59 lines
1.4 KiB
Python
59 lines
1.4 KiB
Python
|
# Test creating an SSL connection with an invalid certificate.
|
||
|
|
||
|
try:
|
||
|
import os
|
||
|
import socket
|
||
|
import ssl
|
||
|
except ImportError:
|
||
|
print("SKIP")
|
||
|
raise SystemExit
|
||
|
|
||
|
PORT = 8000
|
||
|
|
||
|
# These are test certificates. See tests/README.md for details.
|
||
|
cert = cafile = "multi_net/rsa_cert.der"
|
||
|
key = "multi_net/rsa_key.der"
|
||
|
|
||
|
try:
|
||
|
os.stat(cafile)
|
||
|
os.stat(key)
|
||
|
except OSError:
|
||
|
print("SKIP")
|
||
|
raise SystemExit
|
||
|
|
||
|
|
||
|
# Server
|
||
|
def instance0():
|
||
|
multitest.globals(IP=multitest.get_network_ip())
|
||
|
s = socket.socket()
|
||
|
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
|
||
|
s.bind(socket.getaddrinfo("0.0.0.0", PORT)[0][-1])
|
||
|
s.listen(1)
|
||
|
multitest.next()
|
||
|
s2, _ = s.accept()
|
||
|
server_ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
|
||
|
server_ctx.load_cert_chain(cert, key)
|
||
|
try:
|
||
|
s2 = server_ctx.wrap_socket(s2, server_side=True)
|
||
|
except Exception as e:
|
||
|
print(e)
|
||
|
multitest.broadcast("finished")
|
||
|
s.close()
|
||
|
|
||
|
|
||
|
# Client
|
||
|
def instance1():
|
||
|
multitest.next()
|
||
|
s = socket.socket()
|
||
|
s.connect(socket.getaddrinfo(IP, PORT)[0][-1])
|
||
|
client_ctx = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
|
||
|
client_ctx.verify_mode = ssl.CERT_REQUIRED
|
||
|
client_ctx.load_verify_locations(cafile=cafile)
|
||
|
try:
|
||
|
s = client_ctx.wrap_socket(s, server_hostname="foobar.local")
|
||
|
except Exception as e:
|
||
|
print(e)
|
||
|
# Don't close the socket until the server has seen our SSL rejection.
|
||
|
multitest.wait("finished")
|
||
|
s.close()
|