SILENT KILLERPanel

Current Path: > > lib > python3.6 > site-packages > > dns


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: //lib/python3.6/site-packages//dns

NameTypeSizeLast ModifiedActions
__pycache__ Directory - -
rdtypes Directory - -
__init__.py File 1327 bytes September 20 2016 16:24:02.
_compat.py File 1313 bytes September 20 2016 16:24:02.
dnssec.py File 14791 bytes September 20 2016 16:24:02.
e164.py File 3147 bytes September 20 2016 16:24:02.
edns.py File 4384 bytes September 20 2016 16:24:02.
entropy.py File 4465 bytes September 20 2016 16:24:02.
exception.py File 4626 bytes September 20 2016 19:13:40.
flags.py File 2664 bytes September 20 2016 16:24:02.
grange.py File 1973 bytes September 20 2016 16:24:02.
hash.py File 1100 bytes September 20 2016 16:24:02.
inet.py File 3242 bytes September 20 2016 16:24:02.
ipv4.py File 2031 bytes September 20 2016 16:24:02.
ipv6.py File 5293 bytes September 20 2016 16:24:02.
message.py File 43129 bytes September 26 2016 15:38:18.
name.py File 29425 bytes May 23 2024 10:29:27.
namedict.py File 3677 bytes September 20 2016 16:24:02.
node.py File 6056 bytes September 20 2016 16:24:02.
opcode.py File 2538 bytes September 20 2016 16:24:02.
query.py File 19645 bytes May 23 2024 10:29:27.
rcode.py File 3104 bytes September 20 2016 16:24:02.
rdata.py File 14997 bytes September 20 2016 16:24:02.
rdataclass.py File 3258 bytes September 20 2016 16:24:02.
rdataset.py File 11556 bytes September 20 2016 16:24:02.
rdatatype.py File 5339 bytes September 20 2016 19:54:45.
renderer.py File 11923 bytes September 20 2016 16:24:02.
resolver.py File 52105 bytes September 26 2016 15:52:30.
reversename.py File 3311 bytes September 20 2016 16:24:02.
rrset.py File 5995 bytes September 25 2016 19:25:33.
set.py File 7715 bytes September 20 2016 16:24:02.
tokenizer.py File 18313 bytes September 20 2016 16:24:02.
tsig.py File 7718 bytes September 20 2016 16:24:02.
tsigkeyring.py File 1737 bytes September 20 2016 16:24:02.
ttl.py File 2283 bytes September 20 2016 16:24:02.
update.py File 10012 bytes September 20 2016 16:24:02.
version.py File 1258 bytes September 20 2016 16:24:02.
wiredata.py File 3731 bytes September 20 2016 16:24:02.
zone.py File 40026 bytes September 29 2016 22:29:39.

Reading File: //lib/python3.6/site-packages//dns/rdataclass.py

# Copyright (C) 2001-2007, 2009-2011 Nominum, Inc.
#
# Permission to use, copy, modify, and distribute this software and its
# documentation for any purpose with or without fee is hereby granted,
# provided that the above copyright notice and this permission notice
# appear in all copies.
#
# THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES
# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR
# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
# OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

"""DNS Rdata Classes.

@var _by_text: The rdata class textual name to value mapping
@type _by_text: dict
@var _by_value: The rdata class value to textual name mapping
@type _by_value: dict
@var _metaclasses: If an rdataclass is a metaclass, there will be a mapping
whose key is the rdatatype value and whose value is True in this dictionary.
@type _metaclasses: dict"""

import re

import dns.exception

RESERVED0 = 0
IN = 1
CH = 3
HS = 4
NONE = 254
ANY = 255

_by_text = {
    'RESERVED0': RESERVED0,
    'IN': IN,
    'CH': CH,
    'HS': HS,
    'NONE': NONE,
    'ANY': ANY
}

# We construct the inverse mapping programmatically to ensure that we
# cannot make any mistakes (e.g. omissions, cut-and-paste errors) that
# would cause the mapping not to be true inverse.

_by_value = dict((y, x) for x, y in _by_text.items())

# Now that we've built the inverse map, we can add class aliases to
# the _by_text mapping.

_by_text.update({
    'INTERNET': IN,
    'CHAOS': CH,
    'HESIOD': HS
})

_metaclasses = {
    NONE: True,
    ANY: True
}

_unknown_class_pattern = re.compile('CLASS([0-9]+)$', re.I)


class UnknownRdataclass(dns.exception.DNSException):

    """A DNS class is unknown."""


def from_text(text):
    """Convert text into a DNS rdata class value.
    @param text: the text
    @type text: string
    @rtype: int
    @raises dns.rdataclass.UnknownRdataclass: the class is unknown
    @raises ValueError: the rdata class value is not >= 0 and <= 65535
    """

    value = _by_text.get(text.upper())
    if value is None:
        match = _unknown_class_pattern.match(text)
        if match is None:
            raise UnknownRdataclass
        value = int(match.group(1))
        if value < 0 or value > 65535:
            raise ValueError("class must be between >= 0 and <= 65535")
    return value


def to_text(value):
    """Convert a DNS rdata class to text.
    @param value: the rdata class value
    @type value: int
    @rtype: string
    @raises ValueError: the rdata class value is not >= 0 and <= 65535
    """

    if value < 0 or value > 65535:
        raise ValueError("class must be between >= 0 and <= 65535")
    text = _by_value.get(value)
    if text is None:
        text = 'CLASS' + repr(value)
    return text


def is_metaclass(rdclass):
    """True if the class is a metaclass.
    @param rdclass: the rdata class
    @type rdclass: int
    @rtype: bool"""

    if rdclass in _metaclasses:
        return True
    return False

SILENT KILLER Tool