[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.20
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
lib
/
python3.6
/
site-packages
/
dns
/
rdtypes
/
ANY
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 __pycache__
SET
[ DEL ]
📄 AFSDB.py
1,848 B
SET
[ EDIT ]
|
[ DEL ]
📄 AVC.py
950 B
SET
[ EDIT ]
|
[ DEL ]
📄 CAA.py
2,622 B
SET
[ EDIT ]
|
[ DEL ]
📄 CDNSKEY.py
1,026 B
SET
[ EDIT ]
|
[ DEL ]
📄 CDS.py
875 B
SET
[ EDIT ]
|
[ DEL ]
📄 CERT.py
3,951 B
SET
[ EDIT ]
|
[ DEL ]
📄 CNAME.py
1,084 B
SET
[ EDIT ]
|
[ DEL ]
📄 CSYNC.py
4,644 B
SET
[ EDIT ]
|
[ DEL ]
📄 DLV.py
864 B
SET
[ EDIT ]
|
[ DEL ]
📄 DNAME.py
979 B
SET
[ EDIT ]
|
[ DEL ]
📄 DNSKEY.py
1,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 DS.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 EUI48.py
1,124 B
SET
[ EDIT ]
|
[ DEL ]
📄 EUI64.py
1,134 B
SET
[ EDIT ]
|
[ DEL ]
📄 GPOS.py
5,369 B
SET
[ EDIT ]
|
[ DEL ]
📄 HINFO.py
2,665 B
SET
[ EDIT ]
|
[ DEL ]
📄 HIP.py
4,144 B
SET
[ EDIT ]
|
[ DEL ]
📄 ISDN.py
3,269 B
SET
[ EDIT ]
|
[ DEL ]
📄 LOC.py
12,264 B
SET
[ EDIT ]
|
[ DEL ]
📄 MX.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 NS.py
873 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC.py
4,690 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC3.py
7,073 B
SET
[ EDIT ]
|
[ DEL ]
📄 NSEC3PARAM.py
3,098 B
SET
[ EDIT ]
|
[ DEL ]
📄 PTR.py
875 B
SET
[ EDIT ]
|
[ DEL ]
📄 RP.py
3,070 B
SET
[ EDIT ]
|
[ DEL ]
📄 RRSIG.py
5,663 B
SET
[ EDIT ]
|
[ DEL ]
📄 RT.py
891 B
SET
[ EDIT ]
|
[ DEL ]
📄 SOA.py
4,520 B
SET
[ EDIT ]
|
[ DEL ]
📄 SPF.py
899 B
SET
[ EDIT ]
|
[ DEL ]
📄 SSHFP.py
2,828 B
SET
[ EDIT ]
|
[ DEL ]
📄 TLSA.py
2,956 B
SET
[ EDIT ]
|
[ DEL ]
📄 TXT.py
878 B
SET
[ EDIT ]
|
[ DEL ]
📄 URI.py
2,898 B
SET
[ EDIT ]
|
[ DEL ]
📄 X25.py
2,119 B
SET
[ EDIT ]
|
[ DEL ]
📄 __init__.py
1,221 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: TLSA.py
# Copyright (C) 2005-2007, 2009-2011 Nominum, Inc. # # Permission to use, copy, modify, and distribute this software and its # documentation for any purpose with or without fee is hereby granted, # provided that the above copyright notice and this permission notice # appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT # OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. import struct import binascii import dns.rdata import dns.rdatatype class TLSA(dns.rdata.Rdata): """TLSA record @ivar usage: The certificate usage @type usage: int @ivar selector: The selector field @type selector: int @ivar mtype: The 'matching type' field @type mtype: int @ivar cert: The 'Certificate Association Data' field @type cert: string @see: RFC 6698""" __slots__ = ['usage', 'selector', 'mtype', 'cert'] def __init__(self, rdclass, rdtype, usage, selector, mtype, cert): super(TLSA, self).__init__(rdclass, rdtype) self.usage = usage self.selector = selector self.mtype = mtype self.cert = cert def to_text(self, origin=None, relativize=True, **kw): return '%d %d %d %s' % (self.usage, self.selector, self.mtype, dns.rdata._hexify(self.cert, chunksize=128)) @classmethod def from_text(cls, rdclass, rdtype, tok, origin=None, relativize=True): usage = tok.get_uint8() selector = tok.get_uint8() mtype = tok.get_uint8() cert_chunks = [] while 1: t = tok.get().unescape() if t.is_eol_or_eof(): break if not t.is_identifier(): raise dns.exception.SyntaxError cert_chunks.append(t.value.encode()) cert = b''.join(cert_chunks) cert = binascii.unhexlify(cert) return cls(rdclass, rdtype, usage, selector, mtype, cert) def to_wire(self, file, compress=None, origin=None): header = struct.pack("!BBB", self.usage, self.selector, self.mtype) file.write(header) file.write(self.cert) @classmethod def from_wire(cls, rdclass, rdtype, wire, current, rdlen, origin=None): header = struct.unpack("!BBB", wire[current: current + 3]) current += 3 rdlen -= 3 cert = wire[current: current + rdlen].unwrap() return cls(rdclass, rdtype, header[0], header[1], header[2], cert)