Файловый менеджер - Редактировать - /opt/imh-python/lib/python3.9/site-packages/Cryptodome/Cipher/__pycache__/_EKSBlowfish.cpython-39.pyc
Ðазад
a c�ha � @ sd d dl Z d dlmZ d dlmZmZmZmZmZm Z edd�Z dd� Zdd � Zd Z dZed d�ZdS ) � N)�_create_cipher)�load_pycryptodome_raw_lib�VoidPointer�SmartPointer�c_size_t�c_uint8_ptr�c_uintz"Cryptodome.Cipher._raw_eksblowfishaa int EKSBlowfish_start_operation(const uint8_t key[], size_t key_len, const uint8_t salt[16], size_t salt_len, unsigned cost, unsigned invert, void **pResult); int EKSBlowfish_encrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int EKSBlowfish_decrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int EKSBlowfish_stop_operation(void *state); c C s� z"| � d�}| � d�}| � d�}W n4 tyV } ztdt|� ��W Y d}~n d}~0 0 | � dd�}t|�tvr�tdt|� ��tj}tj }t � }|t|�tt|��t|�tt|��t |�t t|��|�� �} | r�td | ��t|�� |�S ) z�This method instantiates and returns a smart pointer to a low-level base cipher. It will absorb named parameters in the process.�key�salt�costzMissing EKSBlowfish parameter: N�invertTz+Incorrect EKSBlowfish key length (%d bytes)z3Error %X while instantiating the EKSBlowfish cipher)�pop�KeyError� TypeError�str�len�key_size� ValueError�_raw_blowfish_libZEKSBlowfish_start_operationZEKSBlowfish_stop_operationr r r r �intZ address_ofr �get) Zdict_parametersr r r �er Zstart_operationZstop_operationZvoid_p�result� r ��/root/rpmbuild/BUILDROOT/imh-python39-modules-3.9.7-92.el8.x86_64/opt/imh-python/lib/python3.9/site-packages/Cryptodome/Cipher/_EKSBlowfish.py�_create_base_cipher= s2 & ��r c C s&