def tls_start_client(tls_start: tls.TlsStartData): # INSECURE ssl_context = SSL.Context(SSL.SSLv23_METHOD) ssl_context.use_privatekey_file( pkg_data.path("../test/mitmproxy/data/verificationcerts/trusted-leaf.key") ) ssl_context.use_certificate_chain_file( pkg_data.path("../test/mitmproxy/data/verificationcerts/trusted-leaf.crt") ) tls_start.ssl_conn = SSL.Connection(ssl_context) tls_start.ssl_conn.set_accept_state()
def tls_start(tls_start: tls.TlsStartData): # INSECURE ssl_context = SSL.Context(SSL.SSLv23_METHOD) if tls_start.conn == tls_start.context.client: ssl_context.use_privatekey_file( pkg_data.path("../test/mitmproxy/data/verificationcerts/trusted-leaf.key") ) ssl_context.use_certificate_chain_file( pkg_data.path("../test/mitmproxy/data/verificationcerts/trusted-leaf.crt") ) tls_start.ssl_conn = SSL.Connection(ssl_context) if tls_start.conn == tls_start.context.client: tls_start.ssl_conn.set_accept_state() else: tls_start.ssl_conn.set_connect_state() if tls_start.context.client.sni is not None: tls_start.ssl_conn.set_tlsext_host_name(tls_start.context.client.sni.encode())
def test_session_load_existing(self, tdata): path = tdata.path('mitmproxy/data/') + '/test_le.sqlite' if os.path.isfile(path): os.remove(path) con = sqlite3.connect(path) script_path = pkg_data.path("io/sql/session_create.sql") qry = open(script_path, 'r').read() with con: con.executescript(qry) blob = b'blob_of_data' con.execute(f'INSERT INTO FLOW VALUES(1, "{blob}");') con.close() session.SessionDB(path) con = sqlite3.connect(path) with con: cur = con.cursor() cur.execute('SELECT * FROM FLOW;') rows = cur.fetchall() assert len(rows) == 1 con.close() os.remove(path)
def _create_session(self): script_path = pkg_data.path("io/sql/session_create.sql") qry = open(script_path, 'r').read() with self.con: self.con.executescript(qry)
def _create_session(self): script_path = pkg_data.path("io/sql/session_create.sql") with open(script_path, 'r') as qry: self.con.executescript(qry.read()) self.con.commit()