File: //home/arjun/projects/env/lib/python3.10/site-packages/dns/__pycache__/tsig.cpython-310.pyc
o
!we�, � @ s� d Z ddlZddlZddlZddlZddlZddlZddlZddl ZG dd� dej
j�ZG dd� dej
j�Z
G dd� dej
j�ZG d d
� d
ej
j�ZG dd� dej
j�ZG d
d� de�ZG dd� de�ZG dd� de�ZG dd� de�Zej�d�Zej�d�Zej�d�Zej�d�Zej�d�Zej�d�Zej�d�Zej�d�Zej�d�Zej�d�Z eZ!eded ed!ed"ed#ed$ed%ed!ed"e d&i
Z"G d'd(� d(�Z#G d)d*� d*�Z$G d+d,� d,�Z%d:d-d.�Z&d/d0� Z'd;d2d3�Z( 1d<d4d5�Z)d6d7� Z*G d8d9� d9�Z+dS )=zDNS TSIG support.� Nc @ � e Zd ZdZdS )�BadTimez8The current time is not within the TSIG's validity time.N��__name__�
__module__�__qualname__�__doc__� r r �A/home/arjun/projects/env/lib/python3.10/site-packages/dns/tsig.pyr � r c @ r )�BadSignaturez#The TSIG signature fails to verify.Nr r r r r
r $ r r c @ r )�BadKeyz2The TSIG record owner name does not match the key.Nr r r r r
r
) r r
c @ r )�BadAlgorithmz*The TSIG algorithm does not match the key.Nr r r r r
r . r r c @ r )� PeerErrorz;Base class for all TSIG errors generated by the remote peerNr r r r r
r 3 r r c @ r )�
PeerBadKeyz$The peer didn't know the key we usedNr r r r r
r 8 r r c @ r )�PeerBadSignaturez*The peer didn't like the signature we sentNr r r r r
r = r r c @ r )�PeerBadTimez%The peer didn't like the time we sentNr r r r r
r B r r c @ r )�PeerBadTruncationz=The peer didn't like amount of truncation in the TSIG we sentNr r r r r
r G r r zHMAC-MD5.SIG-ALG.REG.INTz hmac-sha1zhmac-sha224zhmac-sha256zhmac-sha256-128zhmac-sha384zhmac-sha384-192zhmac-sha512zhmac-sha512-256�gss-tsig� � � � �0 � �@ � c @ s0 e Zd ZdZdd� Zdd� Zdd� Zdd � Zd
S )�GSSTSigaG
GSS-TSIG TSIG implementation. This uses the GSS-API context established
in the TKEY message handshake to sign messages using GSS-API message
integrity codes, per the RFC.
In order to avoid a direct GSSAPI dependency, the keyring holds a ref
to the GSSAPI object required, rather than the key itself.
c C s || _ d| _d| _d S )N� r )�gssapi_context�data�name)�selfr r r r
�__init__s s
zGSSTSig.__init__c C s | j |7 _ d S �N)r �r"