Server : LiteSpeed
System : Linux server51.dnsbootclub.com 4.18.0-553.62.1.lve.el8.x86_64 #1 SMP Mon Jul 21 17:50:35 UTC 2025 x86_64
User : nandedex ( 1060)
PHP Version : 8.1.33
Disable Function : NONE
Directory :  /opt/cppython/lib/python3.8/site-packages/nacl/pwhash/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]


Current File : //opt/cppython/lib/python3.8/site-packages/nacl/pwhash/__pycache__/argon2i.cpython-38.pyc
U

O��g5�	@s�ddlZddlZddlmZejZejjZ	ej
Z
ejZejZej
Z
ejZejZejZejjZejjZejjZejjZejjZejjZejjZejjZ ejj!Z"ejj#Z$ee ej%j&fe'e(e(e'e'ej%j)e(d�dd�Z*eefe(e'e'e(d�dd	�Z+dS)
�N�)�_argon2)�size�password�salt�opslimit�memlimit�encoder�returnc
Cs|�tj�|||||t��S)a�
    Derive a ``size`` bytes long key from a caller-supplied
    ``password`` and ``salt`` pair using the argon2i
    memory-hard construct.

    the enclosing module provides the constants

        - :py:const:`.OPSLIMIT_INTERACTIVE`
        - :py:const:`.MEMLIMIT_INTERACTIVE`
        - :py:const:`.OPSLIMIT_MODERATE`
        - :py:const:`.MEMLIMIT_MODERATE`
        - :py:const:`.OPSLIMIT_SENSITIVE`
        - :py:const:`.MEMLIMIT_SENSITIVE`

    as a guidance for correct settings.

    :param size: derived key size, must be between
                 :py:const:`.BYTES_MIN` and
                 :py:const:`.BYTES_MAX`
    :type size: int
    :param password: password used to seed the key derivation procedure;
                     it length must be between
                     :py:const:`.PASSWD_MIN` and
                     :py:const:`.PASSWD_MAX`
    :type password: bytes
    :param salt: **RANDOM** salt used in the key derivation procedure;
                 its length must be exactly :py:const:`.SALTBYTES`
    :type salt: bytes
    :param opslimit: the time component (operation count)
                     of the key derivation procedure's computational cost;
                     it must be between
                     :py:const:`.OPSLIMIT_MIN` and
                     :py:const:`.OPSLIMIT_MAX`
    :type opslimit: int
    :param memlimit: the memory occupation component
                     of the key derivation procedure's computational cost;
                     it must be between
                     :py:const:`.MEMLIMIT_MIN` and
                     :py:const:`.MEMLIMIT_MAX`
    :type memlimit: int
    :rtype: bytes

    .. versionadded:: 1.2
    )�encode�nacl�bindingsZcrypto_pwhash_alg�ALG)rrrrrr	�r�@/opt/cppython/lib/python3.8/site-packages/nacl/pwhash/argon2i.py�kdf1s5��r)rrrr
cCstj�|||t�S)a�
    Hashes a password with a random salt, using the memory-hard
    argon2i construct and returning an ascii string that has all
    the needed info to check against a future password


    The default settings for opslimit and memlimit are those deemed
    correct for the interactive user login case.

    :param bytes password:
    :param int opslimit:
    :param int memlimit:
    :rtype: bytes

    .. versionadded:: 1.2
    )rr
Zcrypto_pwhash_str_algr)rrrrrr�strms�r),Z
nacl.bindingsrZ
nacl.encoding�rZ
ALG_ARGON2I13rr
Zcrypto_pwhash_argon2i_STRPREFIXZ	STRPREFIXZ	SALTBYTESZ
PASSWD_MINZ
PASSWD_MAXZPWHASH_SIZEZ	BYTES_MINZ	BYTES_MAX�verifyZ"crypto_pwhash_argon2i_MEMLIMIT_MAXZMEMLIMIT_MAXZ"crypto_pwhash_argon2i_MEMLIMIT_MINZMEMLIMIT_MINZ"crypto_pwhash_argon2i_OPSLIMIT_MAXZOPSLIMIT_MAXZ"crypto_pwhash_argon2i_OPSLIMIT_MINZOPSLIMIT_MINZ*crypto_pwhash_argon2i_OPSLIMIT_INTERACTIVEZOPSLIMIT_INTERACTIVEZ*crypto_pwhash_argon2i_MEMLIMIT_INTERACTIVEZMEMLIMIT_INTERACTIVEZ(crypto_pwhash_argon2i_OPSLIMIT_SENSITIVEZOPSLIMIT_SENSITIVEZ(crypto_pwhash_argon2i_MEMLIMIT_SENSITIVEZMEMLIMIT_SENSITIVEZ'crypto_pwhash_argon2i_OPSLIMIT_MODERATEZOPSLIMIT_MODERATEZ'crypto_pwhash_argon2i_MEMLIMIT_MODERATEZMEMLIMIT_MODERATE�encodingZ
RawEncoder�int�bytesZEncoderrrrrrr�<module>sR��>��

F1le Man4ger