALSE.
  • Any method returning an integer where failure is defined by a return value less than zero.

Note: Methods that do not fit the above requirements will always set this property equal to TRUE. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.

top
NumRecipients
int CkJweW_getNumRecipients(HCkJweW cHandle);
Introduced in version 9.5.0.66

The number of recipients for this JWE.

top
PreferCompact
BOOL CkJweW_getPreferCompact(HCkJweW cHandle);
void CkJweW_putPreferCompact(HCkJweW cHandle, BOOL newVal);
Introduced in version 9.5.0.66

Controls whether the JWE Compact Serialization or JWE JSON Serialization is preferred when creating JWEs. The default value is TRUE, which is to use compact serialization when possible. If multiple recipients exist, or if any unprotected headers exist, then JWE JSON Serialization is used regardless of this property setting.

top
PreferFlattened
BOOL CkJweW_getPreferFlattened(HCkJweW cHandle);
void CkJweW_putPreferFlattened(HCkJweW cHandle, BOOL newVal);
Introduced in version 9.5.0.66

Controls whether the flattened serialization is preferred when JWE JSON Serialization is used. The default value is TRUE, which is to use the flattened serialization when possible. If multiple recipients exist, then the general (non-flattened) JWE JSON Serialization is used regardless of this property setting.

More Information and Examples
top
VerboseLogging
BOOL CkJweW_getVerboseLogging(HCkJweW cHandle);
void CkJweW_putVerboseLogging(HCkJweW cHandle, BOOL newVal);

If set to TRUE, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is FALSE. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
Version
void CkJweW_getVersion(HCkJweW cHandle, HCkString retval);
const wchar_t *CkJweW_version(HCkJweW cHandle);

Version of the component/library, such as "9.5.0.94"

More Information and Examples
top

Methods

Decrypt
BOOL CkJweW_Decrypt(HCkJweW cHandle, int index, const wchar_t *charset, const wchar_t *outStr);
const wchar_t *CkJweW_decrypt(HCkJweW cHandle, int index, const wchar_t *charset);
Introduced in version 9.5.0.66

Decrypts a JWE and returns the original (decrypted) string content. The byte representation of the decrypted bytes is indicated by charset (such as "utf-8"). (The charset tells Chilkat how to intepret the decrypted bytes as characters.)

The index specifies which recipient key is used for decryption. (Most JWEs have only a single recipent, and thus the index is typically 0.)

Supported Algorithms:

  • RSAES OAEP 256 (using SHA-256 and MGF1 with SHA-256) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • RSAES OAEP (using SHA-1 and MGF1 with SHA-1) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • RSAES-PKCS1-V1_5 encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • Direct symmetric key encryption with pre-shared key A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM and A256GCM
  • A128KW, A192KW, A256KW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • A128GCMKW, A192GCMKW, A256GCMKW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM

Returns TRUE for success, FALSE for failure.

top
DecryptBd
BOOL CkJweW_DecryptBd(HCkJweW cHandle, int index, HCkBinDataW bd);
Introduced in version 9.5.0.66

Decrypts the loaded JWE and appends the decrypted bytes to the contents of bd. The index specifies which recipient key is used for decryption. (Most JWEs have only a single recipent, and thus the index is typically 0.)

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
DecryptSb
BOOL CkJweW_DecryptSb(HCkJweW cHandle, int index, const wchar_t *charset, HCkStringBuilderW contentSb);
Introduced in version 9.5.0.66

Decrypts the loaded JWE and appends the decrypted content to contentSb. The byte representation of the decrypted bytes is indicated by charset (such as "utf-8"). (This tells Chilkat how to interpret the bytes as characters.)

The index specifies which recipient key is used for decryption. (Most JWEs have only a single recipent, and thus the index is typically 0.)

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
Encrypt
BOOL CkJweW_Encrypt(HCkJweW cHandle, const wchar_t *content, const wchar_t *charset, const wchar_t *outStr);
const wchar_t *CkJweW_encrypt(HCkJweW cHandle, const wchar_t *content, const wchar_t *charset);
Introduced in version 9.5.0.66

Encrypts string content to produce a JWE. The byte representation of the content is indicated by charset (such as "utf-8").

Supported Algorithms:

  • RSAES OAEP 256 (using SHA-256 and MGF1 with SHA-256) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • RSAES OAEP (using SHA-1 and MGF1 with SHA-1) encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • RSAES-PKCS1-V1_5 encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • Direct symmetric key encryption with pre-shared key A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM and A256GCM
  • A128KW, A192KW, A256KW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • A128GCMKW, A192GCMKW, A256GCMKW encryption with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM
  • PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW with A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM

Returns TRUE for success, FALSE for failure.

top
EncryptBd
BOOL CkJweW_EncryptBd(HCkJweW cHandle, HCkBinDataW contentBd, HCkStringBuilderW jweSb);
Introduced in version 9.5.0.66

Encrypts the contents of contentBd to produce a JWE that is appended to the contents of jweSb. (This method provides the means to produce a JWE from binary content.)

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
EncryptSb
BOOL CkJweW_EncryptSb(HCkJweW cHandle, HCkStringBuilderW contentSb, const wchar_t *charset, HCkStringBuilderW jweSb);
Introduced in version 9.5.0.66

Encrypts the contents of contentSb to produce a JWE that is appended to the contents of jweSb. The byte representation of the string to be encrypted is indicated by charset (such as "utf-8").

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
FindRecipient
int CkJweW_FindRecipient(HCkJweW cHandle, const wchar_t *paramName, const wchar_t *paramValue, BOOL caseSensitive);
Introduced in version 9.5.0.66

Finds the index of the recipient with a header parameter (paramName) equal to a specified value (paramValue). Returns -1 if no recipient contains a header with the given name/value. If caseSensitive is TRUE, then the header param name/value comparisons are case sensitive. Otherwise it is case insensitive.

The procedure for decrypting a JWE with multiple recipients is the following:

  1. Load the JWE via one of the Load* methods.
  2. Find the recipient index by some identifying header paramter. The typical case is via the "kid" header parameter. ("kid" is an arbitrary key ID applications can assign to identify keys.)
  3. Set the key for decryption at the found index by calling SetPrivateKey, SetWrappingKey, or SetPassword, depending on the type of key wrapping that is employed.
  4. Call Decrypt, DecryptSb, or DecryptBd to decrypt for the recipient (and key) at the given index.

More Information and Examples
top
GetHeader
BOOL CkJweW_GetHeader(HCkJweW cHandle, HCkJsonObjectW json);
Introduced in version 9.5.0.89

Returns the JSON header from the JWE. The JSON header is loaded into json.

Returns TRUE for success, FALSE for failure.

top
GetProtectedHeader
BOOL CkJweW_GetProtectedHeader(HCkJweW cHandle, HCkJsonObjectW json);
Introduced in version 9.5.0.89

Returns the shared protected JSON header from the JWE. The shared protected header is loaded into json.

Returns TRUE for success, FALSE for failure.

top
LoadJwe
BOOL CkJweW_LoadJwe(HCkJweW cHandle, const wchar_t *jwe);
Introduced in version 9.5.0.66

Loads the contents of a JWE.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
LoadJweSb
BOOL CkJweW_LoadJweSb(HCkJweW cHandle, HCkStringBuilderW sb);
Introduced in version 9.5.0.66

Loads the contents of a JWE from a StringBuilder object.

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
SetAad
BOOL CkJweW_SetAad(HCkJweW cHandle, const wchar_t *aad, const wchar_t *charset);
Introduced in version 9.5.0.66

Sets the optional Additional Authenticated Data. This is only used for non-compact serializations. The charset specifies the character encoding (such as "utf-8") to be used for the byte representation for the additional authenticated data.

Returns TRUE for success, FALSE for failure.

top
SetAadBd
BOOL CkJweW_SetAadBd(HCkJweW cHandle, HCkBinDataW aad);
Introduced in version 9.5.0.66

Sets the optional Additional Authenticated Data. This is only used for non-compact serializations. This method provides a way for binary (non-text) additional authenticated data to be used.

Returns TRUE for success, FALSE for failure.

top
SetPassword
BOOL CkJweW_SetPassword(HCkJweW cHandle, int index, const wchar_t *password);
Introduced in version 9.5.0.66

Sets the PBES2 password for key encryption or decryption. This is for the case where the content encryption key (CEK) is encrypted using PBES2. An PBES2 password should be used in the cases where the "alg" header parameter value is equal to one of the following:

PBES2-HS256+A128KW
PBES2-HS384+A192KW
PBES2-HS512+A256KW
The index is the index of the recipient, where the 1st recipient is at index 0. (The typical use case for JWEs is for a single recipient.)

Returns TRUE for success, FALSE for failure.

top
SetPrivateKey
BOOL CkJweW_SetPrivateKey(HCkJweW cHandle, int index, HCkPrivateKeyW privKey);
Introduced in version 9.5.0.66

Sets a private key for RSA key unwrapping/decryption. This is for the case where the content encryption key (CEK) is encrypted using RSA. An RSA private key should be used for decrypting in the cases where the "alg" header parameter value is equal to one of the following:

RSA1_5
RSA-OAEP
RSA-OAEP-256
RSA-OAEP-384  (added in Chilkat v9.5.0.71)
RSA-OAEP-512  (added in Chilkat v9.5.0.71)
The index is the index of the recipient, where the 1st recipient is at index 0. (The typical use case for JWEs is for a single recipient.)

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
SetProtectedHeader
BOOL CkJweW_SetProtectedHeader(HCkJweW cHandle, HCkJsonObjectW json);
Introduced in version 9.5.0.66

Sets the JWE Protected Header.

Returns TRUE for success, FALSE for failure.

top
SetPublicKey
BOOL CkJweW_SetPublicKey(HCkJweW cHandle, int index, HCkPublicKeyW pubKey);
Introduced in version 9.5.0.66

Sets a public key for RSA key wrapping encryption. This is for the case where the content encryption key (CEK) is encrypted using RSA. An RSA public key should be used when encrypting for the cases where the "alg" header parameter value is equal to one of the following:

RSA1_5
RSA-OAEP
RSA-OAEP-256
The index is the index of the recipient, where the 1st recipient is at index 0. (The typical use case for JWEs is for a single recipient.)

Returns TRUE for success, FALSE for failure.

More Information and Examples
top
SetRecipientHeader
BOOL CkJweW_SetRecipientHeader(HCkJweW cHandle, int index, HCkJsonObjectW json);
Introduced in version 9.5.0.66

Sets a per-recipient unprotected header. This method would only be called if the JWE is for multiple recipients. The 1st recipient is at index 0.

Returns TRUE for success, FALSE for failure.

top
SetUnprotectedHeader
BOOL CkJweW_SetUnprotectedHeader(HCkJweW cHandle, HCkJsonObjectW json);
Introduced in version 9.5.0.66

Sets the JWE Shared Unprotected Header.

Returns TRUE for success, FALSE for failure.

top
SetWrappingKey
BOOL CkJweW_SetWrappingKey(HCkJweW cHandle, int index, const wchar_t *encodedKey, const wchar_t *encoding);
Introduced in version 9.5.0.66

Sets the AES wrapping key for encryption or decryption. This is for the case where the content encryption key (CEK) is encrypted using AES Key Wrap or AES GCM. An AES key should be used in the cases where the "alg" header parameter value is equal to one of the following:

A128KW
A192KW
A256KW
A128GCMKW
A192GCMKW
A256GCMKW
dir
The index is the index of the recipient, where the 1st recipient is at index 0. (The typical use case for JWEs is for a single recipient.)

Note: This method also sets the shared direct symmetric key for the case when the "alg" is equal to "dir". In this case, the key specified is not actualy a key encryption key, but is the direct content encryption key.

The encoding indicates the representation, such as "base64", "hex", "base64url", etc. of the encodedKey.

Returns TRUE for success, FALSE for failure.

top