AnonSec Shell
Server IP : 209.38.156.173  /  Your IP : 216.73.216.122   [ Reverse IP ]
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux lakekumayuhotel 5.15.0-136-generic #147-Ubuntu SMP Sat Mar 15 15:53:30 UTC 2025 x86_64
User : root ( 0)
PHP Version : 8.1.2-1ubuntu2.22
Disable Function : NONE
Domains : 2 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /lib/python3/dist-packages/oauthlib/oauth1/rfc5849/endpoints/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /lib/python3/dist-packages/oauthlib/oauth1/rfc5849/endpoints/__pycache__/base.cpython-310.pyc
o

���a{-�@srdZddlZddlmZmZmZddlmZmZm	Z	m
Z
mZmZm
Z
mZmZmZmZmZmZmZGdd�d�ZdS)z�
oauthlib.oauth1.rfc5849.endpoints.base
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This module is an implementation of various logic needed
for signing and checking OAuth 1.0 RFC 5849 requests.
�N)�CaseInsensitiveDict�Request�generate_token�)�CONTENT_TYPE_FORM_URLENCODED�SIGNATURE_HMAC_SHA1�SIGNATURE_HMAC_SHA256�SIGNATURE_HMAC_SHA512�SIGNATURE_RSA_SHA1�SIGNATURE_RSA_SHA256�SIGNATURE_RSA_SHA512�SIGNATURE_PLAINTEXT�SIGNATURE_TYPE_AUTH_HEADER�SIGNATURE_TYPE_BODY�SIGNATURE_TYPE_QUERY�errors�	signature�utilsc@s@eZdZddd�Zdd�Zdd�Zdd	�Zd
d�Zdd
d�ZdS)�BaseEndpointNcCs||_|pt|_dS�N)�request_validatorr�token_generator)�selfrr�r�H/usr/lib/python3/dist-packages/oauthlib/oauth1/rfc5849/endpoints/base.py�__init__szBaseEndpoint.__init__c

Cs�tj|jddd�}tj|jdd�}tj|jdd�}g}|�|�|�|�|�|�ttdd�t|t	�
|�ft|t	�
|�ft|t	�
|�ff��}t
|�dkr`d	d
�|D�}tjdd�|�fd
��z	|d\}}}	Wn
tyvtjdd
��w|||	fS)z�Extracts parameters from query, headers and body. Signature type
        is set to the source in which parameters were found.
        FT)�headers�exclude_oauth_signature�
with_realm)�bodyr)�	uri_queryrcSs|dS)Nrr)�srrr�<lambda>-sz=BaseEndpoint._get_signature_type_and_params.<locals>.<lambda>�cSsg|]}|d�qS)rr)�.0r!rrr�
<listcomp>7sz?BaseEndpoint._get_signature_type_and_params.<locals>.<listcomp>zFoauth_ params must come from only 1 signaturetype but were found in %sz, ��descriptionr�#Missing mandatory OAuth parameters.)r�collect_parametersrrr �extend�list�filterrr�filter_oauth_paramsrr�lenr�InvalidRequestError�join�
IndexError)
r�request�
header_params�body_params�query_params�params�!signature_types_with_oauth_params�found_types�signature_type�oauth_paramsrrr�_get_signature_type_and_paramssR���



����	�����
z+BaseEndpoint._get_signature_type_and_paramsc	Cs$t|pi�}d|vrt|dvrt||||�}nt||d|�}|�|�\}}}tt|��t|�kr7tjdd��t|�}|�d�|_	|�d�|_
|�d�|_|�d�|_|�d	�|_
|�d
�|_|�d�|_|�d�|_t|��d
�|_||_dd�|D�|_d
|j�dd�vr�dd�|jD�|_|S)NzContent-Type�zDuplicate OAuth1 entries.r&�oauth_signature�oauth_consumer_key�oauth_token�oauth_nonce�oauth_timestamp�oauth_callback�oauth_verifier�oauth_signature_method�realmcS� g|]\}}|dkr||f�qS)r=r�r$�k�vrrrr%fs z0BaseEndpoint._create_request.<locals>.<listcomp>�
AuthorizationcSrF)rErrGrrrr%is�)rrrr;r.�dictrr/�getr�
client_key�resource_owner_key�nonce�	timestamp�redirect_uri�verifier�signature_methodrEr:r6r)	r�uri�http_methodrrr2r9r6r:rrr�_create_requestFs:
����zBaseEndpoint._create_requestcCs(|jjr|j���d�st���dSdS)Nzhttps://)r�enforce_sslrT�lower�
startswithr�InsecureTransportError)rr2rrr�_check_transport_securityns
��z&BaseEndpoint._check_transport_securitycCst|j|j|j|j|jf�stjdd��|j|jj	vr(tj
d�|j|jj	�d��d|jvr:|jddkr:tjdd��t
|j�dkrGtjdd��zt|j�}Wn
ty[tjd	d��wtt��|�|jjkrrtjd
|jjd��|j�|j�stjdd��|j�|j�s�tjdd��dS)
Nr(r&z"Invalid signature, {} not in {!r}.�
oauth_versionz1.0zInvalid OAuth version.�
zInvalid timestamp sizezTimestamp must be an integer.zCTimestamp given is invalid, differ from allowed by over %s seconds.zInvalid client key format.zInvalid nonce format.)�allrrMrOrPrSrr/r�allowed_signature_methods�InvalidSignatureMethodError�formatr:r.�int�
ValueError�abs�time�timestamp_lifetime�check_client_key�check_nonce)rr2�tsrrr�_check_mandatory_parametersts`
�����
����������z(BaseEndpoint._check_mandatory_parametersFcCsD|jtks|jtks|jtkrB|j�|j|�}|jtkr$t�||�}|S|jtkr1t�	||�}|S|jtkr>t�
||�}|Sd}|S|j�|j|�}d}|jrf|r\|j�
|j|j|�}n
|j�|j|j|�}|jtkrtt�|||�}|S|jtkr�t�|||�}|S|jtkr�t�|||�}|S|jtkr�t�|||�}|Sd}|S)NF)rSr
rrr�get_rsa_keyrMr�verify_rsa_sha1�verify_rsa_sha256�verify_rsa_sha512�get_client_secretrN�get_request_token_secret�get_access_token_secretr�verify_hmac_sha1r�verify_hmac_sha256r	�verify_hmac_sha512r
�verify_plaintext)rr2�is_token_request�rsa_key�valid_signature�
client_secret�resource_owner_secretrrr�_check_signature�sr
���
1
�/
�-�+������
�
��
��
���zBaseEndpoint._check_signaturer)F)	�__name__�
__module__�__qualname__rr;rVr[rjr{rrrrrs
*(Br)�__doc__re�oauthlib.commonrrrr<rrrr	r
rrr
rrrrrrrrrrr�<module>s
@	

Anon7 - 2022
AnonSec Team