PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/Cryptodome/Cipher/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/Cryptodome/Cipher/__init__.py |
# # A block cipher is instantiated as a combination of: # 1. A base cipher (such as AES) # 2. A mode of operation (such as CBC) # # Both items are implemented as C modules. # # The API of #1 is (replace "AES" with the name of the actual cipher): # - AES_start_operaion(key) --> base_cipher_state # - AES_encrypt(base_cipher_state, in, out, length) # - AES_decrypt(base_cipher_state, in, out, length) # - AES_stop_operation(base_cipher_state) # # Where base_cipher_state is AES_State, a struct with BlockBase (set of # pointers to encrypt/decrypt/stop) followed by cipher-specific data. # # The API of #2 is (replace "CBC" with the name of the actual mode): # - CBC_start_operation(base_cipher_state) --> mode_state # - CBC_encrypt(mode_state, in, out, length) # - CBC_decrypt(mode_state, in, out, length) # - CBC_stop_operation(mode_state) # # where mode_state is a a pointer to base_cipher_state plus mode-specific data. import os from Cryptodome.Cipher._mode_ecb import _create_ecb_cipher from Cryptodome.Cipher._mode_cbc import _create_cbc_cipher from Cryptodome.Cipher._mode_cfb import _create_cfb_cipher from Cryptodome.Cipher._mode_ofb import _create_ofb_cipher from Cryptodome.Cipher._mode_ctr import _create_ctr_cipher from Cryptodome.Cipher._mode_openpgp import _create_openpgp_cipher from Cryptodome.Cipher._mode_ccm import _create_ccm_cipher from Cryptodome.Cipher._mode_eax import _create_eax_cipher from Cryptodome.Cipher._mode_siv import _create_siv_cipher from Cryptodome.Cipher._mode_gcm import _create_gcm_cipher from Cryptodome.Cipher._mode_ocb import _create_ocb_cipher _modes = { 1:_create_ecb_cipher, 2:_create_cbc_cipher, 3:_create_cfb_cipher, 5:_create_ofb_cipher, 6:_create_ctr_cipher, 7:_create_openpgp_cipher, 9:_create_eax_cipher } _extra_modes = { 8:_create_ccm_cipher, 10:_create_siv_cipher, 11:_create_gcm_cipher, 12:_create_ocb_cipher } def _create_cipher(factory, key, mode, *args, **kwargs): kwargs["key"] = key modes = dict(_modes) if kwargs.pop("add_aes_modes", False): modes.update(_extra_modes) if not mode in modes: raise ValueError("Mode not supported") if args: if mode in (8, 9, 10, 11, 12): if len(args) > 1: raise TypeError("Too many arguments for this mode") kwargs["nonce"] = args[0] elif mode in (2, 3, 5, 7): if len(args) > 1: raise TypeError("Too many arguments for this mode") kwargs["IV"] = args[0] elif mode == 6: if len(args) > 0: raise TypeError("Too many arguments for this mode") elif mode == 1: raise TypeError("IV is not meaningful for the ECB mode") return modes[mode](factory, **kwargs)