Hackfut Security File Manager
Current Path:
/usr/lib/python2.6/site-packages/pyzor
usr
/
lib
/
python2.6
/
site-packages
/
pyzor
/
📁
..
📄
__init__.py
(1.38 KB)
📄
__init__.pyc
(2.42 KB)
📄
account.py
(2.49 KB)
📄
account.pyc
(3.2 KB)
📄
client.py
(10.56 KB)
📄
client.pyc
(12.83 KB)
📄
config.py
(8.95 KB)
📄
config.pyc
(8.28 KB)
📄
digest.py
(5.74 KB)
📄
digest.pyc
(6.3 KB)
📁
engines
📄
forwarder.py
(2.51 KB)
📄
forwarder.pyc
(2.89 KB)
📁
hacks
📄
message.py
(3.93 KB)
📄
message.pyc
(8.56 KB)
📄
server.py
(15.41 KB)
📄
server.pyc
(16.25 KB)
Editing: __init__.py
"""Networked spam-signature detection.""" __author__ = "Frank J. Tobin, ftobin@neverending.org" __credits__ = "Tony Meyer, Dreas von Donselaar, all the Pyzor contributors." __version__ = "1.0.0" import hashlib proto_name = 'pyzor' proto_version = 2.1 anonymous_user = 'anonymous' # We would like to use sha512, but that would mean that all the digests # changed, so for now, we stick with sha1 (which is the same as the old # sha module). sha = hashlib.sha1 # This is the maximum time between a client signing a Pyzor request and the # server checking the signature. MAX_TIMESTAMP_DIFFERENCE = 300 # seconds class CommError(Exception): """Something in general went wrong with the transaction.""" code = 400 class ProtocolError(CommError): """Something is wrong with talking the protocol.""" code = 400 class TimeoutError(CommError): """The connection timed out.""" code = 504 class IncompleteMessageError(ProtocolError): """A complete requested was not received.""" pass class UnsupportedVersionError(ProtocolError): """Client is using an unsupported protocol version.""" pass class SignatureError(CommError): """Unknown user, signature on msg invalid, or not within allowed time range.""" pass class AuthorizationError(CommError): """The signature was valid, but the user is not permitted to do the requested action.""" pass
Upload File
Create Folder