[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
lib
/
python3.6
/
site-packages
/
dns
/
rdtypes
/
ANY
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 __pycache__
SET
[ DEL ]
📄 AFSDB.py
1,848 B
SET
[ EDIT ]
|
[ DEL ]
📄 AVC.py
950 B
SET
[ EDIT ]
|
[ DEL ]
📄 CAA.py
2,622 B
SET
[ EDIT ]
|
[ DEL ]
📄 CDNSKEY.py
1,026 B
SET
[ EDIT ]
|
[ DEL ]
📄 CDS.py
875 B
SET
[ EDIT ]
|
[ DEL ]
📄 CERT.py
3,951 B
SET
[ EDIT ]
|
[ DEL ]
📄 CNAME.py
1,084 B
SET
[ EDIT ]
|
[ DEL ]
📄 CSYNC.py
4,644 B
SET
[ EDIT ]
|
[ DEL ]
📄 DLV.py
864 B
SET
[ EDIT ]
|
[ DEL ]
📄 DNAME.py
979 B
SET
[ EDIT ]
|
[ DEL ]
📄 DNSKEY.py
1,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 DS.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 EUI48.py
1,124 B
SET
[ EDIT ]
|
[ DEL ]
📄 EUI64.py
1,134 B
SET
[ EDIT ]
|
[ DEL ]
📄 GPOS.py
5,369 B
SET
[ EDIT ]
|
[ DEL ]
📄 HINFO.py
2,665 B
SET
[ EDIT ]
|
[ DEL ]
📄 HIP.py
4,144 B
SET
[ EDIT ]
|
[ DEL ]
📄 ISDN.py
3,269 B
SET
[ EDIT ]
|
[ DEL ]
📄 LOC.py
12,264 B
SET
[ EDIT ]
|
[ DEL ]
📄 MX.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 NS.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC.py
4,690 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC3.py
7,073 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC3PARAM.py
3,098 B
SET
[ EDIT ]
|
[ DEL ]
📄 PTR.py
875 B
SET
[ EDIT ]
|
[ DEL ]
📄 RP.py
3,070 B
SET
[ EDIT ]
|
[ DEL ]
📄 RRSIG.py
5,663 B
SET
[ EDIT ]
|
[ DEL ]
📄 RT.py
891 B
SET
[ EDIT ]
|
[ DEL ]
📄 SOA.py
4,520 B
SET
[ EDIT ]
|
[ DEL ]
📄 SPF.py
899 B
SET
[ EDIT ]
|
[ DEL ]
📄 SSHFP.py
2,828 B
SET
[ EDIT ]
|
[ DEL ]
📄 TLSA.py
2,956 B
SET
[ EDIT ]
|
[ DEL ]
📄 TXT.py
878 B
SET
[ EDIT ]
|
[ DEL ]
📄 URI.py
2,898 B
SET
[ EDIT ]
|
[ DEL ]
📄 X25.py
2,119 B
SET
[ EDIT ]
|
[ DEL ]
📄 __init__.py
1,221 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: SSHFP.py
# Copyright (C) 2005-2007, 2009-2011 Nominum, Inc. # # Permission to use, copy, modify, and distribute this software and its # documentation for any purpose with or without fee is hereby granted, # provided that the above copyright notice and this permission notice # appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. import struct import binascii import dns.rdata import dns.rdatatype class SSHFP(dns.rdata.Rdata): """SSHFP record @ivar algorithm: the algorithm @type algorithm: int @ivar fp_type: the digest type @type fp_type: int @ivar fingerprint: the fingerprint @type fingerprint: string @see: draft-ietf-secsh-dns-05.txt""" __slots__ = ['algorithm', 'fp_type', 'fingerprint'] def __init__(self, rdclass, rdtype, algorithm, fp_type, fingerprint): super(SSHFP, self).__init__(rdclass, rdtype) self.algorithm = algorithm self.fp_type = fp_type self.fingerprint = fingerprint def to_text(self, origin=None, relativize=True, **kw): return '%d %d %s' % (self.algorithm, self.fp_type, dns.rdata._hexify(self.fingerprint, chunksize=128)) @classmethod def from_text(cls, rdclass, rdtype, tok, origin=None, relativize=True): algorithm = tok.get_uint8() fp_type = tok.get_uint8() chunks = [] while 1: t = tok.get().unescape() if t.is_eol_or_eof(): break if not t.is_identifier(): raise dns.exception.SyntaxError chunks.append(t.value.encode()) fingerprint = b''.join(chunks) fingerprint = binascii.unhexlify(fingerprint) return cls(rdclass, rdtype, algorithm, fp_type, fingerprint) def to_wire(self, file, compress=None, origin=None): header = struct.pack("!BB", self.algorithm, self.fp_type) file.write(header) file.write(self.fingerprint) @classmethod def from_wire(cls, rdclass, rdtype, wire, current, rdlen, origin=None): header = struct.unpack("!BB", wire[current: current + 2]) current += 2 rdlen -= 2 fingerprint = wire[current: current + rdlen].unwrap() return cls(rdclass, rdtype, header[0], header[1], fingerprint)