���ѧۧݧ�ӧ�� �ާ֧ߧ֧էا֧� - ���֧էѧܧ�ڧ��ӧѧ�� - /home/ukubnwwtacc0unt/chapelbellstudios.com/uploads/cover/ciphers.tar
���ѧ٧ѧ�
__init__.py 0000644 00000001207 15204267710 0006661 0 ustar 00 # This file is dual licensed under the terms of the Apache License, Version # 2.0, and the BSD License. See the LICENSE file in the root of this repository # for complete details. from __future__ import absolute_import, division, print_function from cryptography.hazmat.primitives.ciphers.base import ( AEADCipherContext, AEADDecryptionContext, AEADEncryptionContext, BlockCipherAlgorithm, Cipher, CipherAlgorithm, CipherContext, ) __all__ = [ "Cipher", "CipherAlgorithm", "BlockCipherAlgorithm", "CipherContext", "AEADCipherContext", "AEADDecryptionContext", "AEADEncryptionContext", ] aead.py 0000644 00000013733 15204267710 0006023 0 ustar 00 # This file is dual licensed under the terms of the Apache License, Version # 2.0, and the BSD License. See the LICENSE file in the root of this repository # for complete details. from __future__ import absolute_import, division, print_function import os from cryptography import exceptions, utils from cryptography.hazmat.backends.openssl import aead from cryptography.hazmat.backends.openssl.backend import backend class ChaCha20Poly1305(object): _MAX_SIZE = 2 ** 32 def __init__(self, key): if not backend.aead_cipher_supported(self): raise exceptions.UnsupportedAlgorithm( "ChaCha20Poly1305 is not supported by this version of OpenSSL", exceptions._Reasons.UNSUPPORTED_CIPHER, ) utils._check_byteslike("key", key) if len(key) != 32: raise ValueError("ChaCha20Poly1305 key must be 32 bytes.") self._key = key @classmethod def generate_key(cls): return os.urandom(32) def encrypt(self, nonce, data, associated_data): if associated_data is None: associated_data = b"" if len(data) > self._MAX_SIZE or len(associated_data) > self._MAX_SIZE: # This is OverflowError to match what cffi would raise raise OverflowError( "Data or associated data too long. Max 2**32 bytes" ) self._check_params(nonce, data, associated_data) return aead._encrypt(backend, self, nonce, data, associated_data, 16) def decrypt(self, nonce, data, associated_data): if associated_data is None: associated_data = b"" self._check_params(nonce, data, associated_data) return aead._decrypt(backend, self, nonce, data, associated_data, 16) def _check_params(self, nonce, data, associated_data): utils._check_byteslike("nonce", nonce) utils._check_bytes("data", data) utils._check_bytes("associated_data", associated_data) if len(nonce) != 12: raise ValueError("Nonce must be 12 bytes") class AESCCM(object): _MAX_SIZE = 2 ** 32 def __init__(self, key, tag_length=16): utils._check_byteslike("key", key) if len(key) not in (16, 24, 32): raise ValueError("AESCCM key must be 128, 192, or 256 bits.") self._key = key if not isinstance(tag_length, int): raise TypeError("tag_length must be an integer") if tag_length not in (4, 6, 8, 10, 12, 14, 16): raise ValueError("Invalid tag_length") self._tag_length = tag_length @classmethod def generate_key(cls, bit_length): if not isinstance(bit_length, int): raise TypeError("bit_length must be an integer") if bit_length not in (128, 192, 256): raise ValueError("bit_length must be 128, 192, or 256") return os.urandom(bit_length // 8) def encrypt(self, nonce, data, associated_data): if associated_data is None: associated_data = b"" if len(data) > self._MAX_SIZE or len(associated_data) > self._MAX_SIZE: # This is OverflowError to match what cffi would raise raise OverflowError( "Data or associated data too long. Max 2**32 bytes" ) self._check_params(nonce, data, associated_data) self._validate_lengths(nonce, len(data)) return aead._encrypt( backend, self, nonce, data, associated_data, self._tag_length ) def decrypt(self, nonce, data, associated_data): if associated_data is None: associated_data = b"" self._check_params(nonce, data, associated_data) return aead._decrypt( backend, self, nonce, data, associated_data, self._tag_length ) def _validate_lengths(self, nonce, data_len): # For information about computing this, see # https://tools.ietf.org/html/rfc3610#section-2.1 l_val = 15 - len(nonce) if 2 ** (8 * l_val) < data_len: raise ValueError("Data too long for nonce") def _check_params(self, nonce, data, associated_data): utils._check_byteslike("nonce", nonce) utils._check_bytes("data", data) utils._check_bytes("associated_data", associated_data) if not 7 <= len(nonce) <= 13: raise ValueError("Nonce must be between 7 and 13 bytes") class AESGCM(object): _MAX_SIZE = 2 ** 32 def __init__(self, key): utils._check_byteslike("key", key) if len(key) not in (16, 24, 32): raise ValueError("AESGCM key must be 128, 192, or 256 bits.") self._key = key @classmethod def generate_key(cls, bit_length): if not isinstance(bit_length, int): raise TypeError("bit_length must be an integer") if bit_length not in (128, 192, 256): raise ValueError("bit_length must be 128, 192, or 256") return os.urandom(bit_length // 8) def encrypt(self, nonce, data, associated_data): if associated_data is None: associated_data = b"" if len(data) > self._MAX_SIZE or len(associated_data) > self._MAX_SIZE: # This is OverflowError to match what cffi would raise raise OverflowError( "Data or associated data too long. Max 2**32 bytes" ) self._check_params(nonce, data, associated_data) return aead._encrypt(backend, self, nonce, data, associated_data, 16) def decrypt(self, nonce, data, associated_data): if associated_data is None: associated_data = b"" self._check_params(nonce, data, associated_data) return aead._decrypt(backend, self, nonce, data, associated_data, 16) def _check_params(self, nonce, data, associated_data): utils._check_byteslike("nonce", nonce) utils._check_bytes("data", data) utils._check_bytes("associated_data", associated_data) if len(nonce) == 0: raise ValueError("Nonce must be at least 1 byte") __pycache__/modes.cpython-36.pyc 0000644 00000015537 15204267710 0012530 0 ustar 00 3 l�_J � @ s� d dl mZmZmZ d dlZd dlZd dlmZ ejej �G dd� de ��Zejej �G dd� de ��Zejej �G dd � d e ��Z ejej �G d d� de ��Zejej �G dd � d e ��Zdd� Zdd� Zdd� Zeje�eje�G dd� de ���Zeje�eje �G dd� de ���Zeje�G dd� de ��Zeje�eje�G dd� de ���Zeje�eje�G dd� de ���Zeje�eje�G dd� de ���Zeje�eje�G d d!� d!e ���Zeje�eje�eje�G d"d#� d#e ����ZdS )$� )�absolute_import�division�print_functionN)�utilsc @ s( e Zd Zejdd� �Zejdd� �ZdS )�Modec C s dS )z@ A string naming this mode (e.g. "ECB", "CBC"). N� )�selfr r �/usr/lib64/python3.6/modes.py�name s z Mode.namec C s dS )zq Checks that all the necessary invariants of this (mode, algorithm) combination are met. Nr )r � algorithmr r r �validate_for_algorithm s zMode.validate_for_algorithmN)�__name__� __module__�__qualname__�abc�abstractpropertyr �abstractmethodr r r r r r s r c @ s e Zd Zejdd� �ZdS )�ModeWithInitializationVectorc C s dS )zP The value of the initialization vector for this mode as bytes. Nr )r r r r �initialization_vector s z2ModeWithInitializationVector.initialization_vectorN)r r r r r r r r r r r s r c @ s e Zd Zejdd� �ZdS )� ModeWithTweakc C s dS )z@ The value of the tweak for this mode as bytes. Nr )r r r r �tweak) s zModeWithTweak.tweakN)r r r r r r r r r r r '