Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
paramiko /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
agent.py
13.05
KB
-rw-r--r--
auth_handler.py
34.98
KB
-rw-r--r--
ber.py
4.25
KB
-rw-r--r--
buffered_pipe.py
7.29
KB
-rw-r--r--
channel.py
48.18
KB
-rw-r--r--
client.py
31.37
KB
-rw-r--r--
common.py
8.12
KB
-rw-r--r--
compress.py
1.26
KB
-rw-r--r--
config.py
26.66
KB
-rw-r--r--
dsskey.py
8
KB
-rw-r--r--
ecdsakey.py
11.21
KB
-rw-r--r--
ed25519key.py
7.26
KB
-rw-r--r--
file.py
19.13
KB
-rw-r--r--
hostkeys.py
12.98
KB
-rw-r--r--
__init__.py
3.91
KB
-rw-r--r--
kex_curve25519.py
4.46
KB
-rw-r--r--
kex_ecdh_nist.py
4.91
KB
-rw-r--r--
kex_gex.py
10.11
KB
-rw-r--r--
kex_group14.py
1.79
KB
-rw-r--r--
kex_group16.py
2.23
KB
-rw-r--r--
kex_group1.py
5.66
KB
-rw-r--r--
kex_gss.py
24
KB
-rw-r--r--
message.py
8.81
KB
-rw-r--r--
packet.py
22.13
KB
-rw-r--r--
pipe.py
3.83
KB
-rw-r--r--
pkey.py
28.31
KB
-rw-r--r--
primes.py
5
KB
-rw-r--r--
proxy.py
4.54
KB
-rw-r--r--
py3compat.py
4.11
KB
-rw-r--r--
rsakey.py
7.17
KB
-rw-r--r--
server.py
29.7
KB
-rw-r--r--
sftp_attr.py
8.22
KB
-rw-r--r--
sftp_client.py
33.82
KB
-rw-r--r--
sftp_file.py
20.1
KB
-rw-r--r--
sftp_handle.py
7.26
KB
-rw-r--r--
sftp.py
5.89
KB
-rw-r--r--
sftp_server.py
19.14
KB
-rw-r--r--
sftp_si.py
12.28
KB
-rw-r--r--
ssh_exception.py
7.24
KB
-rw-r--r--
ssh_gss.py
28.21
KB
-rw-r--r--
transport.py
122.91
KB
-rw-r--r--
util.py
8.36
KB
-rw-r--r--
_version.py
80
B
-rw-r--r--
_winapi.py
11.09
KB
-rw-r--r--
win_pageant.py
4.17
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rsakey.py
# Copyright (C) 2003-2007 Robey Pointer <robeypointer@gmail.com> # # This file is part of paramiko. # # Paramiko is free software; you can redistribute it and/or modify it under the # terms of the GNU Lesser General Public License as published by the Free # Software Foundation; either version 2.1 of the License, or (at your option) # any later version. # # Paramiko is distributed in the hope that it will be useful, but WITHOUT ANY # WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR # A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more # details. # # You should have received a copy of the GNU Lesser General Public License # along with Paramiko; if not, write to the Free Software Foundation, Inc., # 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. """ RSA keys. """ from cryptography.exceptions import InvalidSignature, UnsupportedAlgorithm from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes, serialization from cryptography.hazmat.primitives.asymmetric import rsa, padding from paramiko.message import Message from paramiko.pkey import PKey from paramiko.py3compat import PY2 from paramiko.ssh_exception import SSHException class RSAKey(PKey): """ Representation of an RSA key which can be used to sign and verify SSH2 data. """ HASHES = { "ssh-rsa": hashes.SHA1, "ssh-rsa-cert-v01@openssh.com": hashes.SHA1, "rsa-sha2-256": hashes.SHA256, "rsa-sha2-256-cert-v01@openssh.com": hashes.SHA256, "rsa-sha2-512": hashes.SHA512, "rsa-sha2-512-cert-v01@openssh.com": hashes.SHA512, } def __init__( self, msg=None, data=None, filename=None, password=None, key=None, file_obj=None, ): self.key = None self.public_blob = None if file_obj is not None: self._from_private_key(file_obj, password) return if filename is not None: self._from_private_key_file(filename, password) return if (msg is None) and (data is not None): msg = Message(data) if key is not None: self.key = key else: self._check_type_and_load_cert( msg=msg, # NOTE: this does NOT change when using rsa2 signatures; it's # purely about key loading, not exchange or verification key_type="ssh-rsa", cert_type="ssh-rsa-cert-v01@openssh.com", ) self.key = rsa.RSAPublicNumbers( e=msg.get_mpint(), n=msg.get_mpint() ).public_key(default_backend()) @property def size(self): return self.key.key_size @property def public_numbers(self): if isinstance(self.key, rsa.RSAPrivateKey): return self.key.private_numbers().public_numbers else: return self.key.public_numbers() def asbytes(self): m = Message() m.add_string("ssh-rsa") m.add_mpint(self.public_numbers.e) m.add_mpint(self.public_numbers.n) return m.asbytes() def __str__(self): # NOTE: as per inane commentary in #853, this appears to be the least # crummy way to get a representation that prints identical to Python # 2's previous behavior, on both interpreters. # TODO: replace with a nice clean fingerprint display or something if PY2: # Can't just return the .decode below for Py2 because stuff still # tries stuffing it into ASCII for whatever godforsaken reason return self.asbytes() else: return self.asbytes().decode("utf8", errors="ignore") @property def _fields(self): return (self.get_name(), self.public_numbers.e, self.public_numbers.n) def get_name(self): return "ssh-rsa" def get_bits(self): return self.size def can_sign(self): return isinstance(self.key, rsa.RSAPrivateKey) def sign_ssh_data(self, data, algorithm="ssh-rsa"): sig = self.key.sign( data, padding=padding.PKCS1v15(), algorithm=self.HASHES[algorithm](), ) m = Message() m.add_string(algorithm.replace("-cert-v01@openssh.com", "")) m.add_string(sig) return m def verify_ssh_sig(self, data, msg): sig_algorithm = msg.get_text() if sig_algorithm not in self.HASHES: return False key = self.key if isinstance(key, rsa.RSAPrivateKey): key = key.public_key() try: key.verify( msg.get_binary(), data, padding.PKCS1v15(), self.HASHES[sig_algorithm](), ) except InvalidSignature: return False else: return True def write_private_key_file(self, filename, password=None): self._write_private_key_file( filename, self.key, serialization.PrivateFormat.TraditionalOpenSSL, password=password, ) def write_private_key(self, file_obj, password=None): self._write_private_key( file_obj, self.key, serialization.PrivateFormat.TraditionalOpenSSL, password=password, ) @staticmethod def generate(bits, progress_func=None): """ Generate a new private RSA key. This factory function can be used to generate a new host key or authentication key. :param int bits: number of bits the generated key should be. :param progress_func: Unused :return: new `.RSAKey` private key """ key = rsa.generate_private_key( public_exponent=65537, key_size=bits, backend=default_backend() ) return RSAKey(key=key) # ...internals... def _from_private_key_file(self, filename, password): data = self._read_private_key_file("RSA", filename, password) self._decode_key(data) def _from_private_key(self, file_obj, password): data = self._read_private_key("RSA", file_obj, password) self._decode_key(data) def _decode_key(self, data): pkformat, data = data if pkformat == self._PRIVATE_KEY_FORMAT_ORIGINAL: try: key = serialization.load_der_private_key( data, password=None, backend=default_backend() ) except (ValueError, TypeError, UnsupportedAlgorithm) as e: raise SSHException(str(e)) elif pkformat == self._PRIVATE_KEY_FORMAT_OPENSSH: n, e, d, iqmp, p, q = self._uint32_cstruct_unpack(data, "iiiiii") public_numbers = rsa.RSAPublicNumbers(e=e, n=n) key = rsa.RSAPrivateNumbers( p=p, q=q, d=d, dmp1=d % (p - 1), dmq1=d % (q - 1), iqmp=iqmp, public_numbers=public_numbers, ).private_key(default_backend()) else: self._got_bad_key_format_id(pkformat) assert isinstance(key, rsa.RSAPrivateKey) self.key = key
Close