1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
|
# Copyright (C) 2007 AG Projects. See LICENSE for details.
#
"""GNUTLS library errors"""
from gnutls.errors import *
from gnutls.errors import __all__
from gnutls.library.constants import GNUTLS_E_AGAIN, GNUTLS_E_INTERRUPTED, GNUTLS_E_NO_CERTIFICATE_FOUND
from gnutls.library.constants import GNUTLS_E_MEMORY_ERROR, GNUTLS_E_SHORT_MEMORY_BUFFER
from gnutls.library.constants import GNUTLS_E_FATAL_ALERT_RECEIVED, GNUTLS_A_BAD_CERTIFICATE
from gnutls.library.constants import GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE
from gnutls.library.constants import GNUTLS_A_UNKNOWN_CA, GNUTLS_A_INSUFFICIENT_SECURITY
from gnutls.library.constants import GNUTLS_A_CERTIFICATE_EXPIRED, GNUTLS_A_CERTIFICATE_REVOKED
from gnutls.library.functions import gnutls_strerror, gnutls_alert_get
class ErrorMessage(str):
def __new__(cls, code):
obj = str.__new__(cls, gnutls_strerror(code))
obj.code = code
return obj
# Check functions which return an integer status code (negative codes being errors)
#
def _check_status(retcode, function, args):
if retcode >= 0:
return retcode
elif retcode == -1:
from gnutls.library import functions
if function in (functions.gnutls_certificate_activation_time_peers,
functions.gnutls_x509_crt_get_activation_time,
functions.gnutls_openpgp_key_get_creation_time):
raise GNUTLSError("cannot retrieve activation time")
elif function in (functions.gnutls_certificate_expiration_time_peers,
functions.gnutls_x509_crt_get_expiration_time,
functions.gnutls_openpgp_key_get_expiration_time):
raise GNUTLSError("cannot retrieve expiration time")
elif function in (functions.gnutls_x509_crl_get_this_update,
functions.gnutls_x509_crl_get_next_update):
raise GNUTLSError("cannot retrieve CRL update time")
else:
raise GNUTLSError(ErrorMessage(retcode))
elif retcode == GNUTLS_E_AGAIN:
raise OperationWouldBlock(gnutls_strerror(retcode))
elif retcode == GNUTLS_E_INTERRUPTED:
raise OperationInterrupted(gnutls_strerror(retcode))
elif retcode in (GNUTLS_E_MEMORY_ERROR, GNUTLS_E_SHORT_MEMORY_BUFFER):
raise MemoryError(ErrorMessage(retcode))
elif retcode == GNUTLS_E_NO_CERTIFICATE_FOUND:
raise CertificateSecurityError(gnutls_strerror(retcode))
elif retcode == GNUTLS_E_FATAL_ALERT_RECEIVED:
alertdict = {
GNUTLS_A_BAD_CERTIFICATE: (CertificateError, "peer rejected our certificate as invalid"),
GNUTLS_A_UNKNOWN_CA: (CertificateAuthorityError, "peer does not trust our certificate authority"),
GNUTLS_A_INSUFFICIENT_SECURITY: (CertificateSecurityError, "peer rejected us on insufficient security"),
GNUTLS_A_CERTIFICATE_EXPIRED: (CertificateExpiredError, "peer rejected our certificate as expired"),
GNUTLS_A_CERTIFICATE_REVOKED: (CertificateRevokedError, "peer rejected our certificate as revoked")}
alert = gnutls_alert_get(args[0])
exception, reason = alertdict.get(alert, (GNUTLSError, ErrorMessage(retcode)))
raise exception(reason)
elif retcode == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE:
raise RequestedDataNotAvailable(gnutls_strerror(retcode))
else:
raise GNUTLSError(ErrorMessage(retcode))
# Attach the error checking function to all functions returning integers
#
from gnutls.library import functions
from ctypes import c_int, c_long
for func in functions.__dict__.values():
if not hasattr(func, 'errcheck'):
continue ## not a function
if func.restype in (c_int, c_long):
func.errcheck = _check_status
del c_int, c_long, func, functions
|