Files
ServerSync/lib/keyring/backends/__pycache__/Windows.cpython-314.pyc

60 lines
8.2 KiB
Plaintext
Raw Normal View History

2026-02-19 00:55:27 +02:00
+
<00>;<3B>i_<00><01>|<00>^RIHt^RIt^RIHt^RIHt^RIHt^RI H
t
^RI H t ]!4;_uu_4t ^RIHtHt]P"RRR4]P&!]4t!R R
4t!R R ]4t!R R]4tR# ]d^RIt^RIt]P"LYi;i +'giLe;i)<0F>)<01> annotationsN)<01> ExceptionTrap)<01>KeyringBackend)<01>
properties)<01>SimpleCredential)<01>PasswordDeleteError)<02>
pywintypes<EFBFBD> win32credc<01>&<00>]tRt^tRRltRtRtR#)<06> PersistenceNc <09>8<00>\VR\P4#)<01>_persist)<03>getattrr
<00>CRED_PERSIST_ENTERPRISE)<03>self<6C>keyring<6E>types&&&<26>?/tmp/pip-target-ugtna5l2/lib/python/keyring/backends/Windows.py<70>__get__<5F>Persistence.__get__s<00><00><16>w<EFBFBD>
<EFBFBD>I<EFBFBD>,M<>,M<>N<>N<>c <0A><><00>\V\4'd8RVPRR4P4,p\ \
V4pW!nR#)z<>
Set the persistence value on the Keyring. Value may be
one of the win32cred.CRED_PERSIST_* constants or a
string representing one of those constants. For example,
'local machine' or 'session'.
<EFBFBD> CRED_PERSIST_<54> <20>_N)<07>
isinstance<EFBFBD>str<74>replace<63>upperrr
r)rr<00>value<75>attrs&&& r<00>__set__<5F>Persistence.__set__"sA<00><00> <16>e<EFBFBD>S<EFBFBD> !<21> !<21>"<22>U<EFBFBD>]<5D>]<5D>3<EFBFBD><03>%<<3C>%B<>%B<>%D<>D<>D<EFBFBD><1B>I<EFBFBD>t<EFBFBD>,<2C>E<EFBFBD> <20>r<00><00>N)<07>__name__<5F>
__module__<EFBFBD> __qualname__<5F>__firstlineno__rr"<00>__static_attributes__r$rrr r s <00><00>O<01>
!rr c<01>&<00>]tRt^/t]R4tRtR#)<04>DecodingCredentialc <0A><><00>VR,pVPR4# \d,TPR4p\PR4Tu#i;i)z=
Attempt to decode the credential blob as UTF-16 then UTF-8.
<EFBFBD>CredentialBlobzutf-16zutf-8zjRetrieved a UTF-8 encoded credential. Please be aware that this library only writes credentials in UTF-16.)<04>decode<64>UnicodeDecodeError<6F>log<6F>warning)r<00>cred<65>decoded_cred_utf8s& rr <00>DecodingCredential.value0s[<00><00>
<14>$<24>%<25><04> %<25><17>;<3B>;<3B>x<EFBFBD>(<28> (<28><>!<21> %<25> $<24> <0B> <0B>G<EFBFBD> 4<> <1D> <0F>K<EFBFBD>K<EFBFBD>B<01> <0E>%<25> $<24>  %<25>s<00><00>3A<03>Ar$N)r&r'r(r)<00>propertyr r*r$rrr,r,/s<00><00> <0A> %<25><0E> %rr,c<01><><00>]tRt^AtRt]!4t]PRRl4t ]
R4t Rt RRlt RtR tR
tR tR tR tRtR#)<10>WinVaultKeyringa6
WinVaultKeyring stores encrypted passwords using the Windows Credential
Manager.
Requires pywin32
This backend does some gymnastics to simulate multi-user support,
which WinVault doesn't support natively. See
https://github.com/jaraco/keyring/issues/47#issuecomment-75763152
for details on the implementation, but here's the gist:
Passwords are stored under the service name unless there is a collision
(another password with the same service name but different user name),
in which case the previous password is moved into a compound name:
{username}@{service}
c<01><00>V^8<>dQhRR/#)<03><00>return<72>floatr$)<01>formats"r<00> __annotate__<5F>WinVaultKeyring.__annotate__Vs<00><00><11><11><15>rc <0A>4<00>\'d \R4h^#)z1
If available, the preferred backend on Windows.
zRequires Windows and pywin32)<02> missing_deps<70> RuntimeError)<01>clss&r<00>priority<74>WinVaultKeyring.priorityUs<00><00>
<18><<3C><1E>=<3D>><3E> ><3E>rc <09><00>V RV 2#)<01>@r$)<02>username<6D>services&&r<00>_compound_name<6D>WinVaultKeyring._compound_name^s<00><00><1A><1A>1<EFBFBD>W<EFBFBD>I<EFBFBD>&<26>&rc <09>P<00>VPW4pT;'d VP#r%)<02>_resolve_credentialr <00>rrIrH<00>ress&&& r<00> get_password<72>WinVaultKeyring.get_passwordbs$<00><00><12>&<26>&<26>w<EFBFBD>9<><03><12> <20> <20>s<EFBFBD>y<EFBFBD>y<EFBFBD> rc<01>$<00>V^8<>dQhRRRRRR/#)r:rIrrHz
str | Noner;zDecodingCredential | Noner$)r=s"rr>r?fs$<00><00><13><13><1A><13>&0<><13> "<22>rc <09><><00>VPV4pV'dV'd/VR,V8wd!VPVPW!44pV#<00><01>UserName)<02>_read_credentialrJrNs&&& rrM<00>#WinVaultKeyring._resolve_credentialfsD<00><00><13>#<23>#<23>G<EFBFBD>,<2C><03><12>h<EFBFBD>3<EFBFBD>z<EFBFBD>?<3F>h<EFBFBD>#><3E><16>'<27>'<27><04>(;<3B>(;<3B>H<EFBFBD>(N<>O<>C<EFBFBD><12>
rc <09><><00>\P!\PVR7p\T4# \Pd/pTP
R8XdTP R8XdRp?R#hRp?ii;i)<04><02>Type<70>
TargetName<EFBFBD><EFBFBD><00>CredReadN)r
r]<00>CRED_TYPE_GENERICr <00>error<6F>winerror<6F>funcnamer,)r<00>targetrO<00>es&& rrV<00> WinVaultKeyring._read_credentialpsd<00><00> <12><1B>$<24>$<24><1E>0<>0<>V<EFBFBD><0E>C<EFBFBD>"<22>#<23>&<26>&<26><> <1A><1F><1F> <12><10>z<EFBFBD>z<EFBFBD>T<EFBFBD>!<21>a<EFBFBD>j<EFBFBD>j<EFBFBD>J<EFBFBD>&><3E><1B> <11><> <12>s<00>&3<00>A6<03>"A1<03>0A1<03>1A6c <09><><00>VPV4pV'd8VR,pVPWQ4pVPVVVP4VPW\ V44R#)rUN)rVrJ<00> _set_passwordr r)rrIrH<00>password<72> existing_pw<70>existing_usernamerbs&&&& r<00> set_password<72>WinVaultKeyring.set_password{sd<00><00><1A>+<2B>+<2B>G<EFBFBD>4<> <0B> <16> +<2B>J<EFBFBD> 7<> <1D><19>(<28>(<28>):<3A>D<>F<EFBFBD> <10> <1E> <1E><16>!<21><1B>!<21>!<21> <0E>
<0A><1A><1A>7<EFBFBD>c<EFBFBD>(<28>m<EFBFBD><rc  <09><><00>\\PVVVRVPR7p\P!V^4R#)zStored using python-keyring)rZr[rUr.<00>Comment<6E>PersistN)<05>dictr
r^<00>persist<73> CredWrite)rrbrHrg<00>
credentials&&&& rrf<00>WinVaultKeyring._set_password<72>s:<00><00><19><1A>,<2C>,<2C><1D><1D>#<23>1<><18>L<EFBFBD>L<EFBFBD> 
<EFBFBD>
<EFBFBD> <12><1B><1B>J<EFBFBD><01>*rc <09><><00>VPW!4pRpW3FApVPV4pV'gKVR,V8XgK.RpVPV4KC V'g \V4hR#)FrUTN)rJrV<00>_delete_passwordr)rrIrH<00>compound<6E>deletedrbrhs&&& r<00>delete_password<72>WinVaultKeyring.delete_password<72>sm<00><00><17>&<26>&<26>x<EFBFBD>9<><08><17><07><1D>'<27>F<EFBFBD><1E>/<2F>/<2F><06>7<>K<EFBFBD><1A>{<7B>{<7B>:<3A>6<>(<28>B<><1E><07><14>%<25>%<25>f<EFBFBD>-<2D> (<28>
<17>%<25>g<EFBFBD>.<2E> .<2E>rc <09><><00>\P!\PVR7R# \Pd/pTP
R8XdTP R8XdRp?R#hRp?ii;i)rYr\<00>
CredDeleteN)r
r{r^r r_r`ra)rrbrcs&& rru<00> WinVaultKeyring._delete_password<72>sP<00><00> <12> <15> <20> <20>i<EFBFBD>&A<>&A<>f<EFBFBD> U<><55><19><1F><1F> <12><10>z<EFBFBD>z<EFBFBD>T<EFBFBD>!<21>a<EFBFBD>j<EFBFBD>j<EFBFBD>L<EFBFBD>&@<40><16> <11><> <12>s<00>&*<00>A-<03>"A(<03>'A(<03>(A-c <09>r<00>VPW4pT;'d\VR,VP4#rT)rMrr rNs&&& r<00>get_credential<61>WinVaultKeyring.get_credential<61>s0<00><00><12>&<26>&<26>w<EFBFBD>9<><03><12>C<>C<>'<27><03>J<EFBFBD><0F><13><19><19>C<>Crr$N)r&r'r(r)<00>__doc__r rpr<00> classpropertyrD<00> staticmethodrJrPrMrVrjrfrxrur~r*r$rrr8r8Ase<00><00><08>"<1A>m<EFBFBD>G<EFBFBD><0F><1D><1D><11><1E><11><12>'<27><12>'<27>!<21><13> '<27> =<3D> +<2B> /<2F><12>Drr8)<19>
__future__r<00>logging<6E>jaraco.contextr<00>backendr<00>compatr<00> credentialsr<00>errorsrrA<00>win32ctypes.pywin32r r
r&<00> ImportError<6F> getLoggerr1r ror,r8r$rr<00><module>r<>s<><00><01>"<22><0E>(<28>$<24><1F>*<2A>(<28><12>_<EFBFBD>_<EFBFBD> <0C> <1B>=<3D> <12><1A><1A> <15><0E><17><17><08>!<21><03>!<21>!<21>"%<25><14>%<25>$gD<01>n<EFBFBD>gD<01><>] <17><1B><19><18> <12><1A><1A> <1B><><15>_<EFBFBD>s(<00>B+<05>B
<04>
B(<07>%B+<05>'B(<07>(B+<05>+ B;