当前位置: 首页>>代码示例>>Python>>正文


Python ClientHelper._handshake方法代码示例

本文整理汇总了Python中tlslite.integration.clienthelper.ClientHelper._handshake方法的典型用法代码示例。如果您正苦于以下问题:Python ClientHelper._handshake方法的具体用法?Python ClientHelper._handshake怎么用?Python ClientHelper._handshake使用的例子?那么, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在tlslite.integration.clienthelper.ClientHelper的用法示例。


在下文中一共展示了ClientHelper._handshake方法的10个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。

示例1: connect

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
 def connect(self):
      httplib.HTTPConnection.connect(self)
      sock = self.sock
      self.sock = TLSConnection(self.sock)
      self.sock.fileno = lambda: sock.fd
      self.sock.wait_for_read = sock.wait_for_read
      self.sock.wait_for_write = sock.wait_for_write
      self.sock.ignoreAbruptClose = self.ignoreAbruptClose
      ClientHelper._handshake(self, self.sock)
开发者ID:halayli,项目名称:shrapnel,代码行数:11,代码来源:https.py

示例2: open

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
    def open(self, host = '', port = IMAP4_TLS_PORT):
        """Setup connection to remote server on "host:port".

        This connection will be used by the routines:
        read, readline, send, shutdown.
        """
        self.host = host
        self.port = port
        self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        self.sock.connect((host, port))
        self.sock = TLSConnection(self.sock)
        ClientHelper._handshake(self, self.sock)
        self.file = self.sock.makefile('rb')
开发者ID:hagayo,项目名称:gdata-python-client,代码行数:15,代码来源:imap4_tls.py

示例3: wrap_socket

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
def wrap_socket(sock,
    keyfile = None,
    certfile = None,
    server_side = False,
    cert_reqs = CERT_NONE,
    ssl_version = PROTOCOL_SSLv23,
    ca_certs = None,
    do_handshake_on_connect = True,
    suppress_ragged_eofs = True,
    ciphers = None,
    fingerprint = None):

    try:
        sock = TLSConnection(sock)

        if do_handshake_on_connect:
            checker = None if fingerprint is None else tlslite.CheckerXfw(x509Fingerprint=fingerprint)
            helper = ClientHelper(checker=checker)
            helper._handshake(sock)
    except:
        sock = None
        raise

    return sock
开发者ID:renaissance-design,项目名称:woepack,代码行数:26,代码来源:ssl.py

示例4: connect

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
 def connect(self):
     httplib.HTTPConnection.connect(self)
     self.sock = TLSConnection(self.sock)
     self.sock.ignoreAbruptClose = self.ignoreAbruptClose
     ClientHelper._handshake(self, self.sock)
开发者ID:LennyNiu,项目名称:tlslite-ng,代码行数:7,代码来源:httptlsconnection.py

示例5: starttls

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]

#.........这里部分代码省略.........

        For client authentication, use one of these argument
        combinations:
         - username, password (SRP)
         - username, sharedKey (shared-key)
         - certChain, privateKey (certificate)

        For server authentication, you can either rely on the
        implicit mutual authentication performed by SRP or
        shared-keys, or you can do certificate-based server
        authentication with one of these argument combinations:
         - cryptoID[, protocol] (requires cryptoIDlib)
         - x509Fingerprint
         - x509TrustList[, x509CommonName] (requires cryptlib_py)

        Certificate-based server authentication is compatible with
        SRP or certificate-based client authentication.  It is
        not compatible with shared-keys.

        The caller should be prepared to handle TLS-specific
        exceptions.  See the client handshake functions in
        L{tlslite.TLSConnection.TLSConnection} for details on which
        exceptions might be raised.

        @type username: str
        @param username: SRP or shared-key username.  Requires the
        'password' or 'sharedKey' argument.

        @type password: str
        @param password: SRP password for mutual authentication.
        Requires the 'username' argument.

        @type sharedKey: str
        @param sharedKey: Shared key for mutual authentication.
        Requires the 'username' argument.

        @type certChain: L{tlslite.X509CertChain.X509CertChain} or
        L{cryptoIDlib.CertChain.CertChain}
        @param certChain: Certificate chain for client authentication.
        Requires the 'privateKey' argument.  Excludes the SRP or
        shared-key related arguments.

        @type privateKey: L{tlslite.utils.RSAKey.RSAKey}
        @param privateKey: Private key for client authentication.
        Requires the 'certChain' argument.  Excludes the SRP or
        shared-key related arguments.

        @type cryptoID: str
        @param cryptoID: cryptoID for server authentication.  Mutually
        exclusive with the 'x509...' arguments.

        @type protocol: str
        @param protocol: cryptoID protocol URI for server
        authentication.  Requires the 'cryptoID' argument.

        @type x509Fingerprint: str
        @param x509Fingerprint: Hex-encoded X.509 fingerprint for
        server authentication.  Mutually exclusive with the 'cryptoID'
        and 'x509TrustList' arguments.

        @type x509TrustList: list of L{tlslite.X509.X509}
        @param x509TrustList: A list of trusted root certificates.  The
        other party must present a certificate chain which extends to
        one of these root certificates.  The cryptlib_py module must be
        installed to use this parameter.  Mutually exclusive with the
        'cryptoID' and 'x509Fingerprint' arguments.

        @type x509CommonName: str
        @param x509CommonName: The end-entity certificate's 'CN' field
        must match this value.  For a web server, this is typically a
        server name such as 'www.amazon.com'.  Mutually exclusive with
        the 'cryptoID' and 'x509Fingerprint' arguments.  Requires the
        'x509TrustList' argument.

        @type settings: L{tlslite.HandshakeSettings.HandshakeSettings}
        @param settings: Various settings which can be used to control
        the ciphersuites, certificate types, and SSL/TLS versions
        offered by the client.
        """
        (resp, reply) = self.docmd("STARTTLS")
        if resp == 220:
            helper = ClientHelper(
                username,
                password,
                sharedKey,
                certChain,
                privateKey,
                cryptoID,
                protocol,
                x509Fingerprint,
                x509TrustList,
                x509CommonName,
                settings,
            )
            conn = TLSConnection(self.sock)
            conn.closeSocket = True
            helper._handshake(conn)
            self.sock = conn
            self.file = conn.makefile("rb")
        return (resp, reply)
开发者ID:vinc30,项目名称:chromium,代码行数:104,代码来源:smtp_tls.py

示例6: starttls

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
    def starttls(self,
                 username=None, password=None,
                 certChain=None, privateKey=None,
                 checker=None,
                 settings=None):
        """Puts the connection to the SMTP server into TLS mode.

        If the server supports TLS, this will encrypt the rest of the SMTP
        session.

        For client authentication, use one of these argument
        combinations:
         - username, password (SRP)
         - certChain, privateKey (certificate)

        For server authentication, you can either rely on the
        implicit mutual authentication performed by SRP or
        you can do certificate-based server
        authentication with one of these argument combinations:
         - x509Fingerprint

        Certificate-based server authentication is compatible with
        SRP or certificate-based client authentication.

        The caller should be prepared to handle TLS-specific
        exceptions.  See the client handshake functions in
        L{tlslite.TLSConnection.TLSConnection} for details on which
        exceptions might be raised.

        @type username: str
        @param username: SRP username.  Requires the
        'password' argument.

        @type password: str
        @param password: SRP password for mutual authentication.
        Requires the 'username' argument.

        @type certChain: L{tlslite.x509certchain.X509CertChain}
        @param certChain: Certificate chain for client authentication.
        Requires the 'privateKey' argument.  Excludes the SRP arguments.

        @type privateKey: L{tlslite.utils.rsakey.RSAKey}
        @param privateKey: Private key for client authentication.
        Requires the 'certChain' argument.  Excludes the SRP arguments.

        @type checker: L{tlslite.checker.Checker}
        @param checker: Callable object called after handshaking to 
        evaluate the connection and raise an Exception if necessary.

        @type settings: L{tlslite.handshakesettings.HandshakeSettings}
        @param settings: Various settings which can be used to control
        the ciphersuites, certificate types, and SSL/TLS versions
        offered by the client.
        """
        (resp, reply) = self.docmd("STARTTLS")
        if resp == 220:
            helper = ClientHelper(
                     username, password, 
                     certChain, privateKey,
                     checker,
                     settings)
            conn = TLSConnection(self.sock)
            helper._handshake(conn)
            self.sock = conn
            self.file = conn.makefile('rb')
        return (resp, reply)
开发者ID:hagayo,项目名称:gdata-python-client,代码行数:68,代码来源:smtp_tls.py

示例7: __init__

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
    def __init__(self, host, port = POP3_SSL_PORT,
                 timeout=socket._GLOBAL_DEFAULT_TIMEOUT,
                 username=None, password=None,
                 certChain=None, privateKey=None,
                 checker=None,
                 settings=None):
        """Create a new POP3_TLS.

        For client authentication, use one of these argument
        combinations:

         - username, password (SRP)
         - certChain, privateKey (certificate)

        For server authentication, you can either rely on the
        implicit mutual authentication performed by SRP or
        you can do certificate-based server
        authentication with one of these argument combinations:

         - x509Fingerprint

        Certificate-based server authentication is compatible with
        SRP or certificate-based client authentication.

        The caller should be prepared to handle TLS-specific
        exceptions.  See the client handshake functions in
        :py:class:`~tlslite.tlsconnection.TLSConnection`
        for details on which
        exceptions might be raised.

        :type host: str
        :param host: Server to connect to.

        :type port: int
        :param port: Port to connect to.

        :type username: str
        :param username: SRP username.

        :type password: str
        :param password: SRP password for mutual authentication.
            Requires the 'username' argument.

        :type certChain: ~tlslite.x509certchain.X509CertChain
        :param certChain: Certificate chain for client authentication.
            Requires the 'privateKey' argument.  Excludes the SRP argument.

        :type privateKey: ~tlslite.utils.rsakey.RSAKey
        :param privateKey: Private key for client authentication.
            Requires the 'certChain' argument.  Excludes the SRP argument.

        :type checker: ~tlslite.checker.Checker
        :param checker: Callable object called after handshaking to
            evaluate the connection and raise an Exception if necessary.

        :type settings: ~tlslite.handshakesettings.HandshakeSettings
        :param settings: Various settings which can be used to control
            the ciphersuites, certificate types, and SSL/TLS versions
            offered by the client.
        """
        self.host = host
        self.port = port
        sock = socket.create_connection((host, port), timeout)
        ClientHelper.__init__(self,
                 username, password,
                 certChain, privateKey,
                 checker,
                 settings)
        connection = TLSConnection(sock) 
        ClientHelper._handshake(self, connection)
        self.sock = connection
        self.file = self.sock.makefile('rb')
        self._debugging = 0
        self.welcome = self._getresp()
开发者ID:tomato42,项目名称:tlslite-ng,代码行数:76,代码来源:pop3_tls.py

示例8: __init__

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
    def __init__(self, host, port = POP3_SSL_PORT,
                 timeout=socket._GLOBAL_DEFAULT_TIMEOUT,
                 username=None, password=None,
                 certChain=None, privateKey=None,
                 x509Fingerprint=None,
                 tackID=None,
                 hardTack=None,
                 settings=None):
        """Create a new POP3_TLS.

        For client authentication, use one of these argument
        combinations:
         - username, password (SRP)
         - certChain, privateKey (certificate)

        For server authentication, you can either rely on the
        implicit mutual authentication performed by SRP or
        you can do certificate-based server
        authentication with one of these argument combinations:
         - x509Fingerprint

        Certificate-based server authentication is compatible with
        SRP or certificate-based client authentication.

        The caller should be prepared to handle TLS-specific
        exceptions.  See the client handshake functions in
        L{tlslite.TLSConnection.TLSConnection} for details on which
        exceptions might be raised.

        @type host: str
        @param host: Server to connect to.

        @type port: int
        @param port: Port to connect to.

        @type username: str
        @param username: SRP username.
        
        @type password: str
        @param password: SRP password for mutual authentication.
        Requires the 'username' argument.

        @type certChain: L{tlslite.x509certchain.X509CertChain}
        @param certChain: Certificate chain for client authentication.
        Requires the 'privateKey' argument.  Excludes the SRP argument.

        @type privateKey: L{tlslite.utils.rsakey.RSAKey}
        @param privateKey: Private key for client authentication.
        Requires the 'certChain' argument.  Excludes the SRP argument.

        @type x509Fingerprint: str
        @param x509Fingerprint: Hex-encoded X.509 fingerprint for
        server authentication.

        @type tackID: str
        @param tackID: TACK ID for server authentication.

        @type hardTack: bool
        @param hardTack: Whether to raise TackBreakSigError on TACK Break.        

        @type settings: L{tlslite.handshakesettings.HandshakeSettings}
        @param settings: Various settings which can be used to control
        the ciphersuites, certificate types, and SSL/TLS versions
        offered by the client.
        """
        self.host = host
        self.port = port
        sock = socket.create_connection((host, port), timeout)
        ClientHelper.__init__(self,
                 username, password,
                 certChain, privateKey,
                 x509Fingerprint,
                 tackID, hardTack,
                 settings)
        connection = TLSConnection(sock) 
        ClientHelper._handshake(self, connection)
        self.sock = connection
        self.file = self.sock.makefile('rb')
        self._debugging = 0
        self.welcome = self._getresp()
开发者ID:johnrandolph,项目名称:tlslite,代码行数:82,代码来源:pop3_tls.py

示例9: connect

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
 def connect(self):
      httplib.HTTPConnection.connect(self)
      self.sock = TLSConnection(self.sock)
      ClientHelper._handshake(self, self.sock)
开发者ID:johnrandolph,项目名称:tlslite,代码行数:6,代码来源:httptlsconnection.py

示例10: _handshake

# 需要导入模块: from tlslite.integration.clienthelper import ClientHelper [as 别名]
# 或者: from tlslite.integration.clienthelper.ClientHelper import _handshake [as 别名]
 def _handshake(self, tlsConnection):
     ClientHelper._handshake(self, tlsConnection)
开发者ID:Tomeno,项目名称:chromium,代码行数:4,代码来源:httptlsconnection.py


注:本文中的tlslite.integration.clienthelper.ClientHelper._handshake方法示例由纯净天空整理自Github/MSDocs等开源代码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。