Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Go) Trust Specific Root CA CertificatesDemonstrates how to trust specific root CA certificates and none others.
// This example assumes the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // This example will trust the Amazon root CA certificates provided at // https://www.amazontrust.com/repository/ // I've previously downloaded the root CA certificates to DER format. // Add each to the Chilkat TrustedRoots singleton object. tRoots := chilkat.NewTrustedRoots() caCert := chilkat.NewCert() success := caCert.LoadFromFile("qa_data/certs/aws_root_ca/AmazonRootCA1.cer") if success == false { fmt.Println(caCert.LastErrorText()) tRoots.DisposeTrustedRoots() caCert.DisposeCert() return } success = tRoots.AddCert(caCert) // Continue with the others. // For brevity, we're not checking return values for success/failure. success = caCert.LoadFromFile("qa_data/certs/aws_root_ca/AmazonRootCA2.cer") success = tRoots.AddCert(caCert) success = caCert.LoadFromFile("qa_data/certs/aws_root_ca/AmazonRootCA3.cer") success = tRoots.AddCert(caCert) success = caCert.LoadFromFile("qa_data/certs/aws_root_ca/AmazonRootCA4.cer") success = tRoots.AddCert(caCert) success = caCert.LoadFromFile("qa_data/certs/aws_root_ca/SFSRootCAG2.cer") success = tRoots.AddCert(caCert) // Indicate we don't want to automatically trust the operating system's installed root CA certificates. // On a Windows operating system, this would be the registry-based CA certificate stores. // On a Linux system, this could be /etc/ssl/certs/ca-certificates.crt, if it exists. tRoots.SetTrustSystemCaRoots(false) // Activate the trusted roots object. // Once activated, all Chilkat objects that use TLS connections (HTTP, REST, Socket, MailMan, IMAP, FTP, etc.) // will fail the TLS handshake if the server certificate is not verified and rooted with one of our explicitly trusted root certificates. success = tRoots.Activate() http := chilkat.NewHttp() // Note: We also need to explicitly indicate that server certificates are to be verified. http.SetRequireSslCertVerify(true) // For example, the following should fail because www.chilkatsoft.com's server certificate is not rooted in one of the explicitly trusted root CA certs. success = http.Download("https://www.chilkatsoft.com/helloWorld.txt","qa_output/helloWorld.txt") if success != true { // The above Download should fail. fmt.Println(http.LastErrorText()) // There should be a message in the LastErrorText indicating that we were "Unable to build certificate chain to root.." } // However, we should be able to make TLS connections to good.sca1a.amazontrust.com success = http.Download("https://good.sca1a.amazontrust.com/","qa_output/valid.html") if success != true { fmt.Println(http.LastErrorText()) tRoots.DisposeTrustedRoots() caCert.DisposeCert() http.DisposeHttp() return } // We can still examine the LastErrorText and we'll find this message within: // "The public key was successfully validated against the public key of the explicitly trusted root cert." fmt.Println(http.LastErrorText()) fmt.Println("Success!") tRoots.DisposeTrustedRoots() caCert.DisposeCert() http.DisposeHttp() |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.