003 File Manager
Current Path:
/usr/local/lib/python3.8/site-packages/Cryptodome/Cipher
usr
/
local
/
lib
/
python3.8
/
site-packages
/
Cryptodome
/
Cipher
/
📁
..
📄
AES.py
(9.34 KB)
📄
AES.pyi
(1.35 KB)
📄
ARC2.py
(6.86 KB)
📄
ARC2.pyi
(982 B)
📄
ARC4.py
(5.05 KB)
📄
ARC4.pyi
(431 B)
📄
Blowfish.py
(5.84 KB)
📄
Blowfish.pyi
(1018 B)
📄
CAST.py
(5.94 KB)
📄
CAST.pyi
(983 B)
📄
ChaCha20.py
(10.53 KB)
📄
ChaCha20.pyi
(762 B)
📄
ChaCha20_Poly1305.py
(11.29 KB)
📄
ChaCha20_Poly1305.pyi
(1.04 KB)
📄
DES.py
(5.82 KB)
📄
DES.pyi
(963 B)
📄
DES3.py
(6.78 KB)
📄
DES3.pyi
(1.01 KB)
📄
PKCS1_OAEP.py
(8.67 KB)
📄
PKCS1_OAEP.pyi
(1.16 KB)
📄
PKCS1_v1_5.py
(7.79 KB)
📄
PKCS1_v1_5.pyi
(589 B)
📄
Salsa20.py
(6.22 KB)
📄
Salsa20.pyi
(744 B)
📄
_ARC4.abi3.so
(5.18 KB)
📄
_EKSBlowfish.py
(5.09 KB)
📄
_EKSBlowfish.pyi
(270 B)
📄
_Salsa20.abi3.so
(6.25 KB)
📄
__init__.py
(2.82 KB)
📄
__init__.pyi
(0 B)
📁
__pycache__
📄
_chacha20.abi3.so
(6.79 KB)
📄
_mode_cbc.py
(10.71 KB)
📄
_mode_cbc.pyi
(691 B)
📄
_mode_ccm.py
(23.9 KB)
📄
_mode_ccm.pyi
(1.56 KB)
📄
_mode_cfb.py
(10.57 KB)
📄
_mode_cfb.pyi
(731 B)
📄
_mode_ctr.py
(15.5 KB)
📄
_mode_ctr.pyi
(804 B)
📄
_mode_eax.py
(14.2 KB)
📄
_mode_eax.pyi
(1.51 KB)
📄
_mode_ecb.py
(8.13 KB)
📄
_mode_ecb.pyi
(596 B)
📄
_mode_gcm.py
(20.9 KB)
📄
_mode_gcm.pyi
(1.5 KB)
📄
_mode_ocb.py
(19.37 KB)
📄
_mode_ocb.pyi
(1.2 KB)
📄
_mode_ofb.py
(10.06 KB)
📄
_mode_ofb.pyi
(695 B)
📄
_mode_openpgp.py
(6.9 KB)
📄
_mode_openpgp.pyi
(556 B)
📄
_mode_siv.py
(13.76 KB)
📄
_mode_siv.pyi
(1.23 KB)
📄
_raw_aes.abi3.so
(23.2 KB)
📄
_raw_aesni.abi3.so
(9.57 KB)
📄
_raw_arc2.abi3.so
(7.23 KB)
📄
_raw_blowfish.abi3.so
(10.41 KB)
📄
_raw_cast.abi3.so
(16.12 KB)
📄
_raw_cbc.abi3.so
(6.21 KB)
📄
_raw_cfb.abi3.so
(6.13 KB)
📄
_raw_ctr.abi3.so
(7.91 KB)
📄
_raw_des.abi3.so
(41.73 KB)
📄
_raw_des3.abi3.so
(42 KB)
📄
_raw_ecb.abi3.so
(4.38 KB)
📄
_raw_eksblowfish.abi3.so
(11.59 KB)
📄
_raw_ocb.abi3.so
(8.57 KB)
📄
_raw_ofb.abi3.so
(5.74 KB)
Editing: _mode_openpgp.py
# =================================================================== # # Copyright (c) 2014, Legrandin <helderijs@gmail.com> # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # # 1. Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # 2. Redistributions in binary form must reproduce the above copyright # notice, this list of conditions and the following disclaimer in # the documentation and/or other materials provided with the # distribution. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS # FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE # COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, # BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; # LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER # CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN # ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # POSSIBILITY OF SUCH DAMAGE. # =================================================================== """ OpenPGP mode. """ __all__ = ['OpenPgpMode'] from Cryptodome.Util.py3compat import _copy_bytes from Cryptodome.Random import get_random_bytes class OpenPgpMode(object): """OpenPGP mode. This mode is a variant of CFB, and it is only used in PGP and OpenPGP_ applications. If in doubt, use another mode. An Initialization Vector (*IV*) is required. Unlike CFB, the *encrypted* IV (not the IV itself) is transmitted to the receiver. The IV is a random data block. For legacy reasons, two of its bytes are duplicated to act as a checksum for the correctness of the key, which is now known to be insecure and is ignored. The encrypted IV is therefore 2 bytes longer than the clean IV. .. _OpenPGP: http://tools.ietf.org/html/rfc4880 :undocumented: __init__ """ def __init__(self, factory, key, iv, cipher_params): #: The block size of the underlying cipher, in bytes. self.block_size = factory.block_size self._done_first_block = False # True after the first encryption # Instantiate a temporary cipher to process the IV IV_cipher = factory.new( key, factory.MODE_CFB, IV=b'\x00' * self.block_size, segment_size=self.block_size * 8, **cipher_params) iv = _copy_bytes(None, None, iv) # The cipher will be used for... if len(iv) == self.block_size: # ... encryption self._encrypted_IV = IV_cipher.encrypt(iv + iv[-2:]) elif len(iv) == self.block_size + 2: # ... decryption self._encrypted_IV = iv # Last two bytes are for a deprecated "quick check" feature that # should not be used. (https://eprint.iacr.org/2005/033) iv = IV_cipher.decrypt(iv)[:-2] else: raise ValueError("Length of IV must be %d or %d bytes" " for MODE_OPENPGP" % (self.block_size, self.block_size + 2)) self.iv = self.IV = iv # Instantiate the cipher for the real PGP data self._cipher = factory.new( key, factory.MODE_CFB, IV=self._encrypted_IV[-self.block_size:], segment_size=self.block_size * 8, **cipher_params) def encrypt(self, plaintext): """Encrypt data with the key and the parameters set at initialization. A cipher object is stateful: once you have encrypted a message you cannot encrypt (or decrypt) another message using the same object. The data to encrypt can be broken up in two or more pieces and `encrypt` can be called multiple times. That is, the statement: >>> c.encrypt(a) + c.encrypt(b) is equivalent to: >>> c.encrypt(a+b) This function does not add any padding to the plaintext. :Parameters: plaintext : bytes/bytearray/memoryview The piece of data to encrypt. :Return: the encrypted data, as a byte string. It is as long as *plaintext* with one exception: when encrypting the first message chunk, the encypted IV is prepended to the returned ciphertext. """ res = self._cipher.encrypt(plaintext) if not self._done_first_block: res = self._encrypted_IV + res self._done_first_block = True return res def decrypt(self, ciphertext): """Decrypt data with the key and the parameters set at initialization. A cipher object is stateful: once you have decrypted a message you cannot decrypt (or encrypt) another message with the same object. The data to decrypt can be broken up in two or more pieces and `decrypt` can be called multiple times. That is, the statement: >>> c.decrypt(a) + c.decrypt(b) is equivalent to: >>> c.decrypt(a+b) This function does not remove any padding from the plaintext. :Parameters: ciphertext : bytes/bytearray/memoryview The piece of data to decrypt. :Return: the decrypted data (byte string). """ return self._cipher.decrypt(ciphertext) def _create_openpgp_cipher(factory, **kwargs): """Create a new block cipher, configured in OpenPGP mode. :Parameters: factory : module The module. :Keywords: key : bytes/bytearray/memoryview The secret key to use in the symmetric cipher. IV : bytes/bytearray/memoryview The initialization vector to use for encryption or decryption. For encryption, the IV must be as long as the cipher block size. For decryption, it must be 2 bytes longer (it is actually the *encrypted* IV which was prefixed to the ciphertext). """ iv = kwargs.pop("IV", None) IV = kwargs.pop("iv", None) if (None, None) == (iv, IV): iv = get_random_bytes(factory.block_size) if iv is not None: if IV is not None: raise TypeError("You must either use 'iv' or 'IV', not both") else: iv = IV try: key = kwargs.pop("key") except KeyError as e: raise TypeError("Missing component: " + str(e)) return OpenPgpMode(factory, key, iv, kwargs)
Upload File
Create Folder