
    Vh
                         d Z ddlmZ  G d de      Z G d de      Z G d de      Z G d	 d
e      Z G d de      Z G d de      Z	 G d de      Z
 G d de      Zy)zO
An error to represent bad things happening in Conch.

Maintainer: Paul Swartz
    )UnauthorizedLoginc                       e Zd ZddZy)
ConchErrorNc                 N    t         j                  | ||       || _        || _        y N)	Exception__init__valuedata)selfr
   r   s      C/home/dcms/DCMS/lib/python3.12/site-packages/twisted/conch/error.pyr	   zConchError.__init__   s"    4-
	    r   )__name__
__module____qualname__r	    r   r   r   r      s    r   r   c                       e Zd ZdZy)NotEnoughAuthenticationz
    This is thrown if the authentication is valid, but is not enough to
    successfully verify the user.  i.e. don't retry this type of
    authentication, try another one.
    Nr   r   r   __doc__r   r   r   r   r      s    r   r   c                       e Zd ZdZy)ValidPublicKeya  
    Raised by public key checkers when they receive public key credentials
    that don't contain a signature at all, but are valid in every other way.
    (e.g. the public key matches one in the user's authorized_keys file).

    Protocol code (eg
    L{SSHUserAuthServer<twisted.conch.ssh.userauth.SSHUserAuthServer>}) which
    attempts to log in using
    L{ISSHPrivateKey<twisted.cred.credentials.ISSHPrivateKey>} credentials
    should be prepared to handle a failure of this type by telling the user to
    re-authenticate using the same key and to include a signature with the new
    attempt.

    See U{http://www.ietf.org/rfc/rfc4252.txt} section 7 for more details.
    Nr   r   r   r   r   r      s    r   r   c                       e Zd ZdZy)IgnoreAuthenticationzq
    This is thrown to let the UserAuthServer know it doesn't need to handle the
    authentication anymore.
    Nr   r   r   r   r   r   /       r   r   c                       e Zd ZdZy)MissingKeyStoreErrorz
    Raised if an SSHAgentServer starts receiving data without its factory
    providing a keys dict on which to read/write key data.
    Nr   r   r   r   r   r   6   r   r   r   c                       e Zd ZdZy)UserRejectedKeyz0
    The user interactively rejected a key.
    Nr   r   r   r   r   r   =       r   r   c                       e Zd ZdZy)InvalidEntryzS
    An entry in a known_hosts file could not be interpreted as a valid entry.
    Nr   r   r   r   r"   r"   C   r    r   r"   c                       e Zd ZdZd Zy)HostKeyChangeda  
    The host key of a remote host has changed.

    @ivar offendingEntry: The entry which contains the persistent host key that
    disagrees with the given host key.

    @type offendingEntry: L{twisted.conch.interfaces.IKnownHostEntry}

    @ivar path: a reference to the known_hosts file that the offending entry
    was loaded from

    @type path: L{twisted.python.filepath.FilePath}

    @ivar lineno: The line number of the offending entry in the given path.

    @type lineno: L{int}
    c                 ^    t         j                  | |||       || _        || _        || _        y r   )r   r	   offendingEntrypathlineno)r   r&   r'   r(   s       r   r	   zHostKeyChanged.__init__\   s,    4v>,	r   N)r   r   r   r   r	   r   r   r   r$   r$   I   s    $r   r$   N)r   twisted.cred.errorr   r   r   r   r   r   r   r   r"   r$   r   r   r   <module>r*      sp    1 i & $9 9 i 9 Y r   