AnonSec Shell
Server IP : 209.38.156.173  /  Your IP : 216.73.216.122   [ Reverse IP ]
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux lakekumayuhotel 5.15.0-136-generic #147-Ubuntu SMP Sat Mar 15 15:53:30 UTC 2025 x86_64
User : root ( 0)
PHP Version : 8.1.2-1ubuntu2.22
Disable Function : NONE
Domains : 2 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /lib/python3/dist-packages/twisted/conch/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /lib/python3/dist-packages/twisted/conch/__pycache__/error.cpython-310.pyc
o

�bc
�@s�dZddlmZGdd�de�ZGdd�de�ZGdd�de�ZGd	d
�d
e�ZGdd�de�ZGd
d�de�Z	Gdd�de�Z
Gdd�de�ZdS)zO
An error to represent bad things happening in Conch.

Maintainer: Paul Swartz
�)�UnauthorizedLoginc@seZdZddd�ZdS)�
ConchErrorNcCst�|||�||_||_dS�N)�	Exception�__init__�value�data)�selfrr�r
�5/usr/lib/python3/dist-packages/twisted/conch/error.pyrs
zConchError.__init__r)�__name__�
__module__�__qualname__rr
r
r
rrsrc@�eZdZdZdS)�NotEnoughAuthenticationz�
    This is thrown if the authentication is valid, but is not enough to
    successfully verify the user.  i.e. don't retry this type of
    authentication, try another one.
    N�rr
r�__doc__r
r
r
rr�rc@r)�ValidPublicKeya�
    Raised by public key checkers when they receive public key credentials
    that don't contain a signature at all, but are valid in every other way.
    (e.g. the public key matches one in the user's authorized_keys file).

    Protocol code (eg
    L{SSHUserAuthServer<twisted.conch.ssh.userauth.SSHUserAuthServer>}) which
    attempts to log in using
    L{ISSHPrivateKey<twisted.cred.credentials.ISSHPrivateKey>} credentials
    should be prepared to handle a failure of this type by telling the user to
    re-authenticate using the same key and to include a signature with the new
    attempt.

    See U{http://www.ietf.org/rfc/rfc4252.txt} section 7 for more details.
    Nrr
r
r
rrrrc@r)�IgnoreAuthenticationzq
    This is thrown to let the UserAuthServer know it doesn't need to handle the
    authentication anymore.
    Nrr
r
r
rr/rrc@r)�MissingKeyStoreErrorz�
    Raised if an SSHAgentServer starts receiving data without its factory
    providing a keys dict on which to read/write key data.
    Nrr
r
r
rr6rrc@r)�UserRejectedKeyz0
    The user interactively rejected a key.
    Nrr
r
r
rr=rrc@r)�InvalidEntryzS
    An entry in a known_hosts file could not be interpreted as a valid entry.
    Nrr
r
r
rrCrrc@seZdZdZdd�ZdS)�HostKeyChangeda�
    The host key of a remote host has changed.

    @ivar offendingEntry: The entry which contains the persistent host key that
    disagrees with the given host key.

    @type offendingEntry: L{twisted.conch.interfaces.IKnownHostEntry}

    @ivar path: a reference to the known_hosts file that the offending entry
    was loaded from

    @type path: L{twisted.python.filepath.FilePath}

    @ivar lineno: The line number of the offending entry in the given path.

    @type lineno: L{int}
    cCs t�|�||_||_||_dSr)rr�offendingEntry�path�lineno)r	rrrr
r
rr\s

zHostKeyChanged.__init__N)rr
rrrr
r
r
rrIsrN)r�twisted.cred.errorrrrrrrrrrrr
r
r
r�<module>s

Anon7 - 2022
AnonSec Team