|
From: Yannick G. <yan...@sa...> - 2003-07-30 14:08:19
|
=2D----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On July 30, 2003 08:05 am, you wrote:
> For my application, I created a class sslTransport and used this in
> creating the server object.
>
> class sslTransport(xmlrpclib.SafeTransport):
> """Enables ssl transport with client certificates."""
>
> def __init__(self, x509):
> """Added to enable client SSL certificates."""
> self.x509 =3D x509
>
> def make_connection(self, host):
> """Extended to include x509 certificate."""
> return xmlrpclib.SafeTransport.make_connection(self, (host,
> self.x509))
>
>
> And the client code:
>
> x509 =3D {'key_file': 'client.pkey',
> 'cert_file':'client.cert'}
>
> server =3D xmlrpclib.ServerProxy('https://host:port',
> sslTransport(x509))
This works great if you want to supply a custom client certificate.
What I try to do is to check the signature of the peer certificate
against our CA. Ever done this in Python ?
Thanks for your time !
=2D --=20
Yannick Gingras
Byte Gardener, Savoir-faire Linux inc.
(514) 276-5468
=2D----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE/J9FRrhy5Fqn/MRARAuQOAJ96EBzFTKAYQ6Q1TaJkQj0ztV9FawCfZqAo
pb2UiVvVds29LWzKke1jAeg=3D
=3DMYHc
=2D----END PGP SIGNATURE-----
|