CasperSecurity

Current Path : /usr/lib/python3/dist-packages/systemd/__pycache__/
Upload File :
Current File : //usr/lib/python3/dist-packages/systemd/__pycache__/daemon.cpython-310.pyc

o

��X��@s�ddlmZddlmZmZmZmZmZm	Z	m
Z
mZmZm
Z
mZdd�Zddd�Zedd	fd
d�Zedd	dfdd
�Zddd�Zddd�Zddd�Zddd�ZdS)�)�	AF_UNSPEC�)�__version__�booted�notify�_listen_fds�_is_fifo�
_is_socket�_is_socket_inet�_is_socket_sockaddr�_is_socket_unix�_is_mq�LISTEN_FDS_STARTcCs"z|��WSty|YSw�N)�fileno�AttributeError)�fileobj�r�0/usr/lib/python3/dist-packages/systemd/daemon.py�_convert_fileobjs

�rNcC�t|�}t||�Sr)rr�r�path�fdrrr�is_fifo�
r���cC�t|�}t||||�Sr)rr	)r�family�type�	listeningrrrr�	is_socket�r!cC�t|�}t|||||�Sr)rr
)rrrr �portrrrr�is_socket_inetsr%cCr#)aaCheck socket type, address and/or port, flowinfo, listening state.

    Wraps sd_is_socket_inet_sockaddr(3).

    `address` is a systemd-style numerical IPv4 or IPv6 address as used in
    ListenStream=. A port may be included after a colon (":").
    See systemd.socket(5) for details.

    Constants for `family` are defined in the socket module.
    )rr)r�addressr�flowinfor rrrr�is_socket_sockaddr!sr(cCrr)rr)rrr rrrrr�is_socket_unix/r"r)cCrr)rr
rrrr�is_mq3rr*TcCst|�}tttt|��S)aSReturn a list of socket activated descriptors

    Example::

      (in primary window)
      $ systemd-activate -l 2000 python3 -c \
          'from systemd.daemon import listen_fds; print(listen_fds())'
      (in another window)
      $ telnet localhost 2000
      (in primary window)
      ...
      Execing python3 (...)
      [3]
    )r�list�ranger)�unset_environment�numrrr�
listen_fds7sr/r)rrr)rrN)T)�socketr�
_AF_UNSPEC�_daemonrrrrrr	r
rrr
rrrr!r%r(r)r*r/rrrr�<module>s4




Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY