tls 双向认证 client端代码例子

example:

python

 1 import httplib
 2 import json
 3 import ssl
 4 import urllib2
 5 import requests
 6 
 7 
 8 CA_FILE = "etc/rdtagent/cert/server/ca.pem"
 9 CLIENT_CERT_FILE = "etc/rdtagent/cert/client/cert.pem"
10 CLIENT_KEY_FILE = "etc/rdtagent/cert/client/key.pem" # This is your client cert!
11 HOST = "127.0.0.1"
12 PORT = 8443
13 
14 CACHE_URL = "/v1/cache"
15 
16 context = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH, cafile=CA_FILE)
17 context.load_cert_chain(certfile=CLIENT_CERT_FILE, keyfile=CLIENT_KEY_FILE)
18 
19 connection = httplib.HTTPSConnection(HOST, port=PORT, context=context)
20 # pem code
21 # auth_header = 'Basic %s' % (":".join(["myusername","mypassword"]).encode('Base64').strip('\r\n'))
22 # connection.request("POST", "/","",{'Authorization':auth_header})
23 connection.request('GET', CACHE_URL)
24 response = connection.getresponse()
25 print(response.status, response.reason)
26 
27 data = response.read()
28 print(json.loads(data))
29 
30 connection.close()
31 
32 
33 
34 # http://docs.python-requests.org/en/latest/
35 res = requests.get("https://"+HOST+":"+str(PORT)+CACHE_URL, verify=CA_FILE, cert=(CLIENT_CERT_FILE, CLIENT_KEY_FILE), auth=('user', 'pass'))
36 print res.json()
37 
38 
39 # HTTPS Client Auth solution for urllib2, inspired by
40 # http://bugs.python.org/issue3466
41 # and improved by David Norton of Three Pillar Software. In this
42 # implementation, we use properties passed in rather than static module
43 # fields.
44 class HTTPSClientAuthHandler(urllib2.HTTPSHandler):
45     def __init__(self, ca, key, cert):
46         urllib2.HTTPSHandler.__init__(self)
47         self.ca = ca
48         self.key = key
49         self.cert = cert
50     def https_open(self, req):
51         #Rather than pass in a reference to a connection class, we pass in
52         # a reference to a function which, for all intents and purposes,
53         # will behave as a constructor
54         return self.do_open(self.getConnection, req)
55     def getConnection(self, host):
56         print "*" * 80
57         print host
58         context = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH, cafile=self.ca)
59         context.load_cert_chain(certfile=self.cert, keyfile=self.key)
60         return httplib.HTTPSConnection(host, key_file=self.key, cert_file=self.cert, context=context)
61 
62 
63 # cert_handler = HTTPSClientAuthHandler(CA_FILE, CLIENT_KEY_FILE, CLIENT_CERT_FILE)
64 # opener = urllib2.build_opener(cert_handler)
65 # urllib2.install_opener(opener)
66 
67 # https://docs.python.org/2/library/urllib2.html#examples
68 f = urllib2.urlopen("https://"+HOST+":"+str(PORT)+CACHE_URL, context=context)
69 print json.loads(f.read())
View Code

 

shell中直接执行:

python -c '
import requests
CA_FILE = "etc/rdtagent/cert/server/ca.pem"
CLIENT_CERT_FILE = "etc/rdtagent/cert/client/cert.pem"
CLIENT_KEY_FILE = "etc/rdtagent/cert/client/key.pem" # This is your client cert!
HOST = "127.0.0.1"
PORT = 8443

CACHE_URL = "/v1/cache"
print requests.get("https://"+HOST+":"+str(PORT)+CACHE_URL, verify=CA_FILE, cert=(CLIENT_CERT_FILE, CLIENT_KEY_FILE), auth=("user", "pass")).json()
'
CA_FILE="etc/rdtagent/cert/server/ca.pem"
CLIENT_CERT_FILE="etc/rdtagent/cert/client/cert.pem"
CLIENT_KEY_FILE="etc/rdtagent/cert/client/key.pem" # This is your client cert!
HOST="127.0.0.1"
PORT=8443
CACHE_URL="/v1/cache"
PASSWORD="pass"
USER="user"
python -c "
import requests
print requests.get('https://'+'$HOST'+':'+str($PORT)+'$CACHE_URL', verify='$CA_FILE', cert=('$CLIENT_CERT_FILE', '$CLIENT_KEY_FILE'), auth=('$USER', '$PASSWORD')).json()
"

 

Golang

$ cat goclient.go

 1 package main
 2 
 3 import (
 4         "crypto/tls"
 5         "crypto/x509"
 6         "flag"
 7         "fmt"
 8         "io/ioutil"
 9         "log"
10         "net/http"
11         _ "os"
12 )
13 
14 var (
15         certFile = flag.String("cert", "someCertFile", "A PEM eoncoded certificate file.")
16         keyFile  = flag.String("key", "someKeyFile", "A PEM encoded private key file.")
17         caFile   = flag.String("CA", "someCertCAFile", "A PEM eoncoded CA's certificate file.")
18         url      = flag.String("url", "resource url", "The url of resource that client request.")
19 )
20 
21 func main() {
22 
23         flag.Parse()
24         //os.Getenv("HOST"))
25         // Load client cert
26         cert, err := tls.LoadX509KeyPair(*certFile, *keyFile)
27         if err != nil {
28                 log.Fatal(err)
29         }
30 
31         // Load CA cert
32         caCert, err := ioutil.ReadFile(*caFile)
33         if err != nil {
34                 log.Fatal(err)
35         }
36         caCertPool := x509.NewCertPool()
37         caCertPool.AppendCertsFromPEM(caCert)
38 
39         // Setup HTTPS client
40         tlsConfig := &tls.Config{
41                 Certificates: []tls.Certificate{cert},
42                 RootCAs:      caCertPool,
43         }
44         tlsConfig.BuildNameToCertificate()
45         transport := &http.Transport{TLSClientConfig: tlsConfig}
46         client := &http.Client{Transport: transport}
47 
48         resp, err := client.Get(*url)
49         if err != nil {
50                 fmt.Println(err)
51         }
52         contents, err := ioutil.ReadAll(resp.Body)
53         fmt.Printf("%s\n", string(contents))
54 }
View Code

CA_FILE="etc/rdtagent/cert/server/ca.pem"
CLIENT_CERT_FILE="etc/rdtagent/cert/client/cert.pem"
CLIENT_KEY_FILE="etc/rdtagent/cert/client/key.pem" # This is your client cert!
PASSWORD="pass"
USER="user"
CACHE_URL="https://127.0.0.1:8443/v1/cache"
$ go run goclient.go -CA $CA_FILE -cert $CLIENT_CERT_FILE -key $CLIENT_KEY_FILE -url $CACHE_URL

 

How Certificate Revocation Works

转载于:https://www.cnblogs.com/shaohef/p/7699560.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
mbedtls是一个开源的加密库,提供了双向认证的功能。以下是mbedtls进行双向认证的一般代码示例: 1. 初始化mbedtls库并配置客户和服务器的身份验证参数。 ``` mbedtls_ssl_config client_config; mbedtls_ssl_config server_config; mbedtls_ssl_config_init(&client_config); mbedtls_ssl_config_init(&server_config); // 配置客户和服务器的身份验证参数 mbedtls_ssl_conf_authmode(&client_config, MBEDTLS_SSL_VERIFY_REQUIRED); mbedtls_ssl_conf_authmode(&server_config, MBEDTLS_SSL_VERIFY_REQUIRED); // 配置CA证书和私钥 mbedtls_ssl_conf_ca_chain(&client_config, ca_cert, NULL); mbedtls_ssl_conf_ca_chain(&server_config, ca_cert, NULL); mbedtls_ssl_conf_own_cert(&client_config, client_cert, client_key); mbedtls_ssl_conf_own_cert(&server_config, server_cert, server_key); ``` 2. 创建一个mbedtlsTLS上下文。 ``` mbedtls_ssl_context ssl_ctx; mbedtls_ssl_init(&ssl_ctx); ``` 3. 设置TLS上下文的配置。 ``` mbedtls_ssl_setup(&ssl_ctx, &client_config); mbedtls_ssl_setup(&ssl_ctx, &server_config); ``` 4. 在客户和服务器分别进行握手。 ``` // 客户握手 mbedtls_ssl_set_hostname(&ssl_ctx, server_hostname); mbedtls_ssl_set_bio(&ssl_ctx, sockfd, mbedtls_net_send, mbedtls_net_recv, mbedtls_net_recv_timeout); mbedtls_ssl_handshake_client(&ssl_ctx); // 服务器握手 mbedtls_ssl_set_bio(&ssl_ctx, &client_fd, mbedtls_net_send, mbedtls_net_recv, NULL); mbedtls_ssl_handshake_server(&ssl_ctx); ``` 5. 进行双向验证。 ``` // 客户验证服务器证书 if (mbedtls_ssl_get_verify_result(&ssl_ctx) != 0) { // 验证失败 } // 服务器验证客户证书 if (mbedtls_ssl_get_verify_result(&ssl_ctx) != 0) { // 验证失败 } ``` 以上代码示例演示了mbedtls进行双向认证的基本步骤。在实际应用中,还需根据具体需求进行适当的配置和处理。<span class="em">1</span><span class="em">2</span> #### 引用[.reference_title] - *1* *2* [Mbedtls随笔](https://blog.csdn.net/qq_44455716/article/details/102790232)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 100%"] [ .reference_list ]
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值