[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
lib
/
python3.6
/
site-packages
/
dns
/
rdtypes
/
ANY
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 __pycache__
SET
[ DEL ]
📄 AFSDB.py
1,848 B
SET
[ EDIT ]
|
[ DEL ]
📄 AVC.py
950 B
SET
[ EDIT ]
|
[ DEL ]
📄 CAA.py
2,622 B
SET
[ EDIT ]
|
[ DEL ]
📄 CDNSKEY.py
1,026 B
SET
[ EDIT ]
|
[ DEL ]
📄 CDS.py
875 B
SET
[ EDIT ]
|
[ DEL ]
📄 CERT.py
3,951 B
SET
[ EDIT ]
|
[ DEL ]
📄 CNAME.py
1,084 B
SET
[ EDIT ]
|
[ DEL ]
📄 CSYNC.py
4,644 B
SET
[ EDIT ]
|
[ DEL ]
📄 DLV.py
864 B
SET
[ EDIT ]
|
[ DEL ]
📄 DNAME.py
979 B
SET
[ EDIT ]
|
[ DEL ]
📄 DNSKEY.py
1,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 DS.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 EUI48.py
1,124 B
SET
[ EDIT ]
|
[ DEL ]
📄 EUI64.py
1,134 B
SET
[ EDIT ]
|
[ DEL ]
📄 GPOS.py
5,369 B
SET
[ EDIT ]
|
[ DEL ]
📄 HINFO.py
2,665 B
SET
[ EDIT ]
|
[ DEL ]
📄 HIP.py
4,144 B
SET
[ EDIT ]
|
[ DEL ]
📄 ISDN.py
3,269 B
SET
[ EDIT ]
|
[ DEL ]
📄 LOC.py
12,264 B
SET
[ EDIT ]
|
[ DEL ]
📄 MX.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 NS.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC.py
4,690 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC3.py
7,073 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC3PARAM.py
3,098 B
SET
[ EDIT ]
|
[ DEL ]
📄 PTR.py
875 B
SET
[ EDIT ]
|
[ DEL ]
📄 RP.py
3,070 B
SET
[ EDIT ]
|
[ DEL ]
📄 RRSIG.py
5,663 B
SET
[ EDIT ]
|
[ DEL ]
📄 RT.py
891 B
SET
[ EDIT ]
|
[ DEL ]
📄 SOA.py
4,520 B
SET
[ EDIT ]
|
[ DEL ]
📄 SPF.py
899 B
SET
[ EDIT ]
|
[ DEL ]
📄 SSHFP.py
2,828 B
SET
[ EDIT ]
|
[ DEL ]
📄 TLSA.py
2,956 B
SET
[ EDIT ]
|
[ DEL ]
📄 TXT.py
878 B
SET
[ EDIT ]
|
[ DEL ]
📄 URI.py
2,898 B
SET
[ EDIT ]
|
[ DEL ]
📄 X25.py
2,119 B
SET
[ EDIT ]
|
[ DEL ]
📄 __init__.py
1,221 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: NSEC3.py
# Copyright (C) 2004-2007, 2009-2011 Nominum, Inc. # # Permission to use, copy, modify, and distribute this software and its # documentation for any purpose with or without fee is hereby granted, # provided that the above copyright notice and this permission notice # appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. import base64 import binascii import string import struct import dns.exception import dns.rdata import dns.rdatatype from dns._compat import xrange, text_type try: b32_hex_to_normal = string.maketrans('0123456789ABCDEFGHIJKLMNOPQRSTUV', 'ABCDEFGHIJKLMNOPQRSTUVWXYZ234567') b32_normal_to_hex = string.maketrans('ABCDEFGHIJKLMNOPQRSTUVWXYZ234567', '0123456789ABCDEFGHIJKLMNOPQRSTUV') except AttributeError: b32_hex_to_normal = bytes.maketrans(b'0123456789ABCDEFGHIJKLMNOPQRSTUV', b'ABCDEFGHIJKLMNOPQRSTUVWXYZ234567') b32_normal_to_hex = bytes.maketrans(b'ABCDEFGHIJKLMNOPQRSTUVWXYZ234567', b'0123456789ABCDEFGHIJKLMNOPQRSTUV') # hash algorithm constants SHA1 = 1 # flag constants OPTOUT = 1 class NSEC3(dns.rdata.Rdata): """NSEC3 record @ivar algorithm: the hash algorithm number @type algorithm: int @ivar flags: the flags @type flags: int @ivar iterations: the number of iterations @type iterations: int @ivar salt: the salt @type salt: string @ivar next: the next name hash @type next: string @ivar windows: the windowed bitmap list @type windows: list of (window number, string) tuples""" __slots__ = ['algorithm', 'flags', 'iterations', 'salt', 'next', 'windows'] def __init__(self, rdclass, rdtype, algorithm, flags, iterations, salt, next, windows): super(NSEC3, self).__init__(rdclass, rdtype) self.algorithm = algorithm self.flags = flags self.iterations = iterations if isinstance(salt, text_type): self.salt = salt.encode() else: self.salt = salt self.next = next self.windows = windows def to_text(self, origin=None, relativize=True, **kw): next = base64.b32encode(self.next).translate( b32_normal_to_hex).lower().decode() if self.salt == b'': salt = '-' else: salt = binascii.hexlify(self.salt).decode() text = u'' for (window, bitmap) in self.windows: bits = [] for i in xrange(0, len(bitmap)): byte = bitmap[i] for j in xrange(0, 8): if byte & (0x80 >> j): bits.append(dns.rdatatype.to_text(window * 256 + i * 8 + j)) text += (u' ' + u' '.join(bits)) return u'%u %u %u %s %s%s' % (self.algorithm, self.flags, self.iterations, salt, next, text) @classmethod def from_text(cls, rdclass, rdtype, tok, origin=None, relativize=True): algorithm = tok.get_uint8() flags = tok.get_uint8() iterations = tok.get_uint16() salt = tok.get_string() if salt == u'-': salt = b'' else: salt = binascii.unhexlify(salt.encode('ascii')) next = tok.get_string().encode( 'ascii').upper().translate(b32_hex_to_normal) next = base64.b32decode(next) rdtypes = [] while 1: token = tok.get().unescape() if token.is_eol_or_eof(): break nrdtype = dns.rdatatype.from_text(token.value) if nrdtype == 0: raise dns.exception.SyntaxError("NSEC3 with bit 0") if nrdtype > 65535: raise dns.exception.SyntaxError("NSEC3 with bit > 65535") rdtypes.append(nrdtype) rdtypes.sort() window = 0 octets = 0 prior_rdtype = 0 bitmap = bytearray(b'\0' * 32) windows = [] for nrdtype in rdtypes: if nrdtype == prior_rdtype: continue prior_rdtype = nrdtype new_window = nrdtype // 256 if new_window != window: if octets != 0: windows.append((window, ''.join(bitmap[0:octets]))) bitmap = bytearray(b'\0' * 32) window = new_window offset = nrdtype % 256 byte = offset // 8 bit = offset % 8 octets = byte + 1 bitmap[byte] = bitmap[byte] | (0x80 >> bit) if octets != 0: windows.append((window, bitmap[0:octets])) return cls(rdclass, rdtype, algorithm, flags, iterations, salt, next, windows) def to_wire(self, file, compress=None, origin=None): l = len(self.salt) file.write(struct.pack("!BBHB", self.algorithm, self.flags, self.iterations, l)) file.write(self.salt) l = len(self.next) file.write(struct.pack("!B", l)) file.write(self.next) for (window, bitmap) in self.windows: file.write(struct.pack("!BB", window, len(bitmap))) file.write(bitmap) @classmethod def from_wire(cls, rdclass, rdtype, wire, current, rdlen, origin=None): (algorithm, flags, iterations, slen) = \ struct.unpack('!BBHB', wire[current: current + 5]) current += 5 rdlen -= 5 salt = wire[current: current + slen].unwrap() current += slen rdlen -= slen nlen = wire[current] current += 1 rdlen -= 1 next = wire[current: current + nlen].unwrap() current += nlen rdlen -= nlen windows = [] while rdlen > 0: if rdlen < 3: raise dns.exception.FormError("NSEC3 too short") window = wire[current] octets = wire[current + 1] if octets == 0 or octets > 32: raise dns.exception.FormError("bad NSEC3 octets") current += 2 rdlen -= 2 if rdlen < octets: raise dns.exception.FormError("bad NSEC3 bitmap length") bitmap = bytearray(wire[current: current + octets].unwrap()) current += octets rdlen -= octets windows.append((window, bitmap)) return cls(rdclass, rdtype, algorithm, flags, iterations, salt, next, windows)