Python OpenSSL.SSL.TLSv1_METHOD() Examples
The following are 25
code examples of OpenSSL.SSL.TLSv1_METHOD().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
OpenSSL.SSL
, or try the search function
.
Example #1
Source File: xmlstream.py From BitTorrent with GNU General Public License v3.0 | 6 votes |
def startTLS(self): def proceed(obj): print "proceed" ctx = ssl.ClientContextFactory() ctx.method = SSL.TLSv1_METHOD # We only do TLS, no SSL self.transport.startTLS(ctx) self.reset() self.tlsEstablished = 1 self.sendHeader() def failure(obj): self.factory.stopTrying() self.dispatch(obj, TLS_FAILED_EVENT) self.addOnetimeObserver("/proceed", proceed) self.addOnetimeObserver("/failure", failure) self.send("<starttls xmlns='%s'/>" % NS_XMPP_TLS)
Example #2
Source File: openssl.py From pysslscan with GNU Lesser General Public License v3.0 | 6 votes |
def convert_version2method(protocol_version): """ Convert internal protocol version ID to OpenSSL method. :param Integer protocol_version: Version ID :return: OpenSSL method or None if not found :rtype: OpenSSL method or None """ if protocol_version == flextls.registry.version.SSLv2: return SSL.SSLv2_METHOD if protocol_version == flextls.registry.version.SSLv3: return SSL.SSLv3_METHOD if protocol_version == flextls.registry.version.TLSv10: return SSL.TLSv1_METHOD if protocol_version == flextls.registry.version.TLSv11: return SSL.TLSv1_1_METHOD if protocol_version == flextls.registry.version.TLSv12: return SSL.TLSv1_2_METHOD return None
Example #3
Source File: test_sslverify.py From learn_python3_spider with MIT License | 5 votes |
def test_caCertsPlatformDefaults(self): """ Specifying a C{trustRoot} of L{sslverify.OpenSSLDefaultPaths} when initializing L{sslverify.OpenSSLCertificateOptions} loads the platform-provided trusted certificates via C{set_default_verify_paths}. """ opts = sslverify.OpenSSLCertificateOptions( trustRoot=sslverify.OpenSSLDefaultPaths(), ) fc = FakeContext(SSL.TLSv1_METHOD) opts._contextFactory = lambda method: fc opts.getContext() self.assertTrue(fc._defaultVerifyPathsSet)
Example #4
Source File: context-info-callback.py From pyopenssl with Apache License 2.0 | 5 votes |
def go(): port = socket() port.bind(('', 0)) port.listen(1) called = [] def info(conn, where, ret): print count.next() called.append(None) context = Context(TLSv1_METHOD) context.set_info_callback(info) context.use_certificate( load_certificate(FILETYPE_PEM, cleartextCertificatePEM)) context.use_privatekey( load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)) while 1: client = socket() client.setblocking(False) client.connect_ex(port.getsockname()) clientSSL = Connection(Context(TLSv1_METHOD), client) clientSSL.set_connect_state() server, ignored = port.accept() server.setblocking(False) serverSSL = Connection(context, server) serverSSL.set_accept_state() del called[:] while not called: for ssl in clientSSL, serverSSL: try: ssl.do_handshake() except WantReadError: pass
Example #5
Source File: thread-crash.py From pyopenssl with Apache License 2.0 | 5 votes |
def main(): port = socket() port.bind(('', 0)) port.listen(5) client = socket() client.setblocking(False) client.connect_ex(port.getsockname()) client.setblocking(True) server = port.accept()[0] clientCtx = Context(TLSv1_METHOD) clientCtx.set_cipher_list('ALL:ADH') clientCtx.load_tmp_dh('dhparam.pem') sslClient = Connection(clientCtx, client) sslClient.set_connect_state() serverCtx = Context(TLSv1_METHOD) serverCtx.set_cipher_list('ALL:ADH') serverCtx.load_tmp_dh('dhparam.pem') sslServer = Connection(serverCtx, server) sslServer.set_accept_state() t1 = Thread(target=send, args=(sslClient,)) t2 = Thread(target=send, args=(sslServer,)) t3 = Thread(target=recv, args=(sslClient,)) t4 = Thread(target=recv, args=(sslServer,)) t1.start() t2.start() t3.start() t4.start() t1.join() t2.join() t3.join() t4.join()
Example #6
Source File: context-passphrase-callback.py From pyopenssl with Apache License 2.0 | 5 votes |
def go(): def cb(a, b, c): print count.next() return "foobar" c = Context(TLSv1_METHOD) c.set_passwd_cb(cb) while 1: c.use_privatekey_file('pkey.pem')
Example #7
Source File: context-verify-callback.py From pyopenssl with Apache License 2.0 | 5 votes |
def go(): port = socket() port.bind(('', 0)) port.listen(1) called = [] def info(*args): print count.next() called.append(None) return 1 context = Context(TLSv1_METHOD) context.set_verify(VERIFY_PEER, info) context.use_certificate( load_certificate(FILETYPE_PEM, cleartextCertificatePEM)) context.use_privatekey( load_privatekey(FILETYPE_PEM, cleartextPrivateKeyPEM)) while 1: client = socket() client.setblocking(False) client.connect_ex(port.getsockname()) clientSSL = Connection(context, client) clientSSL.set_connect_state() server, ignored = port.accept() server.setblocking(False) serverSSL = Connection(context, server) serverSSL.set_accept_state() del called[:] while not called: for ssl in clientSSL, serverSSL: try: ssl.send('foo') except WantReadError, e: pass
Example #8
Source File: test_ssl.py From BitTorrent with GNU General Public License v3.0 | 5 votes |
def __init__(self, *args, **kw): kw['sslmethod'] = SSL.TLSv1_METHOD ssl.DefaultOpenSSLContextFactory.__init__(self, *args, **kw)
Example #9
Source File: test_ssl.py From python-for-android with Apache License 2.0 | 5 votes |
def __init__(self, *args, **kw): kw['sslmethod'] = SSL.TLSv1_METHOD ssl.DefaultOpenSSLContextFactory.__init__(self, *args, **kw)
Example #10
Source File: test_tls.py From python-for-android with Apache License 2.0 | 5 votes |
def getContext(self): """ Create and return an SSL context configured to use L{self._info} as the info callback. """ context = Context(TLSv1_METHOD) context.set_info_callback(self._info) return context
Example #11
Source File: printer_server.py From miaomiaoji-tool with MIT License | 5 votes |
def main(): cert = "/etc/ssl/ihc/crt" key = "/etc/ssl/ihc/key" httpserver = webserver.Site(HTTPServer()) context = Context(TLSv1_METHOD) context.use_certificate_chain_file(cert) context.use_privatekey_file(key) reactor.listenSSL(HTTP_PORT, httpserver, ContextFactory(context), interface='192.168.102.130') reactor.run()
Example #12
Source File: riemann.py From tensor with MIT License | 5 votes |
def getContext(self): self.method = SSL.TLSv1_METHOD ctx = ssl.ClientContextFactory.getContext(self) ctx.use_certificate_file(self.cert) ctx.use_privatekey_file(self.key) return ctx
Example #13
Source File: getca.py From satellite-demo with MIT License | 5 votes |
def printcert(host, port, hostname): con = Connection(Context(TLSv1_METHOD), socket(AF_INET, SOCK_STREAM)) con.connect((host, port)) con.set_tlsext_host_name(hostname if hostname else host) con.do_handshake() con.shutdown() con.close() print dump_certificate(FILETYPE_PEM, walkchain(con.get_peer_cert_chain()))
Example #14
Source File: ssl_helpers.py From learn_python3_spider with MIT License | 5 votes |
def getContext(self): return SSL.Context(SSL.TLSv1_METHOD)
Example #15
Source File: sender.py From bitmask-dev with GNU General Public License v3.0 | 5 votes |
def getContext(self): # FIXME -- we should use sslv23 to allow for tlsv1.2 # and, if possible, explicitely disable sslv3 clientside. # Servers should avoid sslv3 self.method = SSL.TLSv1_METHOD # SSLv23_METHOD ctx = ssl.ClientContextFactory.getContext(self) ctx.use_certificate_file(self.cert) ctx.use_privatekey_file(self.key) return ctx
Example #16
Source File: test_sslverify.py From learn_python3_spider with MIT License | 5 votes |
def loopbackTLSConnection(trustRoot, privateKeyFile, chainedCertFile=None): """ Create a loopback TLS connection with the given trust and keys. @param trustRoot: the C{trustRoot} argument for the client connection's context. @type trustRoot: L{sslverify.IOpenSSLTrustRoot} @param privateKeyFile: The name of the file containing the private key. @type privateKeyFile: L{str} (native string; file name) @param chainedCertFile: The name of the chained certificate file. @type chainedCertFile: L{str} (native string; file name) @return: 3-tuple of server-protocol, client-protocol, and L{IOPump} @rtype: L{tuple} """ class ContextFactory(object): def getContext(self): """ Create a context for the server side of the connection. @return: an SSL context using a certificate and key. @rtype: C{OpenSSL.SSL.Context} """ ctx = SSL.Context(SSL.TLSv1_METHOD) if chainedCertFile is not None: ctx.use_certificate_chain_file(chainedCertFile) ctx.use_privatekey_file(privateKeyFile) # Let the test author know if they screwed something up. ctx.check_privatekey() return ctx serverOpts = ContextFactory() clientOpts = sslverify.OpenSSLCertificateOptions(trustRoot=trustRoot) return _loopbackTLSConnection(serverOpts, clientOpts)
Example #17
Source File: test_ssl.py From learn_python3_spider with MIT License | 5 votes |
def __init__(self, *args, **kw): kw['sslmethod'] = SSL.TLSv1_METHOD ssl.DefaultOpenSSLContextFactory.__init__(self, *args, **kw)
Example #18
Source File: _sslverify.py From learn_python3_spider with MIT License | 5 votes |
def _expandCipherString(cipherString, method, options): """ Expand C{cipherString} according to C{method} and C{options} to a list of explicit ciphers that are supported by the current platform. @param cipherString: An OpenSSL cipher string to expand. @type cipherString: L{unicode} @param method: An OpenSSL method like C{SSL.TLSv1_METHOD} used for determining the effective ciphers. @param options: OpenSSL options like C{SSL.OP_NO_SSLv3} ORed together. @type options: L{int} @return: The effective list of explicit ciphers that results from the arguments on the current platform. @rtype: L{list} of L{ICipher} """ ctx = SSL.Context(method) ctx.set_options(options) try: ctx.set_cipher_list(cipherString.encode('ascii')) except SSL.Error as e: # OpenSSL 1.1.1 turns an invalid cipher list into TLS 1.3 # ciphers, so pyOpenSSL >= 19.0.0 raises an artificial Error # that lacks a corresponding OpenSSL error if the cipher list # consists only of these after a call to set_cipher_list. if not e.args[0]: return [] if e.args[0][0][2] == 'no cipher match': return [] else: raise conn = SSL.Connection(ctx, None) ciphers = conn.get_cipher_list() if isinstance(ciphers[0], unicode): return [OpenSSLCipher(cipher) for cipher in ciphers] else: return [OpenSSLCipher(cipher.decode('ascii')) for cipher in ciphers]
Example #19
Source File: test_validation.py From flocker with Apache License 2.0 | 5 votes |
def getContext(self): ctx = Context(TLSv1_METHOD) ctx.use_certificate(self.flocker_credential.certificate.original) ctx.use_privatekey(self.flocker_credential.keypair.keypair.original) return ctx
Example #20
Source File: ssl_helpers.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 5 votes |
def getContext(self): return SSL.Context(SSL.TLSv1_METHOD)
Example #21
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 5 votes |
def test_caCertsPlatformDefaults(self): """ Specifying a C{trustRoot} of L{sslverify.OpenSSLDefaultPaths} when initializing L{sslverify.OpenSSLCertificateOptions} loads the platform-provided trusted certificates via C{set_default_verify_paths}. """ opts = sslverify.OpenSSLCertificateOptions( trustRoot=sslverify.OpenSSLDefaultPaths(), ) fc = FakeContext(SSL.TLSv1_METHOD) opts._contextFactory = lambda method: fc opts.getContext() self.assertTrue(fc._defaultVerifyPathsSet)
Example #22
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 5 votes |
def loopbackTLSConnection(trustRoot, privateKeyFile, chainedCertFile=None): """ Create a loopback TLS connection with the given trust and keys. @param trustRoot: the C{trustRoot} argument for the client connection's context. @type trustRoot: L{sslverify.IOpenSSLTrustRoot} @param privateKeyFile: The name of the file containing the private key. @type privateKeyFile: L{str} (native string; file name) @param chainedCertFile: The name of the chained certificate file. @type chainedCertFile: L{str} (native string; file name) @return: 3-tuple of server-protocol, client-protocol, and L{IOPump} @rtype: L{tuple} """ class ContextFactory(object): def getContext(self): """ Create a context for the server side of the connection. @return: an SSL context using a certificate and key. @rtype: C{OpenSSL.SSL.Context} """ ctx = SSL.Context(SSL.TLSv1_METHOD) if chainedCertFile is not None: ctx.use_certificate_chain_file(chainedCertFile) ctx.use_privatekey_file(privateKeyFile) # Let the test author know if they screwed something up. ctx.check_privatekey() return ctx serverOpts = ContextFactory() clientOpts = sslverify.OpenSSLCertificateOptions(trustRoot=trustRoot) return _loopbackTLSConnection(serverOpts, clientOpts)
Example #23
Source File: test_ssl.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 5 votes |
def __init__(self, *args, **kw): kw['sslmethod'] = SSL.TLSv1_METHOD ssl.DefaultOpenSSLContextFactory.__init__(self, *args, **kw)
Example #24
Source File: _sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 5 votes |
def _expandCipherString(cipherString, method, options): """ Expand C{cipherString} according to C{method} and C{options} to a list of explicit ciphers that are supported by the current platform. @param cipherString: An OpenSSL cipher string to expand. @type cipherString: L{unicode} @param method: An OpenSSL method like C{SSL.TLSv1_METHOD} used for determining the effective ciphers. @param options: OpenSSL options like C{SSL.OP_NO_SSLv3} ORed together. @type options: L{int} @return: The effective list of explicit ciphers that results from the arguments on the current platform. @rtype: L{list} of L{ICipher} """ ctx = SSL.Context(method) ctx.set_options(options) try: ctx.set_cipher_list(cipherString.encode('ascii')) except SSL.Error as e: if e.args[0][0][2] == 'no cipher match': return [] else: raise conn = SSL.Connection(ctx, None) ciphers = conn.get_cipher_list() if isinstance(ciphers[0], unicode): return [OpenSSLCipher(cipher) for cipher in ciphers] else: return [OpenSSLCipher(cipher.decode('ascii')) for cipher in ciphers]
Example #25
Source File: test_tsafe.py From oss-ftp with MIT License | 5 votes |
def test_instantiation(self): """ :py:obj:`OpenSSL.tsafe.Connection` can be instantiated. """ # The following line should not throw an error. This isn't an ideal # test. It would be great to refactor the other Connection tests so # they could automatically be applied to this class too. Connection(Context(TLSv1_METHOD), None)