Session_SignVerify
This API verifies the signature of message text using RSA or EC public key.
URL
./Session_SignVerify
Input Parameters
| Parameters | Description | 
|---|---|
| keyname | Name of RSA or EC key pair containing public key. | 
| messagetext | Message for signing verification. It must be in the same format as specified in the messageformat parameter. | 
| signature | signature of RSA or EC signing for verification in Hex. | 
| transformation | Transformation to be used. Provide one of the RSA/EC signverify transformations supported by CADP for Java . | 
| format | Format to be used. This is an optional parameter. Supported signing CMS formats are: — cms/detached/der/enveloped — cms/detached/der — cms/detached/smime/enveloped — cms/detached/smime  | 
| messageformat | Message format to be used. This is an optional parameter. Supported message formats are: — HEX — STR(default)  | 
| caname | Name of the CA used for verifying. This is an optional parameter. | 
Note
The following transformations don't support CMS format:
— SHA1withRSAPSSPadding
— SHA256withRSAPSSPadding
— SHA384withRSAPSSPadding
— SHA512withRSAPSSPadding
— ECDSA
— SHA1withECDSA
— SHA256withECDSA
— SHA384withECDSA
— SHA512withECDSA
— RSA
— RSAPSSPaddingSHA1
— RSAPSSPaddingSHA256
— RSAPSSPaddingSHA384
— RSAPSSPaddingSHA512For KeySecure 8.12.5 onward, following transformations are added to sign the data based on pre-calculated hash: RSA, RSAPSSPaddingSHA1, RSAPSSPaddingSHA256, RSAPSSPaddingSHA384, and RSAPSSPaddingSHA512. These transformations support saltlength parameter.
Session_RSA_Verify Sample with saltlength
    <prot:Session_SignVerify>
        <keyname>certpkcs12</keyname>
        <messagetext>eqwewewqeqqeqeqwe</messagetext>
        <signature>3082087B06092A864886F70D010703A082086C30820868020100318201C0308201BC0201003081A330819B310B3009060355040613025553310B3009060355040813024341311530130603550407130C526564776F6F64204369747931143012060355040A130B536166656E657420496E6331143012060355040B130B456E67696E65657[… sample truncated for brevity … ]</signature>
        <transformation> SHA1withECDSA</transformation>
        <!--Optional:-->
        <messageformat>STR</messageformat>
        <!--Optional:-->
        <caname>sample_ca</caname>
    </prot:Session_SignVerify>
Output
boolean – result of verification.
   <ns2:Session_SignVerifyResponse xmlns:ns2="http://dsws.org/protectappws/">true</ns2:Session_SignVerifyResponse>