mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00

(ossl_x509store_set_time): add OpenSSL::X509::Store#time=. (ossl_x509stctx_set_time): add OpenSSL::X509::StoreContext#time=. * test/openssl/ossl_x509store.rb: test certificate validity times. * ext/openssl/ossl_x509name.c (ossl_x509name_to_s): add optional second argument to specify the output format (see also X509_NAME_print_ex). * ext/openssl/ossl_x509name.c (ossl_x509name_init): new constants: OpenSSL::X509::Name::COMPAT, OpenSSL::X509::Name::RFC2253, OpenSSL::X509::ONELINE, OpenSSL::X509::MULTILINE. * ext/openssl/lib/openssl/x509.rb (OpenSSL::X509::Name::RFC2253DN): new module to provide the parse for RFC2253 DN format. * ext/openssl/lib/openssl/x509.rb (OpenSSL::X509::Name.parse_rfc2253): new method to parse RFC2253 DN format. * test/openssl/ossl_x509name.rb: add tests about RFC2253 DN. * text/openssl/ssl_server.rb: try to listen ports from 20443 to 20542 while EADDRINUSE is raised. * all changes in this entry are backport from 1.9. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_1_8@7599 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
81 lines
1.6 KiB
Ruby
81 lines
1.6 KiB
Ruby
require "socket"
|
|
require "thread"
|
|
require "openssl"
|
|
require File.join(File.dirname(__FILE__), "utils.rb")
|
|
|
|
def get_pem(io=$stdin)
|
|
buf = ""
|
|
while line = io.gets
|
|
if /^-----BEGIN / =~ line
|
|
buf << line
|
|
break
|
|
end
|
|
end
|
|
while line = io.gets
|
|
buf << line
|
|
if /^-----END / =~ line
|
|
break
|
|
end
|
|
end
|
|
return buf
|
|
end
|
|
|
|
def make_key(pem)
|
|
begin
|
|
return OpenSSL::PKey::RSA.new(pem)
|
|
rescue
|
|
return OpenSSL::PKey::DSA.new(pem)
|
|
end
|
|
end
|
|
|
|
ca_cert = OpenSSL::X509::Certificate.new(get_pem)
|
|
ssl_cert = OpenSSL::X509::Certificate.new(get_pem)
|
|
ssl_key = make_key(get_pem)
|
|
port = Integer(ARGV.shift)
|
|
verify_mode = Integer(ARGV.shift)
|
|
start_immediately = (/yes/ =~ ARGV.shift)
|
|
|
|
store = OpenSSL::X509::Store.new
|
|
store.add_cert(ca_cert)
|
|
store.purpose = OpenSSL::X509::PURPOSE_SSL_CLIENT
|
|
ctx = OpenSSL::SSL::SSLContext.new
|
|
ctx.cert_store = store
|
|
#ctx.extra_chain_cert = [ ca_cert ]
|
|
ctx.cert = ssl_cert
|
|
ctx.key = ssl_key
|
|
ctx.verify_mode = verify_mode
|
|
|
|
Socket.do_not_reverse_lookup = true
|
|
tcps = nil
|
|
100.times{|i|
|
|
begin
|
|
tcps = TCPServer.new("0.0.0.0", port+i)
|
|
port = port + i
|
|
break
|
|
rescue Errno::EADDRINUSE
|
|
next
|
|
end
|
|
}
|
|
ssls = OpenSSL::SSL::SSLServer.new(tcps, ctx)
|
|
ssls.start_immediately = start_immediately
|
|
|
|
$stdout.sync = true
|
|
$stdout.puts Process.pid
|
|
$stdout.puts port
|
|
|
|
loop do
|
|
ssl = ssls.accept
|
|
Thread.start{
|
|
q = Queue.new
|
|
th = Thread.start{ ssl.write(q.shift) while true }
|
|
while line = ssl.gets
|
|
if line =~ /^STARTTLS$/
|
|
ssl.accept
|
|
next
|
|
end
|
|
q.push(line)
|
|
end
|
|
th.kill if q.empty?
|
|
ssl.close
|
|
}
|
|
end
|