|
Server : LiteSpeed System : Linux server51.dnsbootclub.com 4.18.0-553.62.1.lve.el8.x86_64 #1 SMP Mon Jul 21 17:50:35 UTC 2025 x86_64 User : nandedex ( 1060) PHP Version : 8.1.33 Disable Function : NONE Directory : /opt/cppython/lib/python3.8/site-packages/nacl/pwhash/__pycache__/ |
U
O��g5 � @ s� d dl Zd dlZddlmZ ejZejjZ ej
Z
ejZejZej
Z
ejZejZejZejjZejjZejjZejjZejjZejjZejjZejjZ ejj!Z"ejj#Z$ee ej%j&fe'e(e(e'e'ej%j)e(d�dd�Z*eefe(e'e'e(d�dd �Z+dS )
� N� )�_argon2)�size�password�salt�opslimit�memlimit�encoder�returnc
C s |� tj�| ||||t��S )a�
Derive a ``size`` bytes long key from a caller-supplied
``password`` and ``salt`` pair using the argon2i
memory-hard construct.
the enclosing module provides the constants
- :py:const:`.OPSLIMIT_INTERACTIVE`
- :py:const:`.MEMLIMIT_INTERACTIVE`
- :py:const:`.OPSLIMIT_MODERATE`
- :py:const:`.MEMLIMIT_MODERATE`
- :py:const:`.OPSLIMIT_SENSITIVE`
- :py:const:`.MEMLIMIT_SENSITIVE`
as a guidance for correct settings.
:param size: derived key size, must be between
:py:const:`.BYTES_MIN` and
:py:const:`.BYTES_MAX`
:type size: int
:param password: password used to seed the key derivation procedure;
it length must be between
:py:const:`.PASSWD_MIN` and
:py:const:`.PASSWD_MAX`
:type password: bytes
:param salt: **RANDOM** salt used in the key derivation procedure;
its length must be exactly :py:const:`.SALTBYTES`
:type salt: bytes
:param opslimit: the time component (operation count)
of the key derivation procedure's computational cost;
it must be between
:py:const:`.OPSLIMIT_MIN` and
:py:const:`.OPSLIMIT_MAX`
:type opslimit: int
:param memlimit: the memory occupation component
of the key derivation procedure's computational cost;
it must be between
:py:const:`.MEMLIMIT_MIN` and
:py:const:`.MEMLIMIT_MAX`
:type memlimit: int
:rtype: bytes
.. versionadded:: 1.2
)�encode�nacl�bindingsZcrypto_pwhash_alg�ALG)r r r r r r � r �@/opt/cppython/lib/python3.8/site-packages/nacl/pwhash/argon2i.py�kdf1 s 5 ��r )r r r r
c C s t j�| ||t�S )a�
Hashes a password with a random salt, using the memory-hard
argon2i construct and returning an ascii string that has all
the needed info to check against a future password
The default settings for opslimit and memlimit are those deemed
correct for the interactive user login case.
:param bytes password:
:param int opslimit:
:param int memlimit:
:rtype: bytes
.. versionadded:: 1.2
)r r
Zcrypto_pwhash_str_algr )r r r r r r �strm s �r ),Z
nacl.bindingsr Z
nacl.encoding� r Z
ALG_ARGON2I13r r
Zcrypto_pwhash_argon2i_STRPREFIXZ STRPREFIXZ SALTBYTESZ
PASSWD_MINZ
PASSWD_MAXZPWHASH_SIZEZ BYTES_MINZ BYTES_MAX�verifyZ"crypto_pwhash_argon2i_MEMLIMIT_MAXZMEMLIMIT_MAXZ"crypto_pwhash_argon2i_MEMLIMIT_MINZMEMLIMIT_MINZ"crypto_pwhash_argon2i_OPSLIMIT_MAXZOPSLIMIT_MAXZ"crypto_pwhash_argon2i_OPSLIMIT_MINZOPSLIMIT_MINZ*crypto_pwhash_argon2i_OPSLIMIT_INTERACTIVEZOPSLIMIT_INTERACTIVEZ*crypto_pwhash_argon2i_MEMLIMIT_INTERACTIVEZMEMLIMIT_INTERACTIVEZ(crypto_pwhash_argon2i_OPSLIMIT_SENSITIVEZOPSLIMIT_SENSITIVEZ(crypto_pwhash_argon2i_MEMLIMIT_SENSITIVEZMEMLIMIT_SENSITIVEZ'crypto_pwhash_argon2i_OPSLIMIT_MODERATEZOPSLIMIT_MODERATEZ'crypto_pwhash_argon2i_MEMLIMIT_MODERATEZMEMLIMIT_MODERATE�encodingZ
RawEncoder�int�bytesZEncoderr r r r r r �<module> sR ��>��