2003-07-23 20:12:24 +04:00
|
|
|
#!/usr/bin/env ruby
|
|
|
|
|
|
|
|
require 'socket'
|
|
|
|
require 'openssl'
|
2007-12-24 10:31:23 +03:00
|
|
|
require 'optparse'
|
2003-07-23 20:12:24 +04:00
|
|
|
|
2007-12-24 10:31:23 +03:00
|
|
|
options = ARGV.getopts("p:c:k:C:")
|
2003-07-23 20:12:24 +04:00
|
|
|
|
|
|
|
host = ARGV[0] || "localhost"
|
2007-12-24 10:31:23 +03:00
|
|
|
port = options["p"] || "2000"
|
|
|
|
cert_file = options["c"]
|
|
|
|
key_file = options["k"]
|
|
|
|
ca_path = options["C"]
|
2003-07-23 20:12:24 +04:00
|
|
|
|
|
|
|
ctx = OpenSSL::SSL::SSLContext.new()
|
|
|
|
if cert_file && key_file
|
|
|
|
ctx.cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
|
|
|
|
ctx.key = OpenSSL::PKey::RSA.new(File::read(key_file))
|
|
|
|
end
|
|
|
|
if ca_path
|
|
|
|
ctx.verify_mode = OpenSSL::SSL::VERIFY_PEER
|
|
|
|
ctx.ca_path = ca_path
|
|
|
|
else
|
|
|
|
$stderr.puts "!!! WARNING: PEER CERTIFICATE WON'T BE VERIFIED !!!"
|
|
|
|
end
|
|
|
|
|
|
|
|
s = TCPSocket.new(host, port)
|
|
|
|
ssl = OpenSSL::SSL::SSLSocket.new(s, ctx)
|
2003-08-19 02:49:48 +04:00
|
|
|
ssl.connect # start SSL session
|
2007-12-24 10:31:23 +03:00
|
|
|
p ssl.peer_cert
|
|
|
|
errors = Hash.new
|
|
|
|
OpenSSL::X509.constants.grep(/^V_(ERR_|OK)/).each do |name|
|
|
|
|
errors[OpenSSL::X509.const_get(name)] = name
|
|
|
|
end
|
|
|
|
p errors[ssl.verify_result]
|
|
|
|
|
2003-08-19 02:49:48 +04:00
|
|
|
ssl.sync_close = true # if true the underlying socket will be
|
|
|
|
# closed in SSLSocket#close. (default: false)
|
2003-07-23 20:12:24 +04:00
|
|
|
while line = $stdin.gets
|
|
|
|
ssl.write line
|
2007-12-24 10:31:23 +03:00
|
|
|
puts ssl.gets.inspect
|
2003-07-23 20:12:24 +04:00
|
|
|
end
|
|
|
|
|
|
|
|
ssl.close
|