home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Personal Computer World 2009 February
/
PCWFEB09.iso
/
Software
/
Resources
/
Chat & Communication
/
Digsby build 37
/
digsby_setup.exe
/
lib
/
M2Crypto
/
SSL
/
cb.pyo
(
.txt
)
< prev
next >
Wrap
Python Compiled Bytecode
|
2008-10-13
|
2KB
|
75 lines
# Source Generated with Decompyle++
# File: in.pyo (Python 2.5)
import sys
import Context
from M2Crypto import m2
def ssl_verify_callback_stub(ssl_ctx_ptr, x509_ptr, errnum, errdepth, ok):
return ok
unknown_issuer = [
m2.X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT,
m2.X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY,
m2.X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE,
m2.X509_V_ERR_CERT_UNTRUSTED]
def ssl_verify_callback(ssl_ctx_ptr, x509_ptr, errnum, errdepth, ok):
ssl_ctx = Context.map()[long(ssl_ctx_ptr)]
if errnum in unknown_issuer:
if ssl_ctx.get_allow_unknown_ca():
sys.stderr.write('policy: %s: permitted...\n' % m2.x509_get_verify_error(errnum))
sys.stderr.flush()
ok = 1
if ok:
if ssl_ctx.get_verify_depth() >= errdepth:
ok = 1
else:
ok = 0
return ok
def ssl_verify_callback_allow_unknown_ca(ok, store):
errnum = store.get_error()
if errnum in unknown_issuer:
ok = 1
return ok
def ssl_info_callback(where, ret, ssl_ptr):
w = where & ~(m2.SSL_ST_MASK)
if w & m2.SSL_ST_CONNECT:
state = 'SSL connect'
elif w & m2.SSL_ST_ACCEPT:
state = 'SSL accept'
else:
state = 'SSL state unknown'
if where & m2.SSL_CB_LOOP:
sys.stderr.write('LOOP: %s: %s\n' % (state, m2.ssl_get_state_v(ssl_ptr)))
sys.stderr.flush()
return None
if where & m2.SSL_CB_EXIT:
if not ret:
sys.stderr.write('FAILED: %s: %s\n' % (state, m2.ssl_get_state_v(ssl_ptr)))
sys.stderr.flush()
else:
sys.stderr.write('INFO: %s: %s\n' % (state, m2.ssl_get_state_v(ssl_ptr)))
sys.stderr.flush()
return None
if where & m2.SSL_CB_ALERT:
if where & m2.SSL_CB_READ:
w = 'read'
else:
w = 'write'
sys.stderr.write('ALERT: %s: %s: %s\n' % (w, m2.ssl_get_alert_type_v(ret), m2.ssl_get_alert_desc_v(ret)))
sys.stderr.flush()
return None