Linux linux7.web4world.com 3.10.0-962.3.2.lve1.5.88.el7.x86_64 #1 SMP Fri Sep 26 14:06:42 UTC 2025 x86_64
: 199.38.113.107 | : 216.73.216.178
Cant Read [ /etc/named.conf ]
?5.6.40
siddhapu
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
lib64 /
python2.7 /
site-packages /
M2Crypto /
[ HOME SHELL ]
Name
Size
Permission
Action
?;
PGP
[ DIR ]
drwxr-xr-x
?;
SSL
[ DIR ]
drwxr-xr-x
ASN1.py
5.48
KB
-rw-r--r--
ASN1.pyc
9.22
KB
-rw-r--r--
ASN1.pyo
8.83
KB
-rw-r--r--
AuthCookie.py
3.01
KB
-rw-r--r--
AuthCookie.pyc
5.2
KB
-rw-r--r--
AuthCookie.pyo
5.14
KB
-rw-r--r--
BIO.py
7.22
KB
-rw-r--r--
BIO.pyc
11.86
KB
-rw-r--r--
BIO.pyo
11.86
KB
-rw-r--r--
BN.py
1.3
KB
-rw-r--r--
BN.pyc
1.83
KB
-rw-r--r--
BN.pyo
1.83
KB
-rw-r--r--
DH.py
2.32
KB
-rw-r--r--
DH.pyc
4.57
KB
-rw-r--r--
DH.pyo
4.14
KB
-rw-r--r--
DSA.py
13.69
KB
-rw-r--r--
DSA.pyc
17.01
KB
-rw-r--r--
DSA.pyo
16.43
KB
-rw-r--r--
EC.py
10.66
KB
-rw-r--r--
EC.pyc
12.98
KB
-rw-r--r--
EC.pyo
12.38
KB
-rw-r--r--
EVP.py
11.53
KB
-rw-r--r--
EVP.pyc
16.21
KB
-rw-r--r--
EVP.pyo
16.21
KB
-rw-r--r--
Engine.py
3.64
KB
-rw-r--r--
Engine.pyc
5.89
KB
-rw-r--r--
Engine.pyo
5.89
KB
-rw-r--r--
Err.py
1.1
KB
-rw-r--r--
Err.pyc
2.62
KB
-rw-r--r--
Err.pyo
2.62
KB
-rw-r--r--
RC4.py
692
B
-rw-r--r--
RC4.pyc
1.59
KB
-rw-r--r--
RC4.pyo
1.59
KB
-rw-r--r--
RSA.py
12.82
KB
-rw-r--r--
RSA.pyc
16.97
KB
-rw-r--r--
RSA.pyo
16.57
KB
-rw-r--r--
Rand.py
488
B
-rw-r--r--
Rand.pyc
583
B
-rw-r--r--
Rand.pyo
583
B
-rw-r--r--
SMIME.py
7.3
KB
-rw-r--r--
SMIME.pyc
10.63
KB
-rw-r--r--
SMIME.pyo
10.36
KB
-rw-r--r--
X509.py
33.83
KB
-rw-r--r--
X509.pyc
46.06
KB
-rw-r--r--
X509.pyo
43.75
KB
-rw-r--r--
__init__.py
1.39
KB
-rw-r--r--
__init__.pyc
1.91
KB
-rw-r--r--
__init__.pyo
1.91
KB
-rw-r--r--
__m2crypto.so
481.48
KB
-rwxr-xr-x
callback.py
249
B
-rw-r--r--
callback.pyc
475
B
-rw-r--r--
callback.pyo
475
B
-rw-r--r--
ftpslib.py
2.81
KB
-rw-r--r--
ftpslib.pyc
3.85
KB
-rw-r--r--
ftpslib.pyo
3.85
KB
-rw-r--r--
httpslib.py
7.8
KB
-rw-r--r--
httpslib.pyc
7.66
KB
-rw-r--r--
httpslib.pyo
7.56
KB
-rw-r--r--
m2.py
785
B
-rw-r--r--
m2.pyc
963
B
-rw-r--r--
m2.pyo
963
B
-rw-r--r--
m2urllib.py
2.07
KB
-rw-r--r--
m2urllib.pyc
2.1
KB
-rw-r--r--
m2urllib.pyo
2.1
KB
-rw-r--r--
m2urllib2.py
5.15
KB
-rw-r--r--
m2urllib2.pyc
4.97
KB
-rw-r--r--
m2urllib2.pyo
4.92
KB
-rw-r--r--
m2xmlrpclib.py
1.88
KB
-rw-r--r--
m2xmlrpclib.pyc
2.25
KB
-rw-r--r--
m2xmlrpclib.pyo
2.25
KB
-rw-r--r--
threading.py
347
B
-rw-r--r--
threading.pyc
789
B
-rw-r--r--
threading.pyo
789
B
-rw-r--r--
util.py
1.55
KB
-rw-r--r--
util.pyc
3
KB
-rw-r--r--
util.pyo
3
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : httpslib.py
"""M2Crypto support for Python's httplib. Copyright (c) 1999-2004 Ng Pheng Siong. All rights reserved.""" import string, sys import socket from urlparse import urlsplit, urlunsplit import base64 from httplib import * from httplib import HTTPS_PORT # This is not imported with just '*' import SSL class HTTPSConnection(HTTPConnection): """ This class allows communication via SSL using M2Crypto. """ default_port = HTTPS_PORT def __init__(self, host, port=None, strict=None, **ssl): self.session = None keys = ssl.keys() try: keys.remove('key_file') except ValueError: pass try: keys.remove('cert_file') except ValueError: pass try: keys.remove('ssl_context') except ValueError: pass if keys: raise ValueError('unknown keyword argument') try: self.ssl_ctx = ssl['ssl_context'] assert isinstance(self.ssl_ctx, SSL.Context), self.ssl_ctx except KeyError: self.ssl_ctx = SSL.Context('sslv23') HTTPConnection.__init__(self, host, port, strict) def connect(self): error = None # We ignore the returned sockaddr because SSL.Connection.connect needs # a host name. for (family, _, _, _, _) in \ socket.getaddrinfo(self.host, self.port, 0, socket.SOCK_STREAM): sock = None try: try: sock = SSL.Connection(self.ssl_ctx, family=family) if self.session is not None: sock.set_session(self.session) sock.connect((self.host, self.port)) self.sock = sock sock = None return except socket.error, e: # Other exception are probably SSL-related, in that case we # abort and the exception is forwarded to the caller. error = e finally: if sock is not None: sock.close() if error is None: raise AssertionError("Empty list returned by getaddrinfo") raise error def close(self): # This kludges around line 545 of httplib.py, # which closes the connection in this object; # the connection remains open in the response # object. # # M2Crypto doesn't close-here-keep-open-there, # so, in effect, we don't close until the whole # business is over and gc kicks in. # # XXX Long-running callers beware leakage. # # XXX 05-Jan-2002: This module works with Python 2.2, # XXX but I've not investigated if the above conditions # XXX remain. pass def get_session(self): return self.sock.get_session() def set_session(self, session): self.session = session class HTTPS(HTTP): _connection_class = HTTPSConnection def __init__(self, host='', port=None, strict=None, **ssl): HTTP.__init__(self, host, port, strict) try: self.ssl_ctx = ssl['ssl_context'] except KeyError: self.ssl_ctx = SSL.Context('sslv23') assert isinstance(self._conn, HTTPSConnection) self._conn.ssl_ctx = self.ssl_ctx class ProxyHTTPSConnection(HTTPSConnection): """ An HTTPS Connection that uses a proxy and the CONNECT request. When the connection is initiated, CONNECT is first sent to the proxy (along with authorization headers, if supplied). If successful, an SSL connection will be established over the socket through the proxy and to the target host. Finally, the actual request is sent over the SSL connection tunneling through the proxy. """ _ports = {'http' : 80, 'https' : 443} _AUTH_HEADER = "Proxy-Authorization" _UA_HEADER = "User-Agent" def __init__(self, host, port=None, strict=None, username=None, password=None, **ssl): """ Create the ProxyHTTPSConnection object. host and port are the hostname and port number of the proxy server. """ HTTPSConnection.__init__(self, host, port, strict, **ssl) self._username = username self._password = password self._proxy_auth = None self._proxy_UA = None def putrequest(self, method, url, skip_host=0, skip_accept_encoding=0): #putrequest is called before connect, so can interpret url and get #real host/port to be used to make CONNECT request to proxy proto, netloc, path, query, fragment = urlsplit(url) if not proto: raise ValueError, "unknown URL type: %s" % url #get host & port try: username_password, host_port = netloc.split('@') except ValueError: host_port = netloc try: host, port = host_port.split(':') except ValueError: host = host_port #try to get port from proto try: port = self._ports[proto] except KeyError: raise ValueError, "unknown protocol for: %s" % url self._real_host = host self._real_port = int(port) rest = urlunsplit((None, None, path, query, fragment)) if sys.version_info < (2,4): HTTPSConnection.putrequest(self, method, rest, skip_host) else: HTTPSConnection.putrequest(self, method, rest, skip_host, skip_accept_encoding) def putheader(self, header, value): # Store the auth header if passed in. if header.lower() == self._UA_HEADER.lower(): self._proxy_UA = value if header.lower() == self._AUTH_HEADER.lower(): self._proxy_auth = value else: HTTPSConnection.putheader(self, header, value) def endheaders(self, *args, **kwargs): # We've recieved all of hte headers. Use the supplied username # and password for authorization, possibly overriding the authstring # supplied in the headers. if not self._proxy_auth: self._proxy_auth = self._encode_auth() HTTPSConnection.endheaders(self, *args, **kwargs) def connect(self): HTTPConnection.connect(self) #send proxy CONNECT request self.sock.sendall(self._get_connect_msg()) response = HTTPResponse(self.sock) response.begin() code = response.status if code != 200: #proxy returned and error, abort connection, and raise exception self.close() raise socket.error, "Proxy connection failed: %d" % code self._start_ssl() def _get_connect_msg(self): """ Return an HTTP CONNECT request to send to the proxy. """ msg = "CONNECT %s:%d HTTP/1.1\r\n" % (self._real_host, self._real_port) msg = msg + "Host: %s:%d\r\n" % (self._real_host, self._real_port) if self._proxy_UA: msg = msg + "%s: %s\r\n" % (self._UA_HEADER, self._proxy_UA) if self._proxy_auth: msg = msg + "%s: %s\r\n" % (self._AUTH_HEADER, self._proxy_auth) msg = msg + "\r\n" return msg def _start_ssl(self): """ Make this connection's socket SSL-aware. """ self.sock = SSL.Connection(self.ssl_ctx, self.sock) self.sock.setup_ssl() self.sock.set_connect_state() self.sock.connect_ssl() def _encode_auth(self): """ Encode the username and password for use in the auth header. """ if not (self._username and self._password): return None # Authenticated proxy userpass = "%s:%s" % (self._username, self._password) enc_userpass = base64.encodestring(userpass).replace("\n", "") return "Basic %s" % enc_userpass
Close