Файловый менеджер - Редактировать - /opt/imh-python/lib/python3.9/site-packages/Cryptodome/Cipher/__pycache__/_mode_ecb.cpython-39.pyc
Ðазад
a c�h � @ sX d Z dgZddlmZmZmZmZmZmZm Z m Z edd�ZG dd� de�Z dd� Zd S ) z" Electronic Code Book (ECB) mode. �EcbMode� )�load_pycryptodome_raw_lib�VoidPointer�create_string_buffer�get_raw_buffer�SmartPointer�c_size_t�c_uint8_ptr�is_writeable_bufferzCryptodome.Cipher._raw_ecbak int ECB_start_operation(void *cipher, void **pResult); int ECB_encrypt(void *ecbState, const uint8_t *in, uint8_t *out, size_t data_len); int ECB_decrypt(void *ecbState, const uint8_t *in, uint8_t *out, size_t data_len); int ECB_stop_operation(void *state); c @ s, e Zd ZdZdd� Zd dd�Zd dd�ZdS )r a� *Electronic Code Book (ECB)*. This is the simplest encryption mode. Each of the plaintext blocks is directly encrypted into a ciphertext block, independently of any other block. This mode is dangerous because it exposes frequency of symbols in your plaintext. Other modes (e.g. *CBC*) should be used instead. See `NIST SP800-38A`_ , Section 6.1. .. _`NIST SP800-38A` : http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf :undocumented: __init__ c C sN t � | _t�|�� | j�� �}|r.td| ��t| j�� tj�| _|� � dS )z�Create a new block cipher, configured in ECB mode. :Parameters: block_cipher : C pointer A smart pointer to the low-level block cipher instance. z)Error %d while instantiating the ECB modeN) r �_state�raw_ecb_libZECB_start_operation�getZ address_of� ValueErrorr ZECB_stop_operation�release)�selfZblock_cipher�result� r ��/root/rpmbuild/BUILDROOT/imh-python39-modules-3.9.7-92.el8.x86_64/opt/imh-python/lib/python3.9/site-packages/Cryptodome/Cipher/_mode_ecb.py�__init__D s �� �zEcbMode.__init__Nc C s� |du rt t|��}n4|}t|�s*td��t|�t|�krJtdt|� ��t�| j�� t |�t |�t t|���}|r�|dkr�td��td| ��|du r�t|�S dS dS )ab Encrypt data with the key set at initialization. The data to encrypt can be broken up in two or more pieces and `encrypt` can be called multiple times. That is, the statement: >>> c.encrypt(a) + c.encrypt(b) is equivalent to: >>> c.encrypt(a+b) This function does not add any padding to the plaintext. :Parameters: plaintext : bytes/bytearray/memoryview The piece of data to encrypt. The length must be multiple of the cipher block length. :Keywords: output : bytearray/memoryview The location where the ciphertext must be written to. If ``None``, the ciphertext is returned. :Return: If ``output`` is ``None``, the ciphertext is returned as ``bytes``. Otherwise, ``None``. N�4output must be a bytearray or a writeable memoryview�9output must have the same length as the input (%d bytes)� �2Data must be aligned to block boundary in ECB modez%Error %d while encrypting in ECB mode)r �lenr � TypeErrorr r ZECB_encryptr r r r r )r � plaintext�output� ciphertextr r r r �encrypt] s* � �zEcbMode.encryptc C s� |du rt t|��}n4|}t|�s*td��t|�t|�krJtdt|� ��t�| j�� t |�t |�t t|���}|r�|dkr�td��td| ��|du r�t|�S dS dS )ae Decrypt data with the key set at initialization. The data to decrypt can be broken up in two or more pieces and `decrypt` can be called multiple times. That is, the statement: >>> c.decrypt(a) + c.decrypt(b) is equivalent to: >>> c.decrypt(a+b) This function does not remove any padding from the plaintext. :Parameters: ciphertext : bytes/bytearray/memoryview The piece of data to decrypt. The length must be multiple of the cipher block length. :Keywords: output : bytearray/memoryview The location where the plaintext must be written to. If ``None``, the plaintext is returned. :Return: If ``output`` is ``None``, the plaintext is returned as ``bytes``. Otherwise, ``None``. Nr r r r z%Error %d while decrypting in ECB mode)r r r r r r ZECB_decryptr r r r r )r r r r r r r r �decrypt� s* � �zEcbMode.decrypt)N)N)�__name__� __module__�__qualname__�__doc__r r r r r r r r 3 s 7c K s&