def usage(): # form context by passing cert and private key file context = Context(); context.set_allow_unknown_ca(False) context.load_cert(certfile='cert.pem', keyfile='key.pem') # make server verification # capath should contain hash soft link to CA certifiates context.load_verify_info(capath='./') context.set_verify(SSL.verify_peer, 3) # context.set_verify(SSL.verify_none, 3) # using MyHTTPS to send request send_request(context)
def usage1(): context = Context(); context.set_allow_unknown_ca(False) # add client site certificate and private key # to support Client verification context.load_cert(certfile='cert.pem', keyfile='key.pem') # add server site trusted CA certifications # to support server verification context.load_verify_info(capath='./') opener = m2urllib2.build_opener(context) response = opener.open("https://sjmcm1csa2/") print 'html: ', response.read() print 'info: ', response.info() print 'url: ', response.geturl()
def usage1(): # form context by passing cert and private key content context = Context(); context.set_allow_unknown_ca(False) cert_file = open('/opt/cisco/creds/id.cert', 'rb').read().encode('ascii') cert_file = X509.load_cert_string(cert_file) key_file = open('/opt/cisco/creds/id.cert', 'rb').read().encode('ascii') # pem-encoded pkey key_file = EVP.load_key_string(key_file) m2.ssl_ctx_use_x509(context.ctx, cert_file.x509) m2.ssl_ctx_use_pkey_privkey(context.ctx, key_file.pkey) # make server verification # capath should contain hash soft link to CA certifiates context.load_verify_info(capath='./') context.set_verify(SSL.verify_peer, 3) # context.set_verify(SSL.verify_none, 3) # using MyHTTPS to send request send_request(context)