2013-03-30 13:21:40 +01:00
|
|
|
--
|
|
|
|
-- Public domain
|
|
|
|
--
|
|
|
|
local socket = require("socket")
|
|
|
|
local ssl = require("ssl")
|
|
|
|
|
|
|
|
local params = {
|
|
|
|
mode = "client",
|
2015-11-12 22:04:37 +01:00
|
|
|
protocol = "tlsv1",
|
2013-03-30 13:21:40 +01:00
|
|
|
key = "../../certs/clientBkey.pem",
|
|
|
|
certificate = "../../certs/clientB.pem",
|
|
|
|
cafile = "../../certs/rootB.pem",
|
|
|
|
verify = {"peer", "fail_if_no_peer_cert"},
|
2015-11-12 22:04:37 +01:00
|
|
|
options = "all",
|
|
|
|
verifyext = "lsec_continue",
|
2013-03-30 13:21:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
-- [[ SSL context
|
|
|
|
local ctx = assert(ssl.newcontext(params))
|
|
|
|
--]]
|
|
|
|
|
|
|
|
local peer = socket.tcp()
|
|
|
|
peer:connect("127.0.0.1", 8888)
|
|
|
|
|
|
|
|
-- [[ SSL wrapper
|
|
|
|
peer = assert( ssl.wrap(peer, ctx) )
|
|
|
|
assert(peer:dohandshake())
|
|
|
|
--]]
|
|
|
|
|
|
|
|
local succ, errs = peer:getpeerverification()
|
|
|
|
print(succ, errs)
|
|
|
|
for i, err in pairs(errs) do
|
|
|
|
for j, msg in ipairs(err) do
|
|
|
|
print("depth = " .. i, "error = " .. msg)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
print(peer:receive("*l"))
|
|
|
|
peer:close()
|