SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

: /lib64/python2.7/site-packages/dns/ [ drwxr-xr-x ]
Uname\Kernel: Linux server.kxo.bgz.mybluehostin.me 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Server: Apache
PHP Version: 8.2.28 [ PHP INFO ]
Operating System: Linux
Server Ip: 162.240.163.222
Your Ip: 216.73.216.114
Date Time: 2025-07-11 02:54:06
User: dilseshaadi (1027) | Group: dilseshaadi (1027)
Safe Mode: OFF
Disable Function: exec,passthru,shell_exec,system

name : opcode.pyc
�
!`Nc@s�dZddlZdZdZdZdZdZied6ed	6ed
6ed6ed6Ze	gej
�D]\ZZeef^qi�Z
d
ejjfd��YZd�Zd�Zd�Zd�Zd�ZdS(sDNS Opcodes.i����NiiiiitQUERYtIQUERYtSTATUStNOTIFYtUPDATEt
UnknownOpcodecBseZdZRS(sRaised if an opcode is unknown.(t__name__t
__module__t__doc__(((s0/usr/lib64/python2.7/site-packages/dns/opcode.pyR)scCse|j�r7t|�}|dkr7|dkr7|Sntj|j��}|dkrat�n|S(s�Convert text into an opcode.

    @param text: the textual opcode
    @type text: string
    @raises UnknownOpcode: the opcode is unknown
    @rtype: int
    iiN(tisdigittintt_by_texttgettuppertNoneR(ttexttvalue((s0/usr/lib64/python2.7/site-packages/dns/opcode.pyt	from_text-s		cCs|d@d?S(sUExtract an opcode from DNS message flags.

    @param flags: int
    @rtype: int
    ixi((tflags((s0/usr/lib64/python2.7/site-packages/dns/opcode.pyt
from_flags?scCs|d>d@S(s`Convert an opcode to a value suitable for ORing into DNS message
    flags.
    @rtype: int
    iix((R((s0/usr/lib64/python2.7/site-packages/dns/opcode.pytto_flagsHscCs.tj|�}|dkr*t|�}n|S(s�Convert an opcode to text.

    @param value: the opcdoe
    @type value: int
    @raises UnknownOpcode: the opcode is unknown
    @rtype: string
    N(t	_by_valueRRtstr(RR((s0/usr/lib64/python2.7/site-packages/dns/opcode.pytto_textPs	cCst|�tkrtStS(snTrue if the opcode in flags is UPDATE.

    @param flags: DNS flags
    @type flags: int
    @rtype: bool
    (RRtTruetFalse(R((s0/usr/lib64/python2.7/site-packages/dns/opcode.pyt	is_update^s(Rt
dns.exceptiontdnsRRRRRRtdictt	iteritemstxtyRt	exceptiontDNSExceptionRRRRRR(((s0/usr/lib64/python2.7/site-packages/dns/opcode.pyt<module>s&
1					
© 2025 Faizzz-Chin