shell bypass 403

Cubjrnet7 Shell


name : opcode.cpython-39.pyc
a

�M�e�
�@s�dZddlZddlZGdd�dejj�ZGdd�dejj�Z	e
ed�dd	�Zeed
�dd�Z
eed
�dd�Zee
d
�dd�Zeed
�dd�ZejZejZejZejZejZdS)zDNS Opcodes.�Nc@s8eZdZdZdZdZdZdZedd��Z	edd	��Z
d
S)�Opcoder����cCsdS)N����clsrr�./usr/lib/python3.9/site-packages/dns/opcode.py�_maximum$szOpcode._maximumcCstS)N)�
UnknownOpcoder	rrr�_unknown_exception_class(szOpcode._unknown_exception_classN)�__name__�
__module__�__qualname__�QUERY�IQUERY�STATUS�NOTIFY�UPDATE�classmethodrrrrrrrs
rc@seZdZdZdS)r
zAn DNS opcode is unknown.N)rrr�__doc__rrrrr
-sr
)�text�returncCs
t�|�S)z�Convert text into an opcode.

    *text*, a ``str``, the textual opcode

    Raises ``dns.opcode.UnknownOpcode`` if the opcode is unknown.

    Returns an ``int``.
    )r�	from_text)rrrrr1s
r)�flagsrcCst|d@d?�S)zpExtract an opcode from DNS message flags.

    *flags*, an ``int``, the DNS flags.

    Returns an ``int``.
    �x�)r�rrrr�
from_flags>sr )�valuercCs|d>d@S)z�Convert an opcode to a value suitable for ORing into DNS message
    flags.

    *value*, an ``int``, the DNS opcode value.

    Returns an ``int``.
    rrr�r!rrr�to_flagsIs	r#cCs
t�|�S)z�Convert an opcode to text.

    *value*, an ``int`` the opcode value,

    Raises ``dns.opcode.UnknownOpcode`` if the opcode is unknown.

    Returns a ``str``.
    )r�to_textr"rrrr$Us
r$cCst|�tjkS)zmIs the opcode in flags UPDATE?

    *flags*, an ``int``, the DNS message flags.

    Returns a ``bool``.
    )r rrrrrr�	is_updatebsr%)rZdns.enumZdnsZ
dns.exception�enum�IntEnumr�	exceptionZDNSExceptionr
�strr�intr r#r$�boolr%rrrrrrrrr�<module>s




© 2025 Cubjrnet7