예제 #1
0
def usage():
    # form context by passing cert and private key file
    context = Context();
    context.set_allow_unknown_ca(False)
    context.load_cert(certfile='cert.pem', keyfile='key.pem')

    # make server verification
    # capath should contain hash soft link to CA certifiates
    context.load_verify_info(capath='./')
    context.set_verify(SSL.verify_peer, 3)
    # context.set_verify(SSL.verify_none, 3)

    # using MyHTTPS to send request
    send_request(context)
def usage1():
    context = Context();
    context.set_allow_unknown_ca(False)

    # add client site certificate and private key
    # to support Client verification
    context.load_cert(certfile='cert.pem', keyfile='key.pem')

    # add server site trusted CA certifications
    # to support server verification
    context.load_verify_info(capath='./')
    opener = m2urllib2.build_opener(context)
    response = opener.open("https://sjmcm1csa2/")

    print 'html: ', response.read()
    print 'info: ', response.info()
    print 'url: ', response.geturl()
예제 #3
0
def usage1():
    # form context by passing cert and private key content
    context = Context();
    context.set_allow_unknown_ca(False)

    cert_file = open('/opt/cisco/creds/id.cert', 'rb').read().encode('ascii')
    cert_file = X509.load_cert_string(cert_file)
    key_file = open('/opt/cisco/creds/id.cert', 'rb').read().encode('ascii') # pem-encoded pkey
    key_file = EVP.load_key_string(key_file)
    m2.ssl_ctx_use_x509(context.ctx, cert_file.x509)
    m2.ssl_ctx_use_pkey_privkey(context.ctx, key_file.pkey)

    # make server verification
    # capath should contain hash soft link to CA certifiates
    context.load_verify_info(capath='./')
    context.set_verify(SSL.verify_peer, 3)
    # context.set_verify(SSL.verify_none, 3)

    # using MyHTTPS to send request
    send_request(context)