sys.path.append(client_config.rsa_path)
import monRSA
-def connect(sock,where="ici"):
- port=client_config.port
- ip={"ici":"localhost","vent":"vent.crans.org","eva":"eva.crans.org"}[where]
+def connect(sock,where="cerebro",port=None):
+ if port==None:
+ port=client_config.port
+ ip={"ici":"localhost","vent":"vent.crans.org","eva":"eva.crans.org","cerebro":"cerebro.crans.org"}[where]
sock.connect((ip,port))
- return ssl.wrap_socket(sock,ca_certs=client_config.ca_certfile,
- cert_reqs=ssl.CERT_OPTIONAL,ciphers="AES256-SHA")
+ return ssl.wrap_socket(sock,ca_certs=client_config.ca_certfile)
+# cert_reqs=ssl.CERT_NONE,ciphers="AES256-SHA")
def checkidentity(a):
c=a.getpeercert()
print "Imposteur !"
if __name__=="__main__":
+ #port=int(raw_input("port ? "))
a=socket.socket()
- a=connect(a)
- a.settimeout(0.5)
- checkidentity(a)
+ a=connect(a,"cerebro")
+ a.settimeout(2)
+ #checkidentity(a)
print hello(a,"Python Client alpha")
print login(a,"20-100","mdp")
print "Socket créée dans la variable \"a\""
# le module qui fait du rsa
rsa_path = "/usr/scripts/Note_Kfet_2015/rsa_source/"
-# parce que le port est pour l'instant aléatoire, ça disparaîtra après
-portfile=open(basedir+"serveur/port.txt","r")
-port = int(portfile.read())
-portfile.close()
+port = 4242