![]() |
Chilkat HOME Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi DLL Go Java Node.js Objective-C PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) (PKCS11) Use a Smart Card Certificate + Private Key for SSL/TLS AuthenticationSee more ScMinidriver ExamplesDemonstrates how to use a certificate + private key located on a smart card for the TLS client certificate in an HTTPS request.
#include <C_CkPkcs11W.h> #include <C_CkCertW.h> #include <C_CkHttpW.h> void ChilkatSample(void) { HCkPkcs11W pkcs11; BOOL success; int slotID; BOOL readWrite; int userType; const wchar_t *pin; HCkCertW cert; HCkHttpW http; const wchar_t *responseBody; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. // Note: Chilkat's PKCS11 implementation runs on Windows, Linux, Mac OS X, and other supported operating systems. pkcs11 = CkPkcs11W_Create(); // Set your shared lib path -- either a full path to the DLL, .so, or .dylib, // or just the filename if the driver is in a location that can be automatically found. (Such as in C:\Windows\System32) CkPkcs11W_putSharedLibPath(pkcs11,L"C:/Program Files (x86)/Gemalto/IDGo 800 PKCS#11/IDPrimePKCS1164.dll"); success = CkPkcs11W_Initialize(pkcs11); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); CkPkcs11W_Dispose(pkcs11); return; } // Pass -1 for the slotID to open a session on the first non-empty slot. slotID = -1; // Open a session. readWrite = TRUE; success = CkPkcs11W_OpenSession(pkcs11,slotID,readWrite); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); CkPkcs11W_Dispose(pkcs11); return; } // Make it an authenticated session by calling Login. // // If we don't authenticate, then we won't be able to see the private keys, and thus // we won't know which certificates have an associated private key stored on the smart card. // The smart card PIN is passed to the Login method. // userType 1 indicates a "Normal User". userType = 1; pin = L"0000"; success = CkPkcs11W_Login(pkcs11,userType,pin); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); success = CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); return; } cert = CkCertW_Create(); // Find a certificate by the Subject Common Name success = CkPkcs11W_FindCert(pkcs11,L"subjectCN",L"BadSSL Client Certificate",cert); if (success == TRUE) { wprintf(L"Found: %s\n",CkCertW_subjectCN(cert)); } else { wprintf(L"Not found: %s\n",CkCertW_subjectCN(cert)); success = CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); return; } wprintf(L"Successfully loaded the cert object from the smart card / USB token.\n"); // Note: When successful, the cert object is internally linked to the Pkcs11 object's authenticated session. // The cert object can now be used to sign or do other cryptographic operations that occur on the smart card / USB token. // ------------------------------------------------------------------------------------------------------------ // Send an HTTPS request to https://client.badssl.com // https://client.badssl.com (part of the badssl.com service) lets you test authentication using client SSL certificates. // The client certificate can be downloaded from https://badssl.com/download/. // This server returns 200 OK if the correct client certificate is provided, and 400 Bad Request otherwise. http = CkHttpW_Create(); // Provide the client certificate (linked internally to our authenticated smartcard session) success = CkHttpW_SetSslClientCert(http,cert); if (success == FALSE) { wprintf(L"%s\n",CkHttpW_lastErrorText(http)); success = CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); CkHttpW_Dispose(http); return; } responseBody = CkHttpW_quickGetStr(http,L"https://client.badssl.com/"); if (CkHttpW_getLastMethodSuccess(http) == FALSE) { wprintf(L"%s\n",CkHttpW_lastErrorText(http)); success = CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); CkHttpW_Dispose(http); return; } wprintf(L"Response status code: %d\n",CkHttpW_getLastStatus(http)); wprintf(L"Response body: \n"); wprintf(L"%s\n",responseBody); // ------------------------------------------------------------------------------------------------------------ // Revert to an unauthenticated session by calling Logout. success = CkPkcs11W_Logout(pkcs11); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); success = CkPkcs11W_CloseSession(pkcs11); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); CkHttpW_Dispose(http); return; } // When finished, close the session. // It is important to close the session (memory leaks will occur if the session is not properly closed). success = CkPkcs11W_CloseSession(pkcs11); if (success == FALSE) { wprintf(L"%s\n",CkPkcs11W_lastErrorText(pkcs11)); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); CkHttpW_Dispose(http); return; } wprintf(L"Success.\n"); CkPkcs11W_Dispose(pkcs11); CkCertW_Dispose(cert); CkHttpW_Dispose(http); } |
© 2000-2025 Chilkat Software, Inc. All Rights Reserved.