⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.9
Server IP:
97.74.87.16
Server:
Linux 16.87.74.97.host.secureserver.net 5.14.0-503.38.1.el9_5.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Apr 18 08:52:10 EDT 2025 x86_64
Server Software:
Apache
PHP Version:
8.2.28
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
var
/
opt
/
nydus
/
ops
/
oscrypto
/
_openssl
/
__pycache__
/
View File Name :
util.cpython-39.pyc
a ���g� � @ s� d dl mZmZmZmZ ddlmZ ddlmZm Z ddl mZmZm Z ddlmZ ddlmZmZmZ g d �Zed k r�ddlmZ ndd � Zde_dd� ZdS )� )�unicode_literals�division�absolute_import�print_function� )�pretty_message)�buffer_from_bytes�bytes_from_buffer� )� libcrypto�libcrypto_version_info�handle_openssl_error)� rand_bytes)� type_name�byte_cls� int_types)�pbkdf2� pkcs12_kdfr )r )r c C s t |t�sttdt|����t |t�s8ttdt|����t |t�sTttdt|����|dk rdtd��t |t�s�ttdt|����|dk r�td��| tg d��vr�ttd t| ����t j t jt jt j t jd�| � }t|�}t �|t|�|t|�||||�}t|� t|�S ) a� PBKDF2 from PKCS#5 :param hash_algorithm: The string name of the hash algorithm to use: "sha1", "sha224", "sha256", "sha384", "sha512" :param password: A byte string of the password to use an input to the KDF :param salt: A cryptographic random byte string :param iterations: The numbers of iterations to use when deriving the key :param key_length: The length of the desired key in bytes :raises: ValueError - when any of the parameters contain an invalid value TypeError - when any of the parameters are of the wrong type :return: The derived key as a byte string zH password must be a byte string, not %s zD salt must be a byte string, not %s zG iterations must be an integer, not %s r z!iterations must be greater than 0zG key_length must be an integer, not %s z!key_length must be greater than 0)�sha1�sha224�sha256�sha384�sha512z� hash_algorithm must be one of "sha1", "sha224", "sha256", "sha384", "sha512", not %s )� isinstancer � TypeErrorr r r � ValueError�set�reprr �EVP_sha1� EVP_sha224� EVP_sha256� EVP_sha384� EVP_sha512r ZPKCS5_PBKDF2_HMAC�lenr r )�hash_algorithm�password�salt� iterations� key_lengthZevp_md� output_buffer�result� r+ �G/opt/nydus/tmp/pip-target-mke_irhy/lib/python/oscrypto/_openssl/util.pyr sd � � � �� ��� r Fc C sZ t |t�sttdt|����t |t�s8ttdt|����t |t�sTttdt|����|dk rnttdt|����t |t�s�ttdt|����|dk r�ttdt|����| tg d��vr�ttd t| ����|tg d ��vr�ttdt|����|� d�� d �d }tjtj tjtjtjtjd�| � }t|�}t�|t|�|t|�|||||� } t| � t|�S )a0 KDF from RFC7292 appendix B.2 - https://tools.ietf.org/html/rfc7292#page-19 :param hash_algorithm: The string name of the hash algorithm to use: "md5", "sha1", "sha224", "sha256", "sha384", "sha512" :param password: A byte string of the password to use an input to the KDF :param salt: A cryptographic random byte string :param iterations: The numbers of iterations to use when deriving the key :param key_length: The length of the desired key in bytes :param id_: The ID of the usage - 1 for key, 2 for iv, 3 for mac :raises: ValueError - when any of the parameters contain an invalid value TypeError - when any of the parameters are of the wrong type :return: The derived key as a byte string z@ password must be a byte string, not %s z< salt must be a byte string, not %s z? iterations must be an integer, not %s r zC iterations must be greater than 0 - is %s z? key_length must be an integer, not %s zC key_length must be greater than 0 - is %s )�md5r r r r r z� hash_algorithm must be one of "md5", "sha1", "sha224", "sha256", "sha384", "sha512", not %s )r r � z< id_ must be one of 1, 2, 3, not %s zutf-8zutf-16bes )r r r r r r r r r �decode�encoder ZEVP_md5r r r r! r"