From: Yannick G. <yan...@sa...> - 2003-07-30 14:08:19
|
=2D----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On July 30, 2003 08:05 am, you wrote: > For my application, I created a class sslTransport and used this in > creating the server object. > > class sslTransport(xmlrpclib.SafeTransport): > """Enables ssl transport with client certificates.""" > > def __init__(self, x509): > """Added to enable client SSL certificates.""" > self.x509 =3D x509 > > def make_connection(self, host): > """Extended to include x509 certificate.""" > return xmlrpclib.SafeTransport.make_connection(self, (host, > self.x509)) > > > And the client code: > > x509 =3D {'key_file': 'client.pkey', > 'cert_file':'client.cert'} > > server =3D xmlrpclib.ServerProxy('https://host:port', > sslTransport(x509)) This works great if you want to supply a custom client certificate. What I try to do is to check the signature of the peer certificate against our CA. Ever done this in Python ? Thanks for your time ! =2D --=20 Yannick Gingras Byte Gardener, Savoir-faire Linux inc. (514) 276-5468 =2D----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE/J9FRrhy5Fqn/MRARAuQOAJ96EBzFTKAYQ6Q1TaJkQj0ztV9FawCfZqAo pb2UiVvVds29LWzKke1jAeg=3D =3DMYHc =2D----END PGP SIGNATURE----- |