2013-03-30 13:21:40 +01:00
|
|
|
--
|
|
|
|
-- Public domain
|
|
|
|
--
|
|
|
|
local socket = require("socket")
|
|
|
|
local ssl = require("ssl")
|
|
|
|
local util = require("util")
|
|
|
|
|
|
|
|
local params = {
|
|
|
|
mode = "client",
|
2015-11-20 22:12:19 +01:00
|
|
|
protocol = "tlsv1_2",
|
2013-03-30 13:21:40 +01:00
|
|
|
key = "../certs/clientAkey.pem",
|
|
|
|
certificate = "../certs/clientA.pem",
|
|
|
|
cafile = "../certs/rootA.pem",
|
|
|
|
verify = {"peer", "fail_if_no_peer_cert"},
|
2015-11-20 22:12:19 +01:00
|
|
|
options = "all",
|
2013-03-30 13:21:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
local conn = socket.tcp()
|
|
|
|
conn:connect("127.0.0.1", 8888)
|
|
|
|
|
|
|
|
conn = assert( ssl.wrap(conn, params) )
|
|
|
|
assert(conn:dohandshake())
|
|
|
|
|
|
|
|
util.show( conn:getpeercertificate() )
|
|
|
|
|
|
|
|
print("----------------------------------------------------------------------")
|
|
|
|
|
|
|
|
for k, cert in ipairs( conn:getpeerchain() ) do
|
|
|
|
util.show(cert)
|
|
|
|
end
|
|
|
|
|
|
|
|
local cert = conn:getpeercertificate()
|
|
|
|
print( cert )
|
|
|
|
print( cert:pem() )
|
|
|
|
|
|
|
|
conn:close()
|