shell bypass 403
UnknownSec Shell
:
/
usr
/
lib
/
python3
/
dist-packages
/
twisted
/
words
/
test
/
__pycache__
/ [
drwxr-xr-x
]
upload
mass deface
mass delete
console
info server
name :
test_jabbersasl.cpython-312.pyc
� Ϫ�f�# � � � d dl mZ d dlmZ d dlmZ d dlmZmZm Z m Z d dlmZ dZ ee j � G d� d� � Z G d � d ej � Z G d� dej$ � Z G d � dej$ � Zy)� )�implementer)�defer)�unittest)�jid�sasl�sasl_mechanisms� xmlstream)�domish� urn:ietf:params:xml:ns:xmpp-saslc �. � e Zd ZdZdZdZdZd� Zd� Zd� Z y)�DummySASLMechanisma� Dummy SASL mechanism. This just returns the initialResponse passed on creation, stores any challenges and replies with the value of C{response}. @ivar challenge: Last received challenge. @type challenge: C{unicode}. @ivar initialResponse: Initial response to be returned when requested via C{getInitialResponse} or L{None}. @type initialResponse: C{unicode} N�DUMMY� c � � || _ y �N��initialResponse)�selfr s �D/usr/lib/python3/dist-packages/twisted/words/test/test_jabbersasl.py�__init__zDummySASLMechanism.__init__"