Files
ServerSync/lib/nacl/pwhash/__pycache__/argon2i.cpython-314.pyc

74 lines
5.0 KiB
Plaintext
Raw Normal View History

2026-02-12 02:28:23 +02:00
+
u<10>i5<00><00><00>^RIt^RIt^RIHt]P
t]PPt ]Pt
]Pt ]Pt ]Pt ]Pt]Pt]P t]PP"t]PP&t]PP*t]PP.t]PP2t]PP6t]PP:t]PP>t ]PPBt"]PPFt$]] ]PJPL3RRllt']]3RRllt(R#)<07>N)<01>_argon2c<00><><00>V^8<>dQhR\R\R\R\R\R\PPR\/#)<08><00>size<7A>password<72>salt<6C>opslimit<69>memlimit<69>encoder<65>return)<05>int<6E>bytes<65>nacl<63>encoding<6E>Encoder)<01>formats"<22>:/tmp/pip-target-zhdecbcm/lib/python/nacl/pwhash/argon2i.py<70> __annotate__r1sX<00><00>9<06>9<06>
<0A>9<06><13>9<06> <10>9<06><12> 9<06>
<12> 9<06> <12>]<5D>]<5D> "<22> "<22> 9<06> <0B>9<06>c
<04>l<00>VP\PPWW#V\44#)a<>
Derive a ``size`` bytes long key from a caller-supplied
``password`` and ``salt`` pair using the argon2i
memory-hard construct.
the enclosing module provides the constants
- :py:const:`.OPSLIMIT_INTERACTIVE`
- :py:const:`.MEMLIMIT_INTERACTIVE`
- :py:const:`.OPSLIMIT_MODERATE`
- :py:const:`.MEMLIMIT_MODERATE`
- :py:const:`.OPSLIMIT_SENSITIVE`
- :py:const:`.MEMLIMIT_SENSITIVE`
as a guidance for correct settings.
:param size: derived key size, must be between
:py:const:`.BYTES_MIN` and
:py:const:`.BYTES_MAX`
:type size: int
:param password: password used to seed the key derivation procedure;
it length must be between
:py:const:`.PASSWD_MIN` and
:py:const:`.PASSWD_MAX`
:type password: bytes
:param salt: **RANDOM** salt used in the key derivation procedure;
its length must be exactly :py:const:`.SALTBYTES`
:type salt: bytes
:param opslimit: the time component (operation count)
of the key derivation procedure's computational cost;
it must be between
:py:const:`.OPSLIMIT_MIN` and
:py:const:`.OPSLIMIT_MAX`
:type opslimit: int
:param memlimit: the memory occupation component
of the key derivation procedure's computational cost;
it must be between
:py:const:`.MEMLIMIT_MIN` and
:py:const:`.MEMLIMIT_MAX`
:type memlimit: int
:rtype: bytes
.. versionadded:: 1.2
)<05>encoder<00>bindings<67>crypto_pwhash_alg<6C>ALG)rrrr r
r s&&&&&&r<00>kdfr1s1<00><00>j <13>><3E>><3E> <0C> <0A> <0A>'<27>'<27> <10>D<EFBFBD>H<EFBFBD>c<EFBFBD>
<EFBFBD> <06>rc<00>H<00>V^8<>dQhR\R\R\R\/#)rrr r
r )rr )rs"rrrms0<00><00><06><06><13><06><11><06><12><06> <0B> rc<04>L<00>\PPWV\4#)a<>
Hashes a password with a random salt, using the memory-hard
argon2i construct and returning an ascii string that has all
the needed info to check against a future password
The default settings for opslimit and memlimit are those deemed
correct for the interactive user login case.
:param bytes password:
:param int opslimit:
:param int memlimit:
:rtype: bytes
.. versionadded:: 1.2
)rr<00>crypto_pwhash_str_algr)rr r
s&&&r<00>strrms"<00><00>* <10>=<3D>=<3D> .<2E> .<2E><10>H<EFBFBD>c<EFBFBD> <06>r))<29> nacl.bindingsr<00> nacl.encoding<6E>r<00> ALG_ARGON2I13rr<00>crypto_pwhash_argon2i_STRPREFIX<49> STRPREFIX<49> SALTBYTES<45>
PASSWD_MIN<EFBFBD>
PASSWD_MAX<EFBFBD> PWHASH_SIZE<5A> BYTES_MIN<49> BYTES_MAX<41>verify<66>"crypto_pwhash_argon2i_MEMLIMIT_MAX<41> MEMLIMIT_MAX<41>"crypto_pwhash_argon2i_MEMLIMIT_MIN<49> MEMLIMIT_MIN<49>"crypto_pwhash_argon2i_OPSLIMIT_MAX<41> OPSLIMIT_MAX<41>"crypto_pwhash_argon2i_OPSLIMIT_MIN<49> OPSLIMIT_MIN<49>*crypto_pwhash_argon2i_OPSLIMIT_INTERACTIVE<56>OPSLIMIT_INTERACTIVE<56>*crypto_pwhash_argon2i_MEMLIMIT_INTERACTIVE<56>MEMLIMIT_INTERACTIVE<56>(crypto_pwhash_argon2i_OPSLIMIT_SENSITIVE<56>OPSLIMIT_SENSITIVE<56>(crypto_pwhash_argon2i_MEMLIMIT_SENSITIVE<56>MEMLIMIT_SENSITIVE<56>'crypto_pwhash_argon2i_OPSLIMIT_MODERATE<54>OPSLIMIT_MODERATE<54>'crypto_pwhash_argon2i_MEMLIMIT_MODERATE<54>MEMLIMIT_MODERATEr<00>
RawEncoderrr<00>rr<00><module>rCs><00><01><15><14><15> <0A><1B><1B><03> <10>M<EFBFBD>M<EFBFBD> 9<> 9<> <09> <13> <1D> <1D> <09> <14> <1F> <1F>
<EFBFBD> <14> <1F> <1F>
<EFBFBD><15>!<21>!<21> <0B> <13> <1D> <1D> <09> <13> <1D> <1D> <09> <10><1E><1E><06><13>}<7D>}<7D>?<3F>?<3F> <0C><13>}<7D>}<7D>?<3F>?<3F> <0C><13>}<7D>}<7D>?<3F>?<3F> <0C><13>}<7D>}<7D>?<3F>?<3F> <0C><1B>}<7D>}<7D>O<>O<><14><1B>}<7D>}<7D>O<>O<><14><19>]<5D>]<5D>K<>K<><12><19>]<5D>]<5D>K<>K<><12><18>M<EFBFBD>M<EFBFBD>I<>I<><11><18>M<EFBFBD>M<EFBFBD>I<>I<><11>'<27>&<26>%)<29>]<5D>]<5D>%=<3D>%=<3D> 9<06>|)<29>(<28><06>r