HEX
Server: Apache
System: Linux scp1.abinfocom.com 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
User: confeduphaar (1010)
PHP: 8.1.33
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //lib/python3/dist-packages/twisted/conch/__pycache__/error.cpython-38.pyc
U


W[�
�@s�dZddlmZmZddlmZGdd�de�ZGdd�de�ZGdd	�d	e�Z	Gd
d�de�Z
Gdd
�d
e�ZGdd�de�ZGdd�de�Z
Gdd�de�ZdS)zO
An error to represent bad things happening in Conch.

Maintainer: Paul Swartz
�)�absolute_import�division)�UnauthorizedLoginc@seZdZddd�ZdS)�
ConchErrorNcCst�|||�||_||_dS�N)�	Exception�__init__�value�data)�selfr	r
�r�5/usr/lib/python3/dist-packages/twisted/conch/error.pyrszConchError.__init__)N)�__name__�
__module__�__qualname__rrrrr
rsrc@seZdZdZdS)�NotEnoughAuthenticationz�
    This is thrown if the authentication is valid, but is not enough to
    successfully verify the user.  i.e. don't retry this type of
    authentication, try another one.
    N�rrr�__doc__rrrr
rsrc@seZdZdZdS)�ValidPublicKeya�
    Raised by public key checkers when they receive public key credentials
    that don't contain a signature at all, but are valid in every other way.
    (e.g. the public key matches one in the user's authorized_keys file).

    Protocol code (eg
    L{SSHUserAuthServer<twisted.conch.ssh.userauth.SSHUserAuthServer>}) which
    attempts to log in using
    L{ISSHPrivateKey<twisted.cred.credentials.ISSHPrivateKey>} credentials
    should be prepared to handle a failure of this type by telling the user to
    re-authenticate using the same key and to include a signature with the new
    attempt.

    See U{http://www.ietf.org/rfc/rfc4252.txt} section 7 for more details.
    Nrrrrr
r src@seZdZdZdS)�IgnoreAuthenticationzq
    This is thrown to let the UserAuthServer know it doesn't need to handle the
    authentication anymore.
    Nrrrrr
r3src@seZdZdZdS)�MissingKeyStoreErrorz�
    Raised if an SSHAgentServer starts receiving data without its factory
    providing a keys dict on which to read/write key data.
    Nrrrrr
r;src@seZdZdZdS)�UserRejectedKeyz0
    The user interactively rejected a key.
    Nrrrrr
rCsrc@seZdZdZdS)�InvalidEntryzS
    An entry in a known_hosts file could not be interpreted as a valid entry.
    Nrrrrr
rJsrc@seZdZdZdd�ZdS)�HostKeyChangeda�
    The host key of a remote host has changed.

    @ivar offendingEntry: The entry which contains the persistent host key that
    disagrees with the given host key.

    @type offendingEntry: L{twisted.conch.interfaces.IKnownHostEntry}

    @ivar path: a reference to the known_hosts file that the offending entry
    was loaded from

    @type path: L{twisted.python.filepath.FilePath}

    @ivar lineno: The line number of the offending entry in the given path.

    @type lineno: L{int}
    cCs t�|�||_||_||_dSr)rr�offendingEntry�path�lineno)rrrrrrr
rcs
zHostKeyChanged.__init__N)rrrrrrrrr
rQsrN)rZ
__future__rrZtwisted.cred.errorrrrrrrrrrrrrrr
�<module>s