Files
ServerSync/lib/nacl/bindings/__pycache__/crypto_kx.cpython-314.pyc

85 lines
7.8 KiB
Plaintext
Raw Normal View History

2026-02-12 02:28:23 +02:00
+
u<10>iE<00><00>(a<00>R t0t^RIHt^RIHt^RIHtHt^RI H
t
.ROt ]P!4t ]^k]P!4t]^k]P !4t]^k]P$!4t]^kRRltRRltR R
ltR R ltR#)<10>)<01>Tuple)<01>
exceptions)<02>ffi<66>lib)<01>ensurec<00>F<00>V^8<>dQhR\\\3,/#)<02><00>return)r<00>bytes)<01>formats"<22>>/tmp/pip-target-zhdecbcm/lib/python/nacl/bindings/crypto_kx.py<70> __annotate__r's<00><00><06><06>5<EFBFBD><15><05><1C>.<2E><06>c<04>`<00>\P!R\4p\P!R\4p\P
!W4p\ V^8HR\PR7\P!V\4R,\P!V\4R,3#)z<>
Generate a key pair.
This is a duplicate crypto_box_keypair, but
is included for api consistency.
:return: (public_key, secret_key)
:rtype: (bytes, bytes)
<EFBFBD>unsigned char[]<5D>Key generation failed.<2E><01>raising<6E>NNN)
r<00>new<65>crypto_kx_PUBLIC_KEY_BYTES<45>crypto_kx_SECRET_KEY_BYTESr<00>crypto_kx_keypairr<00>exc<78> CryptoError<6F>buffer)<03>
public_key<EFBFBD>
secret_key<EFBFBD>ress r rr's<><00><00><15><17><17>*<2A>,F<>G<>J<EFBFBD><14><17><17>*<2A>,F<>G<>J<EFBFBD>
<0A>
<1F>
<1F>
<EFBFBD>
7<EFBFBD>C<EFBFBD>
<EFBFBD>3<EFBFBD>!<21>8<EFBFBD>-<2D>s<EFBFBD><EFBFBD><EFBFBD>G<> <0C>
<EFBFBD>
<EFBFBD>:<3A>9<>:<3A>1<EFBFBD>=<3D> <0B>
<EFBFBD>
<EFBFBD>:<3A>9<>:<3A>1<EFBFBD>=<3D> <06>rc<00>R<00>V^8<>dQhR\R\\\3,/#)r <00>seedr
<00>r r)r s"r rr:s#<00><00><06><06><15><06>5<EFBFBD><15><05><1C>+><3E>rc<04><00>\P!R\4p\P!R\4p\ \ V\ 4;'d\V4\8HRP\4\PR7\P!WV4p\ V^8HR\PR7\P!V\4R,\P!V\4R,3#)aD
Generate a key pair with a given seed.
This is functionally the same as crypto_box_seed_keypair, however
it uses the blake2b hash primitive instead of sha512.
It is included mainly for api consistency when using crypto_kx.
:param seed: random seed
:type seed: bytes
:return: (public_key, secret_key)
:rtype: (bytes, bytes)
rz*Seed must be a {} byte long bytes sequencerrr)rrrrr<00>
isinstancer <00>len<65>crypto_kx_SEED_BYTESr r<00> TypeErrorr<00>crypto_kx_seed_keypairrr)r!rrrs& r r(r(:s<><00><00><15><17><17>*<2A>,F<>G<>J<EFBFBD><14><17><17>*<2A>,F<>G<>J<EFBFBD>
<EFBFBD><12>4<EFBFBD><15><1F>E<>E<>C<EFBFBD><04>I<EFBFBD>1E<31>$E<>4<>;<3B>;<3B> <20>
<EFBFBD><14> <0A> <0A> <06> <0E>
$<24>
$<24>Z<EFBFBD>T<EFBFBD>
B<EFBFBD>C<EFBFBD>
<EFBFBD>3<EFBFBD>!<21>8<EFBFBD>-<2D>s<EFBFBD><EFBFBD><EFBFBD>G<> <0C>
<EFBFBD>
<EFBFBD>:<3A>9<>:<3A>1<EFBFBD>=<3D> <0B>
<EFBFBD>
<EFBFBD>:<3A>9<>:<3A>1<EFBFBD>=<3D> <06>rc
<00>j<00>V^8<>dQhR\R\R\R\\\3,/#)r <00>client_public_key<65>client_secret_key<65>server_public_keyr
r")r s"r rrW<00>9<00><00>7<06>7<06><1C>7<06><1C>7<06><1D>7<06> <0B>5<EFBFBD>%<25><<3C><18> 7rc<04>n<00>\\V\4;'d\V4\8HRP \4\ PR7\\V\4;'d\V4\8HRP \4\ PR7\\V\4;'d\V4\8HRP \4\ PR7\P!R\4p\P!R\4p\P!W4WV4p\V^8HR\ PR7\P!V\4R,\P!V\4R,3#)a
Generate session keys for the client.
:param client_public_key:
:type client_public_key: bytes
:param client_secret_key:
:type client_secret_key: bytes
:param server_public_key:
:type server_public_key: bytes
:return: (rx_key, tx_key)
:rtype: (bytes, bytes)
<EFBFBD>8Client public key must be a {} bytes long bytes sequencerz8Client secret key must be a {} bytes long bytes sequence<63>8Server public key must be a {} bytes long bytes sequencerz%Client session key generation failed.r)rr$r r%rr rr'rrr<00>crypto_kx_SESSION_KEY_BYTESr<00>crypto_kx_client_session_keysrr)r*r+r,<00>rx_key<65>tx_keyrs&&& r r2r2W<00>n<00><00>  <0B><12>$<24>e<EFBFBD>,<2C> A<01> A<01> <0F>!<21> "<22>&@<40> @<40>B<>I<>I<> &<26>
<EFBFBD><14> <0A> <0A> <06> <0B><12>$<24>e<EFBFBD>,<2C> A<01> A<01> <0F>!<21> "<22>&@<40> @<40>B<>I<>I<> &<26>
<EFBFBD><14> <0A> <0A> <06> <0B><12>$<24>e<EFBFBD>,<2C> A<01> A<01> <0F>!<21> "<22>&@<40> @<40>B<>I<>I<> &<26>
<EFBFBD><14> <0A> <0A> <06><11>W<EFBFBD>W<EFBFBD>&<26>(C<> D<>F<EFBFBD> <10>W<EFBFBD>W<EFBFBD>&<26>(C<> D<>F<EFBFBD>
<0A>
+<2B>
+<2B><0E>)<29>>O<> <06>C<EFBFBD> <0B> <0B>q<EFBFBD><08>/<2F><13><0F><0F><06> <0C>
<EFBFBD>
<EFBFBD>6<EFBFBD>6<>7<><01>:<3A> <0B>
<EFBFBD>
<EFBFBD>6<EFBFBD>6<>7<><01>:<3A> <06>rc
<00>j<00>V^8<>dQhR\R\R\R\\\3,/#)r r,<00>server_secret_keyr*r
r")r s"r rr<00>r-rc<04>n<00>\\V\4;'d\V4\8HRP \4\ PR7\\V\4;'d\V4\8HRP \4\ PR7\\V\4;'d\V4\8HRP \4\ PR7\P!R\4p\P!R\4p\P!W4WV4p\V^8HR\ PR7\P!V\4R,\P!V\4R,3#)a
Generate session keys for the server.
:param server_public_key:
:type server_public_key: bytes
:param server_secret_key:
:type server_secret_key: bytes
:param client_public_key:
:type client_public_key: bytes
:return: (rx_key, tx_key)
:rtype: (bytes, bytes)
r0rz8Server secret key must be a {} bytes long bytes sequencer/rz%Server session key generation failed.r)rr$r r%rr rr'rrrr1r<00>crypto_kx_server_session_keysrr)r,r7r*r3r4rs&&& r r9r9<00>r5rc<00><><00>V^8<>dQh/^\9d
\;R&^\9d
\;R&^\9d
\;R&^\9d
\;R&#)r rrr&r1)<02>__conditional_annotations__<5F>int)r s"r rrsS<00><00><18><18>&A<01>@<40>C<EFBFBD>@<40>'<19>(A<01>@<40>C<EFBFBD>@<40>)<19>*6<>5<>c<EFBFBD>5<>+<19>,C<01>B<>S<EFBFBD>B<>-rN)rr2r9rrr&r1)r;<00>typingr<00>naclrr<00> nacl._sodiumrr<00>nacl.exceptionsr<00>__all__<5F>crypto_kx_publickeybytesr<00>crypto_kx_secretkeybytesr<00>crypto_kx_seedbytesr&<00>crypto_kx_sessionkeybytesr1rr(r2r9r)r;s@r <00><module>rFs<><00><><01><19><18>"<22>!<21>"<22> <02><07><04>#&<26>"><3E>"><3E>"@<40><1A>@<40>"%<25>"><3E>"><3E>"@<40><1A>@<40><1F>3<>3<>5<><14>5<>#&<26>#@<40>#@<40>#B<><1B>B<><06>&<06>:7<06>t7r