Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4
XMc@sdZddkZddkZddklZddklZlZlZddklZlZl Z l Z ddkl Z l Z l Z ddklZlZlZlZlZlZlZlZlZddklZlZlZdd klZdd klZddkZddkZd efd YZ dde"ee de#e#d Z$dZ%dZ&dZ'dZ(dZ)eddZ*dZ+dddZ,dS(sThis module provides some more Pythonic support for SSL. Object types: SSLSocket -- subtype of socket.socket which does SSL over the socket Exceptions: SSLError -- exception raised for I/O errors Functions: cert_time_to_seconds -- convert time string used for certificate notBefore and notAfter functions to integer seconds past the Epoch (the time values returned from time.time()) fetch_server_certificate (HOST, PORT) -- fetch the certificate provided by the server running on HOST at port PORT. No validation of the certificate is performed. Integer constants: SSL_ERROR_ZERO_RETURN SSL_ERROR_WANT_READ SSL_ERROR_WANT_WRITE SSL_ERROR_WANT_X509_LOOKUP SSL_ERROR_SYSCALL SSL_ERROR_SSL SSL_ERROR_WANT_CONNECT SSL_ERROR_EOF SSL_ERROR_INVALID_ERROR_CODE The following group define certificate requirements that one side is allowing/requiring from the other side: CERT_NONE - no certificates from the other side are required (or will be looked at if provided) CERT_OPTIONAL - certificates are not required, but if provided will be validated, and if validation fails, the connection will also fail CERT_REQUIRED - certificates are required, and will be validated, and if validation fails, the connection will also fail The following constants identify various SSL protocol variants: PROTOCOL_SSLv2 PROTOCOL_SSLv3 PROTOCOL_SSLv23 PROTOCOL_TLSv1 iN(tSSLError(t CERT_NONEt CERT_OPTIONALt CERT_REQUIRED(tPROTOCOL_SSLv2tPROTOCOL_SSLv3tPROTOCOL_SSLv23tPROTOCOL_TLSv1(t RAND_statustRAND_egdtRAND_add( tSSL_ERROR_ZERO_RETURNtSSL_ERROR_WANT_READtSSL_ERROR_WANT_WRITEtSSL_ERROR_WANT_X509_LOOKUPtSSL_ERROR_SYSCALLt SSL_ERROR_SSLtSSL_ERROR_WANT_CONNECTt SSL_ERROR_EOFtSSL_ERROR_INVALID_ERROR_CODE(tsockett _fileobjectt_delegate_methods(terror(t getnameinfot SSLSocketc BseZdZddeeedeedZddZ dZ edZ dZ ddZ dd Zdd Zddd Zddd Zddd ZdddZdZdZdZdZdZdZdZdddZRS(sThis class implements a subtype of socket.socket that wraps the underlying OS socket in an SSL context when necessary, and provides read and write methods over that channel.c Cs;ti|d|ix5tD]-} yt|| Wqtj oqXqW|o| o |}nyti|Wn8tj o,} | iti jond|_ n>Xt i |i|||||||_ |o|in||_||_||_||_||_||_| |_d|_dS(Nt_socki(Rt__init__RRtdelattrtAttributeErrort getpeernamet socket_errorterrnotENOTCONNtNonet_sslobjt_ssltsslwrapt do_handshaketkeyfiletcertfilet cert_reqst ssl_versiontca_certstdo_handshake_on_connecttsuppress_ragged_eofst_makefile_refs( tselftsockR'R(t server_sideR)R*R+R,R-tattrte((s/usr/lib/python2.6/ssl.pyRYs8         icCsVy|ii|SWn;tj o/}|idtjo|iodSnXdS(sORead up to LEN bytes and return them. Return zero-length string on EOF.itN(R#treadRtargsRR-(R/tlentx((s/usr/lib/python2.6/ssl.pyR5s cCs|ii|S(shWrite DATA to the underlying SSL channel. Returns number of bytes of DATA actually transmitted.(R#twrite(R/tdata((s/usr/lib/python2.6/ssl.pyR9scCs|ii|S(sReturns a formatted version of the data in the certificate provided by the other end of the SSL channel. Return None if no certificate was provided, {} if a certificate was provided, but not validated.(R#tpeer_certificate(R/t binary_form((s/usr/lib/python2.6/ssl.pyt getpeercertscCs |ipdS|iiSdS(N(R#R"tcipher(R/((s/usr/lib/python2.6/ssl.pyR>s icCs|io|djotd|inxtoky|ii|}WnJtj o>}|idtjodS|idtjodSq1X|Sq1Wn|i i ||SdS(Nis3non-zero flags not allowed in calls to send() on %s( R#t ValueErrort __class__tTrueR9RR6R R Rtsend(R/R:tflagstvR8((s/usr/lib/python2.6/ssl.pyRBs"   cCs;|iotd|in|ii|||SdS(Ns%sendto not allowed on instances of %s(R#R?R@Rtsendto(R/R:taddrRC((s/usr/lib/python2.6/ssl.pyREs cCs|iom|djotd|int|}d}x/||jo!|i||}||7}qCW|Sti|||SdS(Nis6non-zero flags not allowed in calls to sendall() on %s(R#R?R@R7RBRtsendall(R/R:RCtamounttcountRD((s/usr/lib/python2.6/ssl.pyRGs    cCsS|io2|djotd|in|i|S|ii||SdS(Nis3non-zero flags not allowed in calls to recv() on %s(R#R?R@R5Rtrecv(R/tbuflenRC((s/usr/lib/python2.6/ssl.pyRJs  cCs|o|djot|}n|djo d}n|ioN|djotd|in|i|}t|}|||*|S|ii|||SdS(Niis8non-zero flags not allowed in calls to recv_into() on %s(R"R7R#R?R@R5Rt recv_into(R/tbuffertnbytesRCt tmp_bufferRD((s/usr/lib/python2.6/ssl.pyRLs      cCs8|iotd|in|ii||SdS(Ns'recvfrom not allowed on instances of %s(R#R?R@Rtrecvfrom(R/RFRKRC((s/usr/lib/python2.6/ssl.pyRPs cCs;|iotd|in|ii|||SdS(Ns,recvfrom_into not allowed on instances of %s(R#R?R@Rt recvfrom_into(R/RMRNRC((s/usr/lib/python2.6/ssl.pyRQs cCs |io|iiSdSdS(Ni(R#tpending(R/((s/usr/lib/python2.6/ssl.pyRRs cCsA|io|ii}d|_|Stdt|dS(NsNo SSL wrapper around (R#tshutdownR"R?tstr(R/ts((s/usr/lib/python2.6/ssl.pytunwraps   cCsd|_ti||dS(N(R"R#RRS(R/thow((s/usr/lib/python2.6/ssl.pyRSs cCs=|idjod|_ti|n|id8_dS(Ni(R.R"R#Rtclose(R/((s/usr/lib/python2.6/ssl.pyRX s cCs|iidS(sPerform a TLS/SSL handshake.N(R#R&(R/((s/usr/lib/python2.6/ssl.pyR&scCs||iotdnti||ti|it|i|i |i |i |i |_|i o|indS(sQConnects to remote ADDR, and then wraps the connection in an SSL channel.s/attempt to connect already-connected SSLSocket!N(R#R?RtconnectR$R%RtFalseR'R(R)R*R+R,R&(R/RF((s/usr/lib/python2.6/ssl.pyRYs   cCsjti|\}}t|d|id|idtd|id|id|id|i d|i |fS( sAccepts a new connection from a remote client, and returns a tuple containing that new connection wrapped with a server-side SSL channel, and the address of the remote client.R'R(R1R)R*R+R,R-( RtacceptRR'R(RAR)R*R+R,R-(R/tnewsockRF((s/usr/lib/python2.6/ssl.pyR[)s        tricCs%|id7_t|||dtS(sMake and return a file-like object that works with the SSL connection. Just use the code from the socket module.iRX(R.RRA(R/tmodetbufsize((s/usr/lib/python2.6/ssl.pytmakefile;sN(t__name__t __module__t__doc__R"RZRRRARR5R9R=R>RBRERGRJRLRPRQRRRVRSRXR&RYR[R`(((s/usr/lib/python2.6/ssl.pyRSs2 %             c Cs:t|d|d|d|d|d|d|d|d|S( NR'R(R1R)R*R+R,R-(R( R0R'R(R1R)R*R+R,R-((s/usr/lib/python2.6/ssl.pyt wrap_socketHs   cCs%ddk}|i|i|dS(sTakes a date-time string in standard ASN1_print form ("MON DAY 24HOUR:MINUTE:SEC YEAR TIMEZONE") and return a Python time value in seconds past the epoch.iNs%b %d %H:%M:%S %Y GMT(ttimetmktimetstrptime(t cert_timeRe((s/usr/lib/python2.6/ssl.pytcert_time_to_secondsWs s-----BEGIN CERTIFICATE-----s-----END CERTIFICATE-----cCsettdo4ti|}tdti|ddtdStdti|tdSdS(s[Takes a certificate in binary DER format and returns the PEM version of it as a string.tstandard_b64encodes i@N(thasattrtbase64Rjt PEM_HEADERttextwraptfillt PEM_FOOTERt encodestring(tder_cert_bytestf((s/usr/lib/python2.6/ssl.pytDER_cert_to_PEM_certcs%cCs{|itptdtn|iitptdtn|itttt !}ti|S(shTakes a certificate in ASCII PEM format and returns the DER-encoded version of it as a byte sequences(Invalid PEM encoding; must start with %ss&Invalid PEM encoding; must end with %s( t startswithRmR?tstriptendswithRpR7Rlt decodestring(tpem_cert_stringtd((s/usr/lib/python2.6/ssl.pytPEM_cert_to_DER_certss cCsz|\}}|dj o t}nt}ttd|d|d|}|i||it}|it |S(sRetrieve the certificate from the server at the specified address, and return it as a PEM-encoded string. If 'ca_certs' is specified, validate the server cert against it. If 'ssl_version' is specified, use it in the connection attempt.R*R)R+N( R"RRRdRRYR=RARXRt(RFR*R+thosttportR)RUtdercert((s/usr/lib/python2.6/ssl.pytget_server_certificates     cCsP|tjodS|tjodS|tjodS|tjodSdSdS(NtTLSv1tSSLv23tSSLv2tSSLv3s (RRRR(t protocol_code((s/usr/lib/python2.6/ssl.pytget_protocol_names    cCsdt|do |i}nti|d||ttd}y|iWnn X|i|S(sA replacement for the old socket.ssl function. Designed for compability with Python 2.5 and earlier. Will disappear in Python 3.0.RiN( RkRR$R%RRR"RR&(R0R'R(tssl_sock((s/usr/lib/python2.6/ssl.pytsslwrap_simples   (-RcRnR$RRRRRRRRRR R R R R RRRRRRRRRRRRt _getnameinfoRlR RR"RZRARdRiRmRpRtR{RRR(((s/usr/lib/python2.6/ssl.pyt8s4  "@