Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 108.162.216.177
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
lib /
python2.7 /
dist-packages /
dns /
[ HOME SHELL ]
Name
Size
Permission
Action
__init__.pyc
769
B
-rw-r--r--
edns.pyc
5.27
KB
-rw-r--r--
entropy.pyc
3.74
KB
-rw-r--r--
exception.pyc
1.59
KB
-rw-r--r--
flags.pyc
2.61
KB
-rw-r--r--
hash.pyc
2.14
KB
-rw-r--r--
inet.pyc
2.63
KB
-rw-r--r--
ipv4.pyc
1.38
KB
-rw-r--r--
ipv6.pyc
3.45
KB
-rw-r--r--
message.pyc
36.56
KB
-rw-r--r--
name.pyc
23.2
KB
-rw-r--r--
opcode.pyc
2.52
KB
-rw-r--r--
query.pyc
15.38
KB
-rw-r--r--
rcode.pyc
2.94
KB
-rw-r--r--
rdata.pyc
16.74
KB
-rw-r--r--
rdataclass.pyc
2.97
KB
-rw-r--r--
rdataset.pyc
11.16
KB
-rw-r--r--
rdatatype.pyc
5.31
KB
-rw-r--r--
renderer.pyc
10.9
KB
-rw-r--r--
resolver.pyc
37.4
KB
-rw-r--r--
reversename.pyc
2.41
KB
-rw-r--r--
rrset.pyc
6.22
KB
-rw-r--r--
set.pyc
9.95
KB
-rw-r--r--
tokenizer.pyc
17.07
KB
-rw-r--r--
tsig.pyc
8.14
KB
-rw-r--r--
ttl.pyc
1.49
KB
-rw-r--r--
wiredata.pyc
2.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : opcode.pyc
� !`Nc @ s� d Z d d l Z d Z d Z d Z d Z d Z i e d 6e d 6e d 6e d 6e d 6Z e g e j � D] \ Z Z e e f ^ qi � Z d e j j f d � � YZ d � Z d � Z d � Z d � Z d � Z d S( s DNS Opcodes.i����Ni i i i i t QUERYt IQUERYt STATUSt NOTIFYt UPDATEt UnknownOpcodec B s e Z d Z RS( s Raised if an opcode is unknown.( t __name__t __module__t __doc__( ( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyR ) s c C se | j � r7 t | � } | d k r7 | d k r7 | Sn t j | j � � } | d k ra t � n | S( s� Convert text into an opcode. @param text: the textual opcode @type text: string @raises UnknownOpcode: the opcode is unknown @rtype: int i i N( t isdigitt intt _by_textt gett uppert NoneR ( t textt value( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyt from_text- s c C s | d @d ?S( sU Extract an opcode from DNS message flags. @param flags: int @rtype: int i x i ( ( t flags( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyt from_flags? s c C s | d >d @S( s` Convert an opcode to a value suitable for ORing into DNS message flags. @rtype: int i i x ( ( R ( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyt to_flagsH s c C s. t j | � } | d k r* t | � } n | S( s� Convert an opcode to text. @param value: the opcdoe @type value: int @raises UnknownOpcode: the opcode is unknown @rtype: string N( t _by_valueR R t str( R R ( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyt to_textP s c C s t | � t k r t St S( sn True if the opcode in flags is UPDATE. @param flags: DNS flags @type flags: int @rtype: bool ( R R t Truet False( R ( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyt is_update^ s ( R t dns.exceptiont dnsR R R R R R t dictt iteritemst xt yR t exceptiont DNSExceptionR R R R R R ( ( ( s4 /usr/local/lib/python2.7/dist-packages/dns/opcode.pyt <module> s&