GRAYBYTE WORDPRESS FILE MANAGER7285

Server IP : 198.54.121.189 / Your IP : 216.73.216.112
System : Linux premium69.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
PHP Version : 7.4.33
Disable Function : NONE
cURL : ON | WGET : ON | Sudo : OFF | Pkexec : OFF
Directory : /opt/imunify360/venv/lib/python3.11/site-packages/Crypto/Cipher/
Upload Files :
Current_dir [ Not Writeable ] Document_root [ Writeable ]

Command :


Current File : /opt/imunify360/venv/lib/python3.11/site-packages/Crypto/Cipher//_mode_openpgp.py
# ===================================================================
#
# Copyright (c) 2014, Legrandin <helderijs@gmail.com>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
#
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in
#    the documentation and/or other materials provided with the
#    distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
# ===================================================================

"""
OpenPGP mode.
"""

__all__ = ['OpenPgpMode']

from Crypto.Util.py3compat import _copy_bytes
from Crypto.Random import get_random_bytes

class OpenPgpMode(object):
    """OpenPGP mode.

    This mode is a variant of CFB, and it is only used in PGP and
    OpenPGP_ applications. If in doubt, use another mode.

    An Initialization Vector (*IV*) is required.

    Unlike CFB, the *encrypted* IV (not the IV itself) is
    transmitted to the receiver.

    The IV is a random data block. For legacy reasons, two of its bytes are
    duplicated to act as a checksum for the correctness of the key, which is now
    known to be insecure and is ignored. The encrypted IV is therefore 2 bytes
    longer than the clean IV.

    .. _OpenPGP: http://tools.ietf.org/html/rfc4880

    :undocumented: __init__
    """

    def __init__(self, factory, key, iv, cipher_params):

        #: The block size of the underlying cipher, in bytes.
        self.block_size = factory.block_size

        self._done_first_block = False  # True after the first encryption

        # Instantiate a temporary cipher to process the IV
        IV_cipher = factory.new(
                        key,
                        factory.MODE_CFB,
                        IV=b'\x00' * self.block_size,
                        segment_size=self.block_size * 8,
                        **cipher_params)

        iv = _copy_bytes(None, None, iv)

        # The cipher will be used for...
        if len(iv) == self.block_size:
            # ... encryption
            self._encrypted_IV = IV_cipher.encrypt(iv + iv[-2:])
        elif len(iv) == self.block_size + 2:
            # ... decryption
            self._encrypted_IV = iv
            # Last two bytes are for a deprecated "quick check" feature that
            # should not be used. (https://eprint.iacr.org/2005/033)
            iv = IV_cipher.decrypt(iv)[:-2]
        else:
            raise ValueError("Length of IV must be %d or %d bytes"
                             " for MODE_OPENPGP"
                             % (self.block_size, self.block_size + 2))

        self.iv = self.IV = iv

        # Instantiate the cipher for the real PGP data
        self._cipher = factory.new(
                            key,
                            factory.MODE_CFB,
                            IV=self._encrypted_IV[-self.block_size:],
                            segment_size=self.block_size * 8,
                            **cipher_params)

    def encrypt(self, plaintext):
        """Encrypt data with the key and the parameters set at initialization.

        A cipher object is stateful: once you have encrypted a message
        you cannot encrypt (or decrypt) another message using the same
        object.

        The data to encrypt can be broken up in two or
        more pieces and `encrypt` can be called multiple times.

        That is, the statement:

            >>> c.encrypt(a) + c.encrypt(b)

        is equivalent to:

             >>> c.encrypt(a+b)

        This function does not add any padding to the plaintext.

        :Parameters:
          plaintext : bytes/bytearray/memoryview
            The piece of data to encrypt.

        :Return:
            the encrypted data, as a byte string.
            It is as long as *plaintext* with one exception:
            when encrypting the first message chunk,
            the encypted IV is prepended to the returned ciphertext.
        """

        res = self._cipher.encrypt(plaintext)
        if not self._done_first_block:
            res = self._encrypted_IV + res
            self._done_first_block = True
        return res

    def decrypt(self, ciphertext):
        """Decrypt data with the key and the parameters set at initialization.

        A cipher object is stateful: once you have decrypted a message
        you cannot decrypt (or encrypt) another message with the same
        object.

        The data to decrypt can be broken up in two or
        more pieces and `decrypt` can be called multiple times.

        That is, the statement:

            >>> c.decrypt(a) + c.decrypt(b)

        is equivalent to:

             >>> c.decrypt(a+b)

        This function does not remove any padding from the plaintext.

        :Parameters:
          ciphertext : bytes/bytearray/memoryview
            The piece of data to decrypt.

        :Return: the decrypted data (byte string).
        """

        return self._cipher.decrypt(ciphertext)


def _create_openpgp_cipher(factory, **kwargs):
    """Create a new block cipher, configured in OpenPGP mode.

    :Parameters:
      factory : module
        The module.

    :Keywords:
      key : bytes/bytearray/memoryview
        The secret key to use in the symmetric cipher.

      IV : bytes/bytearray/memoryview
        The initialization vector to use for encryption or decryption.

        For encryption, the IV must be as long as the cipher block size.

        For decryption, it must be 2 bytes longer (it is actually the
        *encrypted* IV which was prefixed to the ciphertext).
    """

    iv = kwargs.pop("IV", None)
    IV = kwargs.pop("iv", None)

    if (None, None) == (iv, IV):
        iv = get_random_bytes(factory.block_size)
    if iv is not None:
        if IV is not None:
            raise TypeError("You must either use 'iv' or 'IV', not both")
    else:
        iv = IV

    try:
        key = kwargs.pop("key")
    except KeyError as e:
        raise TypeError("Missing component: " + str(e))

    return OpenPgpMode(factory, key, iv, kwargs)

[ Back ]
Name
Size
Last Modified
Owner / Group
Permissions
Options
..
--
July 02 2025 08:36:55
root / root
0755
__pycache__
--
July 02 2025 08:36:55
root / root
0755
AES.py
8.709 KB
June 09 2025 11:12:39
root / root
0644
AES.pyi
3.629 KB
June 09 2025 11:12:39
root / root
0644
ARC2.py
6.846 KB
June 09 2025 11:12:39
root / root
0644
ARC2.pyi
0.957 KB
June 09 2025 11:12:39
root / root
0644
ARC4.py
4.996 KB
June 09 2025 11:12:39
root / root
0644
ARC4.pyi
0.403 KB
June 09 2025 11:12:39
root / root
0644
Blowfish.py
5.824 KB
June 09 2025 11:12:39
root / root
0644
Blowfish.pyi
0.992 KB
June 09 2025 11:12:39
root / root
0644
CAST.py
5.929 KB
June 09 2025 11:12:39
root / root
0644
CAST.pyi
0.958 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20.py
10.484 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20.pyi
0.77 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20_Poly1305.py
11.29 KB
June 09 2025 11:12:39
root / root
0644
ChaCha20_Poly1305.pyi
1.08 KB
June 09 2025 11:12:39
root / root
0644
DES.py
5.808 KB
June 09 2025 11:12:39
root / root
0644
DES.pyi
0.938 KB
June 09 2025 11:12:39
root / root
0644
DES3.py
6.763 KB
June 09 2025 11:12:39
root / root
0644
DES3.pyi
1.007 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_OAEP.py
8.62 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_OAEP.pyi
1.151 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_v1_5.py
7.95 KB
June 09 2025 11:12:39
root / root
0644
PKCS1_v1_5.pyi
0.67 KB
June 09 2025 11:12:39
root / root
0644
Salsa20.py
6.2 KB
June 09 2025 11:12:39
root / root
0644
Salsa20.pyi
0.733 KB
June 09 2025 11:12:39
root / root
0644
_ARC4.abi3.so
15.57 KB
June 09 2025 11:13:05
root / root
0755
_EKSBlowfish.py
5.083 KB
June 09 2025 11:12:39
root / root
0644
_EKSBlowfish.pyi
0.26 KB
June 09 2025 11:12:39
root / root
0644
_Salsa20.abi3.so
15.711 KB
June 09 2025 11:13:05
root / root
0755
__init__.py
2.777 KB
June 09 2025 11:12:39
root / root
0644
__init__.pyi
0 KB
June 09 2025 11:12:39
root / root
0644
_chacha20.abi3.so
15.688 KB
June 09 2025 11:13:05
root / root
0755
_mode_cbc.py
10.633 KB
June 09 2025 11:12:39
root / root
0644
_mode_cbc.pyi
0.671 KB
June 09 2025 11:12:39
root / root
0644
_mode_ccm.py
23.804 KB
June 09 2025 11:12:39
root / root
0644
_mode_ccm.pyi
1.563 KB
June 09 2025 11:12:39
root / root
0644
_mode_cfb.py
10.47 KB
June 09 2025 11:12:39
root / root
0644
_mode_cfb.pyi
0.71 KB
June 09 2025 11:12:39
root / root
0644
_mode_ctr.py
15.441 KB
June 09 2025 11:12:39
root / root
0644
_mode_ctr.pyi
0.781 KB
June 09 2025 11:12:39
root / root
0644
_mode_eax.py
14.114 KB
June 09 2025 11:12:39
root / root
0644
_mode_eax.pyi
1.509 KB
June 09 2025 11:12:39
root / root
0644
_mode_ecb.py
8.114 KB
June 09 2025 11:12:39
root / root
0644
_mode_ecb.pyi
0.578 KB
June 09 2025 11:12:39
root / root
0644
_mode_gcm.py
20.798 KB
June 09 2025 11:12:39
root / root
0644
_mode_gcm.pyi
1.505 KB
June 09 2025 11:12:39
root / root
0644
_mode_ocb.py
19.468 KB
June 09 2025 11:12:39
root / root
0644
_mode_ocb.pyi
1.202 KB
June 09 2025 11:12:39
root / root
0644
_mode_ofb.py
9.97 KB
June 09 2025 11:12:39
root / root
0644
_mode_ofb.pyi
0.675 KB
June 09 2025 11:12:39
root / root
0644
_mode_openpgp.py
6.888 KB
June 09 2025 11:12:39
root / root
0644
_mode_openpgp.pyi
0.543 KB
June 09 2025 11:12:39
root / root
0644
_mode_siv.py
13.649 KB
June 09 2025 11:12:39
root / root
0644
_mode_siv.pyi
1.231 KB
June 09 2025 11:12:39
root / root
0644
_pkcs1_decode.abi3.so
15.586 KB
June 09 2025 11:13:05
root / root
0755
_raw_aes.abi3.so
31.953 KB
June 09 2025 11:13:05
root / root
0755
_raw_aesni.abi3.so
19.906 KB
June 09 2025 11:13:05
root / root
0755
_raw_arc2.abi3.so
19.695 KB
June 09 2025 11:13:05
root / root
0755
_raw_blowfish.abi3.so
23.68 KB
June 09 2025 11:13:05
root / root
0755
_raw_cast.abi3.so
27.914 KB
June 09 2025 11:13:05
root / root
0755
_raw_cbc.abi3.so
15.563 KB
June 09 2025 11:13:05
root / root
0755
_raw_cfb.abi3.so
15.852 KB
June 09 2025 11:13:05
root / root
0755
_raw_ctr.abi3.so
15.898 KB
June 09 2025 11:13:05
root / root
0755
_raw_des.abi3.so
48.094 KB
June 09 2025 11:13:05
root / root
0755
_raw_des3.abi3.so
48.102 KB
June 09 2025 11:13:05
root / root
0755
_raw_ecb.abi3.so
15.414 KB
June 09 2025 11:13:05
root / root
0755
_raw_eksblowfish.abi3.so
31.695 KB
June 09 2025 11:13:05
root / root
0755
_raw_ocb.abi3.so
19.82 KB
June 09 2025 11:13:05
root / root
0755
_raw_ofb.abi3.so
15.57 KB
June 09 2025 11:13:05
root / root
0755

GRAYBYTE WORDPRESS FILE MANAGER @ 2025
CONTACT ME
Static GIF