https://t.me/RX1948
Server : Apache
System : Linux iad1-shared-b8-43 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
User : dh_edsupp ( 6597262)
PHP Version : 8.2.26
Disable Function : NONE
Directory :  /lib/python3/dist-packages/nacl/pwhash/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //lib/python3/dist-packages/nacl/pwhash/__pycache__/argon2id.cpython-310.pyc
o

��aQ�@s�ddlZddlZddlmZejZejjZ	ej
Z
ejZejZej
Z
ejZejZejZejjZejjZejjZejjZejjZejjZejjZejjZ ejj!Z"ejj#Z$ee ej%j&fde'de(de(de'de'd	ej%j)d
e(fdd�Z*eefde(de'de'd
e(fd
d�Z+dS)�N�)�_argon2�size�password�salt�opslimit�memlimit�encoder�returnc
Cs|�tj�|||||t��S)a�
    Derive a ``size`` bytes long key from a caller-supplied
    ``password`` and ``salt`` pair using the argon2i
    memory-hard construct.

    the enclosing module provides the constants

        - :py:const:`.OPSLIMIT_INTERACTIVE`
        - :py:const:`.MEMLIMIT_INTERACTIVE`
        - :py:const:`.OPSLIMIT_MODERATE`
        - :py:const:`.MEMLIMIT_MODERATE`
        - :py:const:`.OPSLIMIT_SENSITIVE`
        - :py:const:`.MEMLIMIT_SENSITIVE`

    as a guidance for correct settings.

    :param size: derived key size, must be between
                 :py:const:`.BYTES_MIN` and
                 :py:const:`.BYTES_MAX`
    :type size: int
    :param password: password used to seed the key derivation procedure;
                     it length must be between
                     :py:const:`.PASSWD_MIN` and
                     :py:const:`.PASSWD_MAX`
    :type password: bytes
    :param salt: **RANDOM** salt used in the key derivation procedure;
                 its length must be exactly :py:const:`.SALTBYTES`
    :type salt: bytes
    :param opslimit: the time component (operation count)
                     of the key derivation procedure's computational cost;
                     it must be between
                     :py:const:`.OPSLIMIT_MIN` and
                     :py:const:`.OPSLIMIT_MAX`
    :type opslimit: int
    :param memlimit: the memory occupation component
                     of the key derivation procedure's computational cost;
                     it must be between
                     :py:const:`.MEMLIMIT_MIN` and
                     :py:const:`.MEMLIMIT_MAX`
    :type memlimit: int
    :rtype: bytes

    .. versionadded:: 1.2
    )�encode�nacl�bindings�crypto_pwhash_alg�ALG)rrrrrr	�r�6/usr/lib/python3/dist-packages/nacl/pwhash/argon2id.py�kdf5s
5��rcCstj�|||t�S)a�
    Hashes a password with a random salt, using the memory-hard
    argon2id construct and returning an ascii string that has all
    the needed info to check against a future password

    The default settings for opslimit and memlimit are those deemed
    correct for the interactive user login case.

    :param bytes password:
    :param int opslimit:
    :param int memlimit:
    :rtype: bytes

    .. versionadded:: 1.2
    )rr
�crypto_pwhash_str_algr)rrrrrr�strqs�r),�
nacl.bindingsr�
nacl.encoding�r�ALG_ARGON2ID13rr
� crypto_pwhash_argon2id_STRPREFIX�	STRPREFIX�	SALTBYTES�
PASSWD_MIN�
PASSWD_MAX�PWHASH_SIZE�	BYTES_MIN�	BYTES_MAX�verify�#crypto_pwhash_argon2id_MEMLIMIT_MIN�MEMLIMIT_MIN�#crypto_pwhash_argon2id_MEMLIMIT_MAX�MEMLIMIT_MAX�#crypto_pwhash_argon2id_OPSLIMIT_MIN�OPSLIMIT_MIN�#crypto_pwhash_argon2id_OPSLIMIT_MAX�OPSLIMIT_MAX�+crypto_pwhash_argon2id_OPSLIMIT_INTERACTIVE�OPSLIMIT_INTERACTIVE�+crypto_pwhash_argon2id_MEMLIMIT_INTERACTIVE�MEMLIMIT_INTERACTIVE�)crypto_pwhash_argon2id_OPSLIMIT_SENSITIVE�OPSLIMIT_SENSITIVE�)crypto_pwhash_argon2id_MEMLIMIT_SENSITIVE�MEMLIMIT_SENSITIVE�(crypto_pwhash_argon2id_OPSLIMIT_MODERATE�OPSLIMIT_MODERATE�(crypto_pwhash_argon2id_MEMLIMIT_MODERATE�MEMLIMIT_MODERATE�encoding�
RawEncoder�int�bytes�Encoderrrrrrr�<module>sj���������
�>�����

https://t.me/RX1948 - 2025