/Crypto/CreateKey
Allows the client to create a cryptographic key on the server, and protect it with a password. The key will be stored encrypted on the server, protected with the key password. The creation of a key will require the user to provide the account password again.
JSON
- Request
{ "localName": Required(Str(PLocalName)), "namespace": Required(Str(PNamespace)), "id": Required(Str(PId)), "nonce": Required(Str(PNonce)), "keySignature": Required(Str(PKeySignature)), "requestSignature": Required(Str(PRequestSignature)) }
- Response (if successful)
{ "created": Required(DateTime(PCreated)), "updated": Required(DateTime(PUpdated)) }
XML
- Request
<CreateKey xmlns="https://waher.se/Schema/BrokerAgent.xsd" localName=(Required(Str(PLocalName))) namespace=(Required(Str(PNamespace))) id=(Required(Str(PId))) nonce=(Required(Str(PNonce))) keySignature=(Required(Str(PKeySignature))) requestSignature=(Required(Str(PRequestSignature))) />
- Response (if successful)
<Stored xmlns="https://waher.se/Schema/BrokerAgent.xsd" created=(Required(DateTime(PCreated))) updated=(Required(DateTime(PUpdated)))/>
Input Parameters
Parameter | Description |
---|---|
PLocalName |
Local Name of the algorithm to use for the new key. |
PNamespace |
Namespace, defining the algorithm. |
PId |
ID of the key. The ID must be unique, for the current account. Different accounts can have keys with the same ID. |
PNonce |
A unique random string, at least 32 characters long, with sufficient entropy to not be reused again. If reused, an error will be returned. |
PKeySignature |
Cryptographic signature of the key ID, using the key password. (Password is not stored with the key, instead this signature will be the base for the cryptographic key used to encrypt the key on the server. |
PRequestSignature |
Cryptographic signature of the requesut, using the account password. |
Response Parameters
Parameter | Description |
---|---|
PCreated |
When the information record was first created. |
PUpdated |
When the information record was last updated. |
Calculating the Key Signature
The signature in PKeySignature
is calculated as follows.
Concatenate the strings
PUserName ":" Host ":" PLocalName ":" PNamespace ":" PId
and call its1
, whereHost
is the host/domain name of the server. It is taken from the HTTPHost
request header, so it must be the same as is used in the URL of the request.PUserName
is the name of the account, used when creating the current account or logging in to the current account.UTF-8 encode the secret corresponding to the key, and call it
Key1
.UTF-8 encode the string
s1
, and call itData1
.Calculate the HMAC-SHA256 signature using
Key1
andData1
, and call itH1
.Base64-encode
H1
. The result is the key signature of the request.
Calculating the Request Signature
The signature in PRequestSignature
is calculated as follows.
Concatenate the strings
s1 ":" PKeySignature ":" PNonce
and call its2
.s1
is the intermediate result of computing the key signature in the previous step.UTF-8 encode the secret corresponding to the account, and call it
Key2
.UTF-8 encode the string
s2
, and call itData2
.Calculate the HMAC-SHA256 signature using
Key2
andData2
, and call itH2
.Base64-encode
H2
. The result is the signature of the request.
Javascript Library
Use the following asynchronous method in the Javascript Library, to call this resource. It computes the signatures according to the above specification.
var Response = await AgentAPI.Crypto.CreateKey(LocalName,Namespace,Id,KeyPassword,AccountPassword);