Index: tools/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/keybase.py |
diff --git a/tools/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/keybase.py b/tools/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/keybase.py |
deleted file mode 100644 |
index 75c9272670bff9c3e002f0bf8b7f881c9e2b6084..0000000000000000000000000000000000000000 |
--- a/tools/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/keybase.py |
+++ /dev/null |
@@ -1,149 +0,0 @@ |
-# Copyright (C) 2004-2007, 2009, 2010 Nominum, Inc. |
-# |
-# Permission to use, copy, modify, and distribute this software and its |
-# documentation for any purpose with or without fee is hereby granted, |
-# provided that the above copyright notice and this permission notice |
-# appear in all copies. |
-# |
-# THE SOFTWARE IS PROVIDED "AS IS" AND NOMINUM DISCLAIMS ALL WARRANTIES |
-# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
-# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL NOMINUM BE LIABLE FOR |
-# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
-# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
-# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT |
-# OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
- |
-import struct |
- |
-import dns.exception |
-import dns.dnssec |
-import dns.rdata |
- |
-_flags_from_text = { |
- 'NOCONF': (0x4000, 0xC000), |
- 'NOAUTH': (0x8000, 0xC000), |
- 'NOKEY': (0xC000, 0xC000), |
- 'FLAG2': (0x2000, 0x2000), |
- 'EXTEND': (0x1000, 0x1000), |
- 'FLAG4': (0x0800, 0x0800), |
- 'FLAG5': (0x0400, 0x0400), |
- 'USER': (0x0000, 0x0300), |
- 'ZONE': (0x0100, 0x0300), |
- 'HOST': (0x0200, 0x0300), |
- 'NTYP3': (0x0300, 0x0300), |
- 'FLAG8': (0x0080, 0x0080), |
- 'FLAG9': (0x0040, 0x0040), |
- 'FLAG10': (0x0020, 0x0020), |
- 'FLAG11': (0x0010, 0x0010), |
- 'SIG0': (0x0000, 0x000f), |
- 'SIG1': (0x0001, 0x000f), |
- 'SIG2': (0x0002, 0x000f), |
- 'SIG3': (0x0003, 0x000f), |
- 'SIG4': (0x0004, 0x000f), |
- 'SIG5': (0x0005, 0x000f), |
- 'SIG6': (0x0006, 0x000f), |
- 'SIG7': (0x0007, 0x000f), |
- 'SIG8': (0x0008, 0x000f), |
- 'SIG9': (0x0009, 0x000f), |
- 'SIG10': (0x000a, 0x000f), |
- 'SIG11': (0x000b, 0x000f), |
- 'SIG12': (0x000c, 0x000f), |
- 'SIG13': (0x000d, 0x000f), |
- 'SIG14': (0x000e, 0x000f), |
- 'SIG15': (0x000f, 0x000f), |
- } |
- |
-_protocol_from_text = { |
- 'NONE' : 0, |
- 'TLS' : 1, |
- 'EMAIL' : 2, |
- 'DNSSEC' : 3, |
- 'IPSEC' : 4, |
- 'ALL' : 255, |
- } |
- |
-class KEYBase(dns.rdata.Rdata): |
- """KEY-like record base |
- |
- @ivar flags: the key flags |
- @type flags: int |
- @ivar protocol: the protocol for which this key may be used |
- @type protocol: int |
- @ivar algorithm: the algorithm used for the key |
- @type algorithm: int |
- @ivar key: the public key |
- @type key: string""" |
- |
- __slots__ = ['flags', 'protocol', 'algorithm', 'key'] |
- |
- def __init__(self, rdclass, rdtype, flags, protocol, algorithm, key): |
- super(KEYBase, self).__init__(rdclass, rdtype) |
- self.flags = flags |
- self.protocol = protocol |
- self.algorithm = algorithm |
- self.key = key |
- |
- def to_text(self, origin=None, relativize=True, **kw): |
- return '%d %d %d %s' % (self.flags, self.protocol, self.algorithm, |
- dns.rdata._base64ify(self.key)) |
- |
- def from_text(cls, rdclass, rdtype, tok, origin = None, relativize = True): |
- flags = tok.get_string() |
- if flags.isdigit(): |
- flags = int(flags) |
- else: |
- flag_names = flags.split('|') |
- flags = 0 |
- for flag in flag_names: |
- v = _flags_from_text.get(flag) |
- if v is None: |
- raise dns.exception.SyntaxError('unknown flag %s' % flag) |
- flags &= ~v[1] |
- flags |= v[0] |
- protocol = tok.get_string() |
- if protocol.isdigit(): |
- protocol = int(protocol) |
- else: |
- protocol = _protocol_from_text.get(protocol) |
- if protocol is None: |
- raise dns.exception.SyntaxError('unknown protocol %s' % protocol) |
- |
- algorithm = dns.dnssec.algorithm_from_text(tok.get_string()) |
- chunks = [] |
- while 1: |
- t = tok.get().unescape() |
- if t.is_eol_or_eof(): |
- break |
- if not t.is_identifier(): |
- raise dns.exception.SyntaxError |
- chunks.append(t.value) |
- b64 = ''.join(chunks) |
- key = b64.decode('base64_codec') |
- return cls(rdclass, rdtype, flags, protocol, algorithm, key) |
- |
- from_text = classmethod(from_text) |
- |
- def to_wire(self, file, compress = None, origin = None): |
- header = struct.pack("!HBB", self.flags, self.protocol, self.algorithm) |
- file.write(header) |
- file.write(self.key) |
- |
- def from_wire(cls, rdclass, rdtype, wire, current, rdlen, origin = None): |
- if rdlen < 4: |
- raise dns.exception.FormError |
- header = struct.unpack('!HBB', wire[current : current + 4]) |
- current += 4 |
- rdlen -= 4 |
- key = wire[current : current + rdlen] |
- return cls(rdclass, rdtype, header[0], header[1], header[2], |
- key) |
- |
- from_wire = classmethod(from_wire) |
- |
- def _cmp(self, other): |
- hs = struct.pack("!HBB", self.flags, self.protocol, self.algorithm) |
- ho = struct.pack("!HBB", other.flags, other.protocol, other.algorithm) |
- v = cmp(hs, ho) |
- if v == 0: |
- v = cmp(self.key, other.key) |
- return v |