(JavaScript) Examine SSL/TLS Server Certificate
Demonstrates how an application can examine and check a server's SSL/TLS certificate.Note: This example requires Chilkat v11.0.0 or greater.
var success = false;
// This example assumes the Chilkat API to have been previously unlocked.
// See Global Unlock Sample for sample code.
var socket = new CkSocket();
// Connect to a server.
var useTls = true;
var maxWaitMs = 2000;
success = socket.Connect("www.intel.com",443,useTls,maxWaitMs);
if (success == false) {
console.log(socket.LastErrorText);
return;
}
// If we get here, the TLS connection ws made..
// In any SSL/TLS handshake, the server sends its certificate in a TLS handshake message.
// Chilkat will keep it cached within the object that made the connection.
// Get the server's cert and examine a few things.
var cert = new CkCert();
socket.GetServerCert(cert);
console.log("Distinguished Name: " + cert.SubjectDN);
console.log("Common Name: " + cert.SubjectCN);
console.log("Issuer Distinguished Name: " + cert.IssuerDN);
console.log("Issuer Common Name: " + cert.IssuerCN);
console.log("Expired: " + cert.Expired);
console.log("Revoked: " + cert.Revoked);
console.log("Signature Verified: " + cert.SignatureVerified);
console.log("Trusted Root: " + cert.TrustedRoot);
// Sample output:
// Distinguished Name: C=US, ST=California, O=Intel Corporation, CN=*.intel.com
// Common Name: *.intel.com
// Issuer Distinguished Name: C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Organization Validation Secure Server CA
// Issuer Common Name: Sectigo RSA Organization Validation Secure Server CA
// Expired: False
// Revoked: False
// Signature Verified: True
// Trusted Root: True
|