Linux server.edchosting.com 4.18.0-553.79.1.lve.el7h.x86_64 #1 SMP Wed Oct 15 16:34:46 UTC 2025 x86_64
LiteSpeed
Server IP : 75.98.162.185 & Your IP : 216.73.216.163
Domains :
Cant Read [ /etc/named.conf ]
User : goons4good
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
lib64 /
python3.6 /
site-packages /
M2Crypto /
SSL /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2021-09-16 10:31
Checker.py
10.81
KB
-rw-r--r--
2018-10-09 08:50
Cipher.py
1.52
KB
-rw-r--r--
2018-10-09 08:50
Connection.py
24.05
KB
-rw-r--r--
2018-10-09 08:50
Context.py
16.66
KB
-rw-r--r--
2018-03-13 10:16
SSLServer.py
2.05
KB
-rw-r--r--
2018-03-06 17:45
Session.py
1.78
KB
-rw-r--r--
2018-03-13 10:16
TwistedProtocolWrapper.py
17.58
KB
-rw-r--r--
2018-03-13 10:16
__init__.py
1.29
KB
-rw-r--r--
2019-06-08 06:58
cb.py
2.66
KB
-rw-r--r--
2017-10-26 12:53
ssl_dispatcher.py
1.1
KB
-rw-r--r--
2018-03-13 10:16
timeout.py
1.35
KB
-rw-r--r--
2018-10-09 08:50
Save
Rename
from __future__ import absolute_import """SSL callbacks Copyright (c) 1999-2003 Ng Pheng Siong. All rights reserved.""" import sys from M2Crypto import m2, util if util.py27plus: from typing import Any, List # noqa __all__ = ['unknown_issuer', 'ssl_verify_callback_stub', 'ssl_verify_callback', 'ssl_verify_callback_allow_unknown_ca', 'ssl_info_callback'] def ssl_verify_callback_stub(ssl_ctx_ptr, x509_ptr, errnum, errdepth, ok): # Deprecated return ok unknown_issuer = [ m2.X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT, m2.X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, m2.X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE, m2.X509_V_ERR_CERT_UNTRUSTED, ] def ssl_verify_callback(ssl_ctx_ptr, x509_ptr, errnum, errdepth, ok): # type: (bytes, bytes, int, int, int) -> int # Deprecated from M2Crypto.SSL.Context import Context ssl_ctx = Context.ctxmap()[int(ssl_ctx_ptr)] if errnum in unknown_issuer: if ssl_ctx.get_allow_unknown_ca(): sys.stderr.write("policy: %s: permitted...\n" % (m2.x509_get_verify_error(errnum))) sys.stderr.flush() ok = 1 # CRL checking goes here... if ok: if ssl_ctx.get_verify_depth() >= errdepth: ok = 1 else: ok = 0 return ok def ssl_verify_callback_allow_unknown_ca(ok, store): # type: (int, Any) -> int errnum = store.get_error() if errnum in unknown_issuer: ok = 1 return ok # Cribbed from OpenSSL's apps/s_cb.c. def ssl_info_callback(where, ret, ssl_ptr): # type: (int, int, bytes) -> None w = where & ~m2.SSL_ST_MASK if w & m2.SSL_ST_CONNECT: state = "SSL connect" elif w & m2.SSL_ST_ACCEPT: state = "SSL accept" else: state = "SSL state unknown" if where & m2.SSL_CB_LOOP: sys.stderr.write("LOOP: %s: %s\n" % (state, m2.ssl_get_state_v(ssl_ptr))) sys.stderr.flush() return if where & m2.SSL_CB_EXIT: if not ret: sys.stderr.write("FAILED: %s: %s\n" % (state, m2.ssl_get_state_v(ssl_ptr))) sys.stderr.flush() else: sys.stderr.write("INFO: %s: %s\n" % (state, m2.ssl_get_state_v(ssl_ptr))) sys.stderr.flush() return if where & m2.SSL_CB_ALERT: if where & m2.SSL_CB_READ: w = 'read' else: w = 'write' sys.stderr.write("ALERT: %s: %s: %s\n" % (w, m2.ssl_get_alert_type_v(ret), m2.ssl_get_alert_desc_v(ret))) sys.stderr.flush() return