Python OpenSSL.SSL.ZeroReturnError() Examples
The following are 17
code examples of OpenSSL.SSL.ZeroReturnError().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
OpenSSL.SSL
, or try the search function
.
Example #1
Source File: handlers.py From oss-ftp with MIT License | 6 votes |
def recv(self, buffer_size): try: return super(SSLConnection, self).recv(buffer_size) except SSL.WantReadError: debug("call: recv(), err: want-read", inst=self) self._ssl_want_read = True raise RetryError except SSL.WantWriteError: debug("call: recv(), err: want-write", inst=self) self._ssl_want_write = True raise RetryError except SSL.ZeroReturnError as err: debug("call: recv() -> shutdown(), err: zero-return", inst=self) super(SSLConnection, self).handle_close() return b'' except SSL.SysCallError as err: debug("call: recv(), err: %r" % err, inst=self) errnum, errstr = err.args if (errnum in _ERRNOS_DISCONNECTED or errstr == 'Unexpected EOF'): super(SSLConnection, self).handle_close() return b'' else: raise
Example #2
Source File: handlers.py From oss-ftp with MIT License | 6 votes |
def recv(self, buffer_size): try: return super(SSLConnection, self).recv(buffer_size) except SSL.WantReadError: debug("call: recv(), err: want-read", inst=self) self._ssl_want_read = True raise RetryError except SSL.WantWriteError: debug("call: recv(), err: want-write", inst=self) self._ssl_want_write = True raise RetryError except SSL.ZeroReturnError as err: debug("call: recv() -> shutdown(), err: zero-return", inst=self) super(SSLConnection, self).handle_close() return b'' except SSL.SysCallError as err: debug("call: recv(), err: %r" % err, inst=self) errnum, errstr = err.args if (errnum in _ERRNOS_DISCONNECTED or errstr == 'Unexpected EOF'): super(SSLConnection, self).handle_close() return b'' else: raise
Example #3
Source File: tcp.py From BitTorrent with GNU General Public License v3.0 | 6 votes |
def writeSomeData(self, data): try: return Connection.writeSomeData(self, data) except SSL.WantWriteError: return 0 except SSL.WantReadError: self.writeBlockedOnRead = 1 Connection.stopWriting(self) Connection.startReading(self) return 0 except SSL.ZeroReturnError: return main.CONNECTION_LOST except SSL.SysCallError, e: if e[0] == -1 and data == "": # errors when writing empty strings are expected # and can be ignored return 0 else: return main.CONNECTION_LOST
Example #4
Source File: tcp.py From BitTorrent with GNU General Public License v3.0 | 6 votes |
def doRead(self): if self.writeBlockedOnRead: self.writeBlockedOnRead = 0 self._resetReadWrite() try: return Connection.doRead(self) except SSL.ZeroReturnError: return main.CONNECTION_DONE except SSL.WantReadError: return except SSL.WantWriteError: self.readBlockedOnWrite = 1 Connection.startWriting(self) Connection.stopReading(self) return except SSL.SysCallError, (retval, desc): if ((retval == -1 and desc == 'Unexpected EOF') or retval > 0): return main.CONNECTION_LOST log.err() return main.CONNECTION_LOST
Example #5
Source File: tcp.py From python-for-android with Apache License 2.0 | 6 votes |
def writeSomeData(self, data): try: return Connection.writeSomeData(self, data) except SSL.WantWriteError: return 0 except SSL.WantReadError: self.writeBlockedOnRead = 1 Connection.stopWriting(self) Connection.startReading(self) return 0 except SSL.ZeroReturnError: return main.CONNECTION_LOST except SSL.SysCallError, e: if e[0] == -1 and data == "": # errors when writing empty strings are expected # and can be ignored return 0 else: return main.CONNECTION_LOST
Example #6
Source File: https.py From CVE-2019-1040 with MIT License | 5 votes |
def tunnelConnection(self): while True: try: data = self.socksSocket.recv(self.packetSize) except SSL.ZeroReturnError: # The SSL connection was closed, return return # Pass the request to the server tosend = self.prepareRequest(data) self.relaySocket.send(tosend) # Send the response back to the client self.transferResponse()
Example #7
Source File: handlers.py From oss-ftp with MIT License | 5 votes |
def send(self, data): if not isinstance(data, bytes): data = bytes(data) try: return super(SSLConnection, self).send(data) except SSL.WantReadError: debug("call: send(), err: want-read", inst=self) self._ssl_want_read = True return 0 except SSL.WantWriteError: debug("call: send(), err: want-write", inst=self) self._ssl_want_write = True return 0 except SSL.ZeroReturnError as err: debug( "call: send() -> shutdown(), err: zero-return", inst=self) super(SSLConnection, self).handle_close() return 0 except SSL.SysCallError as err: debug("call: send(), err: %r" % err, inst=self) errnum, errstr = err.args if errnum == errno.EWOULDBLOCK: return 0 elif (errnum in _ERRNOS_DISCONNECTED or errstr == 'Unexpected EOF'): super(SSLConnection, self).handle_close() return 0 else: raise
Example #8
Source File: imaps.py From CVE-2019-1040 with MIT License | 5 votes |
def tunnelConnection(self): keyword = '' tag = '' while True: try: data = self.socksSocket.recv(self.packetSize) except SSL.ZeroReturnError: # The SSL connection was closed, return break # Set the new keyword, unless it is false, then break out of the function result = self.processTunnelData(keyword, tag, data) if result is False: break # If its not false, it's a tuple with the keyword and tag keyword, tag = result if tag != '': # Store the tag in the session so we can continue tag = int(tag) if self.idleState is True: self.relaySocket.sendall('DONE%s' % EOL) self.relaySocketFile.readline() if self.shouldClose: tag += 1 self.relaySocket.sendall('%s CLOSE%s' % (tag, EOL)) self.relaySocketFile.readline() self.session.tagnum = tag + 1
Example #9
Source File: tcp.py From python-for-android with Apache License 2.0 | 5 votes |
def doRead(self): if self.disconnected: # See the comment in the similar check in doWrite below. # Additionally, in order for anything other than returning # CONNECTION_DONE here to make sense, it will probably be necessary # to implement a way to switch back to TCP from TLS (actually, if # we did something other than return CONNECTION_DONE, that would be # a big part of implementing that feature). In other words, the # expectation is that doRead will be called when self.disconnected # is True only when the connection has been lost. It's possible # that the other end could stop speaking TLS and then send us some # non-TLS data. We'll end up ignoring that data and dropping the # connection. There's no unit tests for this check in the cases # where it makes a difference. The test suite only hits this # codepath when it would have otherwise hit the SSL.ZeroReturnError # exception handler below, which has exactly the same behavior as # this conditional. Maybe that's the only case that can ever be # triggered, I'm not sure. -exarkun return main.CONNECTION_DONE if self.writeBlockedOnRead: self.writeBlockedOnRead = 0 self._resetReadWrite() try: return Connection.doRead(self) except SSL.ZeroReturnError: return main.CONNECTION_DONE except SSL.WantReadError: return except SSL.WantWriteError: self.readBlockedOnWrite = 1 Connection.startWriting(self) Connection.stopReading(self) return except SSL.SysCallError, (retval, desc): if ((retval == -1 and desc == 'Unexpected EOF') or retval > 0): return main.CONNECTION_LOST log.err() return main.CONNECTION_LOST
Example #10
Source File: https.py From Slackor with GNU General Public License v3.0 | 5 votes |
def tunnelConnection(self): while True: try: data = self.socksSocket.recv(self.packetSize) except SSL.ZeroReturnError: # The SSL connection was closed, return return # Pass the request to the server tosend = self.prepareRequest(data) self.relaySocket.send(tosend) # Send the response back to the client self.transferResponse()
Example #11
Source File: imaps.py From Slackor with GNU General Public License v3.0 | 5 votes |
def tunnelConnection(self): keyword = '' tag = '' while True: try: data = self.socksSocket.recv(self.packetSize) except SSL.ZeroReturnError: # The SSL connection was closed, return break # Set the new keyword, unless it is false, then break out of the function result = self.processTunnelData(keyword, tag, data) if result is False: break # If its not false, it's a tuple with the keyword and tag keyword, tag = result if tag != '': # Store the tag in the session so we can continue tag = int(tag) if self.idleState is True: self.relaySocket.sendall('DONE%s' % EOL) self.relaySocketFile.readline() if self.shouldClose: tag += 1 self.relaySocket.sendall('%s CLOSE%s' % (tag, EOL)) self.relaySocketFile.readline() self.session.tagnum = tag + 1
Example #12
Source File: https.py From Exchange2domain with MIT License | 5 votes |
def tunnelConnection(self): while True: try: data = self.socksSocket.recv(self.packetSize) except SSL.ZeroReturnError: # The SSL connection was closed, return return # Pass the request to the server tosend = self.prepareRequest(data) self.relaySocket.send(tosend) # Send the response back to the client self.transferResponse()
Example #13
Source File: imaps.py From Exchange2domain with MIT License | 5 votes |
def tunnelConnection(self): keyword = '' tag = '' while True: try: data = self.socksSocket.recv(self.packetSize) except SSL.ZeroReturnError: # The SSL connection was closed, return break # Set the new keyword, unless it is false, then break out of the function result = self.processTunnelData(keyword, tag, data) if result is False: break # If its not false, it's a tuple with the keyword and tag keyword, tag = result if tag != '': # Store the tag in the session so we can continue tag = int(tag) if self.idleState is True: self.relaySocket.sendall('DONE%s' % EOL) self.relaySocketFile.readline() if self.shouldClose: tag += 1 self.relaySocket.sendall('%s CLOSE%s' % (tag, EOL)) self.relaySocketFile.readline() self.session.tagnum = tag + 1
Example #14
Source File: tls.py From learn_python3_spider with MIT License | 5 votes |
def _flushReceiveBIO(self): """ Try to receive any application-level bytes which are now available because of a previous write into the receive BIO. This will take care of delivering any application-level bytes which are received to the protocol, as well as handling of the various exceptions which can come from trying to get such bytes. """ # Keep trying this until an error indicates we should stop or we # close the connection. Looping is necessary to make sure we # process all of the data which was put into the receive BIO, as # there is no guarantee that a single recv call will do it all. while not self._lostTLSConnection: try: bytes = self._tlsConnection.recv(2 ** 15) except WantReadError: # The newly received bytes might not have been enough to produce # any application data. break except ZeroReturnError: # TLS has shut down and no more TLS data will be received over # this connection. self._shutdownTLS() # Passing in None means the user protocol's connnectionLost # will get called with reason from underlying transport: self._tlsShutdownFinished(None) except Error: # Something went pretty wrong. For example, this might be a # handshake failure during renegotiation (because there were no # shared ciphers, because a certificate failed to verify, etc). # TLS can no longer proceed. failure = Failure() self._tlsShutdownFinished(failure) else: if not self._aborted: ProtocolWrapper.dataReceived(self, bytes) # The received bytes might have generated a response which needs to be # sent now. For example, the handshake involves several round-trip # exchanges without ever producing application-bytes. self._flushSendBIO()
Example #15
Source File: tls.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 5 votes |
def _flushReceiveBIO(self): """ Try to receive any application-level bytes which are now available because of a previous write into the receive BIO. This will take care of delivering any application-level bytes which are received to the protocol, as well as handling of the various exceptions which can come from trying to get such bytes. """ # Keep trying this until an error indicates we should stop or we # close the connection. Looping is necessary to make sure we # process all of the data which was put into the receive BIO, as # there is no guarantee that a single recv call will do it all. while not self._lostTLSConnection: try: bytes = self._tlsConnection.recv(2 ** 15) except WantReadError: # The newly received bytes might not have been enough to produce # any application data. break except ZeroReturnError: # TLS has shut down and no more TLS data will be received over # this connection. self._shutdownTLS() # Passing in None means the user protocol's connnectionLost # will get called with reason from underlying transport: self._tlsShutdownFinished(None) except Error: # Something went pretty wrong. For example, this might be a # handshake failure during renegotiation (because there were no # shared ciphers, because a certificate failed to verify, etc). # TLS can no longer proceed. failure = Failure() self._tlsShutdownFinished(failure) else: if not self._aborted: ProtocolWrapper.dataReceived(self, bytes) # The received bytes might have generated a response which needs to be # sent now. For example, the handshake involves several round-trip # exchanges without ever producing application-bytes. self._flushSendBIO()
Example #16
Source File: handlers.py From oss-ftp with MIT License | 5 votes |
def send(self, data): if not isinstance(data, bytes): data = bytes(data) try: return super(SSLConnection, self).send(data) except SSL.WantReadError: debug("call: send(), err: want-read", inst=self) self._ssl_want_read = True return 0 except SSL.WantWriteError: debug("call: send(), err: want-write", inst=self) self._ssl_want_write = True return 0 except SSL.ZeroReturnError as err: debug( "call: send() -> shutdown(), err: zero-return", inst=self) super(SSLConnection, self).handle_close() return 0 except SSL.SysCallError as err: debug("call: send(), err: %r" % err, inst=self) errnum, errstr = err.args if errnum == errno.EWOULDBLOCK: return 0 elif (errnum in _ERRNOS_DISCONNECTED or errstr == 'Unexpected EOF'): super(SSLConnection, self).handle_close() return 0 else: raise
Example #17
Source File: tls.py From python-for-android with Apache License 2.0 | 4 votes |
def _flushReceiveBIO(self): """ Try to receive any application-level bytes which are now available because of a previous write into the receive BIO. This will take care of delivering any application-level bytes which are received to the protocol, as well as handling of the various exceptions which can come from trying to get such bytes. """ # Keep trying this until an error indicates we should stop or we # close the connection. Looping is necessary to make sure we # process all of the data which was put into the receive BIO, as # there is no guarantee that a single recv call will do it all. while not self._lostConnection: try: bytes = self._tlsConnection.recv(2 ** 15) except WantReadError: # The newly received bytes might not have been enough to produce # any application data. break except ZeroReturnError: # TLS has shut down and no more TLS data will be received over # this connection. self._lostConnection = True self.transport.loseConnection() if not self._handshakeDone and self._reason is not None: failure = self._reason else: failure = Failure(CONNECTION_DONE) # Failure's are fat. Drop the reference. self._reason = None ProtocolWrapper.connectionLost(self, failure) except Error, e: # Something went pretty wrong. For example, this might be a # handshake failure (because there were no shared ciphers, because # a certificate failed to verify, etc). TLS can no longer proceed. self._flushSendBIO() self._lostConnection = True # Squash EOF in violation of protocol into ConnectionLost if e.args[0] == -1 and e.args[1] == 'Unexpected EOF': failure = Failure(CONNECTION_LOST) else: failure = Failure() ProtocolWrapper.connectionLost(self, failure) # This loseConnection call is basically tested by # test_handshakeFailure. At least one side will need to do it # or the test never finishes. self.transport.loseConnection() else: # If we got application bytes, the handshake must be done by # now. Keep track of this to control error reporting later. self._handshakeDone = True ProtocolWrapper.dataReceived(self, bytes) # The received bytes might have generated a response which needs to be # sent now. For example, the handshake involves several round-trip # exchanges without ever producing application-bytes.