summaryrefslogtreecommitdiff
path: root/gnutls-1.1.9/examples/twisted-server.py
diff options
context:
space:
mode:
Diffstat (limited to 'gnutls-1.1.9/examples/twisted-server.py')
-rwxr-xr-xgnutls-1.1.9/examples/twisted-server.py59
1 files changed, 0 insertions, 59 deletions
diff --git a/gnutls-1.1.9/examples/twisted-server.py b/gnutls-1.1.9/examples/twisted-server.py
deleted file mode 100755
index 67e14e6..0000000
--- a/gnutls-1.1.9/examples/twisted-server.py
+++ /dev/null
@@ -1,59 +0,0 @@
-#!/usr/bin/env python
-
-"""Asynchronous server using Twisted with GNUTLS"""
-
-import sys
-import os
-
-from twisted.internet.protocol import Factory
-from twisted.protocols.basic import LineOnlyReceiver
-from twisted.internet.error import CannotListenError, ConnectionDone
-from twisted.internet import reactor
-
-from gnutls.constants import *
-from gnutls.crypto import *
-from gnutls.errors import *
-from gnutls.interfaces.twisted import X509Credentials
-
-class EchoProtocol(LineOnlyReceiver):
-
- def connectionMade(self):
- session = self.transport.socket
- try:
- peer_name = session.peer_certificate.subject
- except AttributeError:
- peer_name = 'Unknown'
- print '\nNew connection from:', peer_name
- print 'Protocol: ', session.protocol
- print 'KX algorithm: ', session.kx_algorithm
- print 'Cipher: ', session.cipher
- print 'MAC algorithm:', session.mac_algorithm
- print 'Compression: ', session.compression
-
- def lineReceived(self, line):
- if line == 'quit':
- self.transport.loseConnection()
- return
- self.sendLine(line)
-
- def connectionLost(self, reason):
- if reason.type != ConnectionDone:
- print "Connection was lost:", str(reason.value)
-
-class EchoFactory(Factory):
- protocol = EchoProtocol
-
-script_path = os.path.realpath(os.path.dirname(sys.argv[0]))
-certs_path = os.path.join(script_path, 'certs')
-
-cert = X509Certificate(open(certs_path + '/valid.crt').read())
-key = X509PrivateKey(open(certs_path + '/valid.key').read())
-ca = X509Certificate(open(certs_path + '/ca.pem').read())
-crl = X509CRL(open(certs_path + '/crl.pem').read())
-cred = X509Credentials(cert, key, [ca], [crl])
-cred.verify_peer = True
-cred.session_params.compressions = (COMP_LZO, COMP_DEFLATE, COMP_NULL)
-
-reactor.listenTLS(10000, EchoFactory(), cred)
-reactor.run()
-