Files
ServerSync/lib/paramiko/__pycache__/ecdsakey.cpython-314.pyc

72 lines
15 KiB
Plaintext
Raw Normal View History

2026-02-12 02:28:23 +02:00
+
u<10>i<EFBFBD>-<00><00><><00>Rt^RIHtHt^RIHt^RIHtHt^RI H
t
^RI H t H t ^RIHt^RIHt^RIHt^R IHt^R
IHt!R R 4t!R R4t!RR]4tR#)z
ECDSA keys
)<02>InvalidSignature<72>UnsupportedAlgorithm)<01>default_backend)<02>hashes<65> serialization)<01>ec)<02>decode_dss_signature<72>encode_dss_signature)<01> four_byte)<01>Message)<01>PKey)<01> SSHException)<01> deflate_longc<00>*a<00>]tRt^'toRtRtRtVtR#)<05> _ECDSACurvez<65>
Represents a specific ECDSA Curve (nistp256, nistp384, etc).
Handles the generation of the key format identifier and the selection of
the proper hash function. Also grabs the proper curve from the 'ecdsa'
package.
c<08>6<00>W nVPVnRVP,VnVPR8:d\P
VnM<VPR8:d\PVnM\PVnWn R#)<04> ecdsa-sha2-<2D>i<>N)
<EFBFBD> nist_name<6D>key_size<7A>
key_length<EFBFBD>key_format_identifierr<00>SHA256<35> hash_object<63>SHA384<38>SHA512<31> curve_class)<03>selfrrs&&&<26>8/tmp/pip-target-zhdecbcm/lib/python/paramiko/ecdsakey.py<70>__init__<5F>_ECDSACurve.__init__0sk<00><00>"<22><0E>%<25>.<2E>.<2E><04><0F>&3<>T<EFBFBD>^<5E>^<5E>%C<><04>"<22> <10>?<3F>?<3F>c<EFBFBD> !<21>%<25>}<7D>}<7D>D<EFBFBD> <1C> <11>_<EFBFBD>_<EFBFBD><03> #<23>%<25>}<7D>}<7D>D<EFBFBD> <1C>%<25>}<7D>}<7D>D<EFBFBD> <1C>&<26><18>)rrrrrN)<08>__name__<5F>
__module__<EFBFBD> __qualname__<5F>__firstlineno__<5F>__doc__r<00>__static_attributes__<5F>__classdictcell__<5F><01> __classdict__s@rrr's<00><><00><00><08>'<27>'r!rc<00>Ba<00>]tRt^BtoRtRtRtRtRtRt Rt
Vt R#) <09>_ECDSACurveSetz<74>
A collection to hold the ECDSA curves. Allows querying by oid and by key
format identifier. The two ways in which ECDSAKey needs to be able to look
up curves.
c<08><00>WnR#<00>N<><01> ecdsa_curves)rr0s&&rr<00>_ECDSACurveSet.__init__Is<00><00>(<28>r!c<08>V<00>VPUu.uFqPNK up#uupir.<00>r0r)r<00>curves& r<00>get_key_format_identifier_list<73>-_ECDSACurveSet.get_key_format_identifier_listLs&<00><00>9=<3D>9J<39>9J<39>K<>9J<39><05>+<2B>+<2B>9J<39>K<>K<><4B>Ks<00>&c<08>V<00>VPFpVPV8XgKVu# R#r.)r0r)rrr4s&& r<00>get_by_curve_class<73>!_ECDSACurveSet.get_by_curve_classOs%<00><00><19>&<26>&<26>E<EFBFBD><14> <20> <20>K<EFBFBD>/<2F><1C> <0C>'r!c<08>V<00>VPFpVPV8XgKVu# R#r.r3)rrr4s&& r<00>get_by_key_format_identifier<65>+_ECDSACurveSet.get_by_key_format_identifierTs&<00><00><19>&<26>&<26>E<EFBFBD><14>*<2A>*<2A>.C<>C<><1C> <0C>'r!c<08>V<00>VPFpVPV8XgKVu# R#r.)r0r)rrr4s&& r<00>get_by_key_length<74> _ECDSACurveSet.get_by_key_lengthYs%<00><00><19>&<26>&<26>E<EFBFBD><14><1F><1F>:<3A>-<2D><1C> <0C>'r!r/N) r"r#r$r%r&rr5r8r;r>r'r(r)s@rr,r,Bs)<00><><00><00><08> )<29>L<01><1D>
<1D>
<1D>r!r,c<00>ra<00>]tRt^_toRt]!]!]PR4]!]PR4]!]PR4.4t RRlt ] R4t] R4tR tR
t]R 4tR tR tRtRRltRtRRltRRlt] ]P!4RR3Rl4tRtRtRtRtRt Rt!Vt"R#)<1C>ECDSAKeyzP
Representation of an ECDSA key which can be used to sign and verify SSH2
data.
<EFBFBD>nistp256<35>nistp384<38>nistp521Nc<08> <00>RVnRVnRVnVeVPWd4R#VeVP W44R#VfVe \ V4pVeRVwVnVnVPP PpVPPV4Vn
R#VP4p Rp
V PV
4'dV R\V
4)p VPPV 4Vn
VPP4p V U u.uFp RP!V 4NK p p VP#WV R7VP4pW<>PP$8wd\'RP!V44hVP)4p\*P,P/VPP14V4pVVnR#uup i \2d \'R4hi;i)Nz-cert-v01@openssh.comz{}-cert-v01@openssh.com)<03>msg<73>key_type<70> cert_typezCan't handle curve of type {}zInvalid public key)<1A> verifying_key<65> signing_key<65> public_blob<6F>_from_private_key<65>_from_private_key_filer r4<00> __class__<5F> _ECDSA_CURVESr8<00> ecdsa_curve<76>get_text<78>endswith<74>lenr;r5<00>format<61>_check_type_and_load_certrr <00>
get_binaryr<00>EllipticCurvePublicKey<65>from_encoded_pointr<00>
ValueError)rrF<00>data<74>filename<6D>password<72>vals<6C>file_obj<62>validate_point<6E>c_classrG<00>suffix<69> key_types<65>x<>
cert_types<EFBFBD> curvename<6D> pointinfo<66>keys&&&&&&&& rr<00>ECDSAKey.__init__ms<><00><00>"<22><04><1A><1F><04><18><1F><04><18> <13> <1F> <10> "<22> "<22>8<EFBFBD> 6<> <12> <13> <1F> <10> '<27> '<27><08> ;<3B> <12> <0F>K<EFBFBD>d<EFBFBD>.<2E><19>$<24>-<2D>C<EFBFBD> <0F> <1B>37<33> 0<>D<EFBFBD> <1C>d<EFBFBD>0<><1A>&<26>&<26>,<2C>,<2C>6<>6<>G<EFBFBD>#<23>1<>1<>D<>D<>W<EFBFBD>M<>D<EFBFBD> <1C><1B>|<7C>|<7C>~<7E>H<EFBFBD>
-<2D>F<EFBFBD><17> <20> <20><16>(<28>(<28>#<23>N<EFBFBD>s<EFBFBD>6<EFBFBD>{<7B>l<EFBFBD>3<><08>#<23>1<>1<>N<>N<><18> <0E>D<EFBFBD> <1C><1D>*<2A>*<2A>I<>I<>K<>I<EFBFBD>=F<><0E>=F<><01>)<29>0<>0<><11>3<>Y<EFBFBD> <17><0E> <11> *<2A> *<2A><17>z<EFBFBD> +<2B> <0E><1C> <0C> <0C><0E>I<EFBFBD><18>,<2C>,<2C>6<>6<>6<>"<22>3<>:<3A>:<3A>9<EFBFBD>E<><12><12><1C><0E><0E>(<28>I<EFBFBD> 9<><18>/<2F>/<2F>B<>B<><18>$<24>$<24>0<>0<>2<>I<EFBFBD><12><03>&)<29><04>"<22><>#<0E><>$<1E> 9<>"<22>#7<>8<>8<> 9<>s<00>"G'<04>&?G,<00>,Hc<08>6<00>VPP4#r.)rOr5<00><01>clss&r<00> identifiers<72>ECDSAKey.identifiers<72>s<00><00><12> <20> <20>?<3F>?<3F>A<>Ar!c<08>"<00>VP4#r.)rlrjs&r<00> supported_key_format_identifiers<72>)ECDSAKey.supported_key_format_identifiers<72>s<00><00><12><EFBFBD><EFBFBD> <20> r!c<08>p<00>VPp\4pVPVPP4VPVPP
4VP 4pVPP^,^,p\VPRR7pRV\V4,
,V,p\VPRR7pRV\V4,
,V,p\V,V,pVPV4VP4#)<04>F)<01>add_sign_padding<6E>)rIr <00>
add_stringrPrr<00>public_numbersr4rrrcrS<00>yr
<00>asbytes)rrg<00>m<>numbers<72>key_size_bytes<65>x_bytes<65>y_bytes<65> point_strs& rrx<00>ECDSAKey.asbytes<65>s<><00><00><12> <20> <20><03> <13>I<EFBFBD><01> <09> <0C> <0C>T<EFBFBD>%<25>%<25>;<3B>;<3B><<3C> <09> <0C> <0C>T<EFBFBD>%<25>%<25>/<2F>/<2F>0<><15>$<24>$<24>&<26><07><1D>)<29>)<29>,<2C>,<2C>q<EFBFBD>0<>Q<EFBFBD>6<><0E><1E>w<EFBFBD>y<EFBFBD>y<EFBFBD>5<EFBFBD>A<><07><19>^<5E>c<EFBFBD>'<27>l<EFBFBD>:<3A>;<3B>g<EFBFBD>E<><07><1E>w<EFBFBD>y<EFBFBD>y<EFBFBD>5<EFBFBD>A<><07><19>^<5E>c<EFBFBD>'<27>l<EFBFBD>:<3A>;<3B>g<EFBFBD>E<><07><1D><07>'<27>'<27>1<> <09> <09> <0C> <0C>Y<EFBFBD><1F><10>y<EFBFBD>y<EFBFBD>{<7B>r!c<08>"<00>VP4#r.)rx<00>rs&r<00>__str__<5F>ECDSAKey.__str__<5F>s<00><00><13>|<7C>|<7C>~<7E>r!c<08><><00>VP4VPP4PVPP4P3#r.)<05>get_namerIrvrcrwr<>s&r<00>_fields<64>ECDSAKey._fields<64>sG<00><00> <11>M<EFBFBD>M<EFBFBD>O<EFBFBD> <10> <1E> <1E> -<2D> -<2D> /<2F> 1<> 1<> <10> <1E> <1E> -<2D> -<2D> /<2F> 1<> 1<>
<EFBFBD>
r!c<08>.<00>VPP#r.)rPrr<>s&rr<><00>ECDSAKey.get_name<6D>s<00><00><13><1F><1F>5<>5<>5r!c<08>.<00>VPP#r.)rPrr<>s&r<00>get_bits<74>ECDSAKey.get_bits<74>s<00><00><13><1F><1F>*<2A>*<2A>*r!c<08><00>VPRJ#r.)rJr<>s&r<00>can_sign<67>ECDSAKey.can_sign<67>s<00><00><13><1F><1F>t<EFBFBD>+<2B>+r!c<08>P<00>\P!VPP44pVPP W4p\ V4wrV\4pVPVPP4VPVPWV44V#r.) r<00>ECDSArPrrJ<00>signrr rur<00>
_sigencode)rrZ<00> algorithm<68>ecdsa<73>sig<69>r<>srys&&& r<00> sign_ssh_data<74>ECDSAKey.sign_ssh_data<74>sz<00><00><12><08><08><14>)<29>)<29>5<>5<>7<>8<><05><12><1E><1E>#<23>#<23>D<EFBFBD>0<><03>#<23>C<EFBFBD>(<28><04><01> <13>I<EFBFBD><01> <09> <0C> <0C>T<EFBFBD>%<25>%<25>;<3B>;<3B><<3C> <09> <0C> <0C>T<EFBFBD>_<EFBFBD>_<EFBFBD>Q<EFBFBD>*<2A>+<2B><10>r!c<08>n<00>VP4VPP8wdR#VP4pVP V4wrE\ WE4pVP PWa\P!VPP444R# \dR#i;i)FT) rQrPrrV<00>
_sigdecoder rI<00>verifyrr<>rr)rrZrFr<><00>sigR<67>sigS<67> signatures&&& r<00>verify_ssh_sig<69>ECDSAKey.verify_ssh_sig<69>s<><00><00> <0E><<3C><<3C>><3E>T<EFBFBD>-<2D>-<2D>C<>C<> C<><18><11>n<EFBFBD>n<EFBFBD><1E><03><19>_<EFBFBD>_<EFBFBD>S<EFBFBD>)<29>
<EFBFBD><04>(<28><14>4<> <09> <18> <10> <1E> <1E> %<25> %<25><19><12><18><18>$<24>*:<3A>*:<3A>*F<>*F<>*H<>!I<> <0E> <18><> <20> <19><18> <19>s<00>AB%<00>% B4<03>3B4c<08>t<00>VPVVP\PPVR7R#<00>)r\N)<05>_write_private_key_filerJr<00> PrivateFormat<61>TraditionalOpenSSL)rr[r\s&&&r<00>write_private_key_file<6C>ECDSAKey.write_private_key_file<6C>s3<00><00> <0C>$<24>$<24> <14> <10> <1C> <1C> <19> '<27> '<27> :<3A> :<3A><1D> %<25>
r!c<08>t<00>VPVVP\PPVR7R#r<>)<05>_write_private_keyrJrr<>r<>)rr^r\s&&&r<00>write_private_key<65>ECDSAKey.write_private_key<65>s3<00><00> <0C><1F><1F> <14> <10> <1C> <1C> <19> '<27> '<27> :<3A> :<3A><1D> <20>
r!c <0C><00>VeJVPPV4pVf\RPV44hVP 4p\
P !V\4R7p\WDP43R7#)z<>
Generate a new private ECDSA key. This factory function can be used to
generate a new host key or authentication key.
:param progress_func: Not used for this type of key.
:returns: A new private key (`.ECDSAKey`) object
zUnsupported key length: {:d})<01>backend)r])
rOr>rYrTrr<00>generate_private_keyrrA<00>
public_key)rkr4<00> progress_func<6E>bits<74> private_keys&&&& r<00>generate<74>ECDSAKey.generatesv<00><00> <10> <1B><17>%<25>%<25>7<>7<><04>=<3D>E<EFBFBD><14>}<7D> <20>!?<3F>!F<>!F<>t<EFBFBD>!L<>M<>M<><19>%<25>%<25>'<27>E<EFBFBD><18>-<2D>-<2D>e<EFBFBD>_<EFBFBD>=N<>O<> <0B><17>k<EFBFBD>+A<>+A<>+C<>D<>E<>Er!c<08>L<00>VPRW4pVPV4R#<00><02>ECN)<02>_read_private_key_file<6C> _decode_key)rr[r\rZs&&& rrM<00>ECDSAKey._from_private_key_files"<00><00><13>*<2A>*<2A>4<EFBFBD><18>D<><04> <0C><18><18><14>r!c<08>L<00>VPRW4pVPV4R#r<>)<02>_read_private_keyr<79>)rr^r\rZs&&& rrL<00>ECDSAKey._from_private_keys"<00><00><13>%<25>%<25>d<EFBFBD>H<EFBFBD>?<3F><04> <0C><18><18><14>r!c<08>X<00>Vwr!W P8Xd$\P!VR\4R7pM<>W P8Xd<>\V4pVP4pVP4pVP4pRV,p VPP!V 4p
V
'g \R4h\"P$!W<>P'4\44pMVP+V4XVnVP/4VnVP2P4p VPP7V 4VnR# \\
\ \3dp\\T44hRp?ii;i \(dp\\T44hRp?ii;i)N)r\r<>rzInvalid key curve identifier)<1D>_PRIVATE_KEY_FORMAT_ORIGINALr<00>load_der_private_keyrrY<00>AssertionError<6F> TypeErrorrr <00>str<74>_PRIVATE_KEY_FORMAT_OPENSSHr rQrV<00> get_mpintrOr;r<00>derive_private_keyr<00> Exception<6F>_got_bad_key_format_idrJr<>rIr4rNr8rP) rrZ<00>pkformatrg<00>erF<00>
curve_name<EFBFBD>verkey<65>sigkey<65>namer4rs && rr<><00>ECDSAKey._decode_key"sd<00><00><1D><0E><08> <13>8<>8<> 8<>
+<2B>#<23>8<>8<><18>4<EFBFBD><1F>1B<31><12><03><16>9<>9<> 9<> +<2B><1D>d<EFBFBD>m<EFBFBD><03> <20>\<5C>\<5C>^<5E>
<EFBFBD><1C><1E><1E>)<29><06><1C><1D><1D><1F><06>$<24>z<EFBFBD>1<><04><1C>*<2A>*<2A>G<>G<><04>M<><05><1C>&<26>'E<>F<>F<><18>+<2B>+<2B><1A>-<2D>-<2D>/<2F><1F>1B<31><12><03> <11> '<27> '<27><08> 1<><1E><04><18> <20>^<5E>^<5E>-<2D><04><1A><19>i<EFBFBD>i<EFBFBD>)<29>)<29> <0B><1F>-<2D>-<2D>@<40>@<40><1B>M<><04><18><>;<1B><1E><19>$<24> <0E> +<2B> #<23>3<EFBFBD>q<EFBFBD>6<EFBFBD>*<2A>*<2A><>  +<2B><>(<1D> +<2B>#<23>3<EFBFBD>q<EFBFBD>6<EFBFBD>*<2A>*<2A><> +<2B>s0<00>!E<00> BF<00>F<03>)E=<03>=F<03> F)<03>F$<03>$F)c<08>z<00>\4pVPV4VPV4VP4#r.)r <00> add_mpintrx)rr<>r<>rFs&&& rr<><00>ECDSAKey._sigencodeIs-<00><00><15>i<EFBFBD><03> <0B> <0A> <0A>a<EFBFBD><18> <0B> <0A> <0A>a<EFBFBD><18><12>{<7B>{<7B>}<7D>r!c<08>^<00>\V4pVP4pVP4pW43#r.)r r<>)rr<>rFr<>r<>s&& rr<><00>ECDSAKey._sigdecodeOs(<00><00><15>c<EFBFBD>l<EFBFBD><03> <0F>M<EFBFBD>M<EFBFBD>O<EFBFBD><01> <0F>M<EFBFBD>M<EFBFBD>O<EFBFBD><01><10>t<EFBFBD> r!)rPrKrJrI)NNNNNNTr.)#r"r#r$r%r&r,rr<00> SECP256R1<52> SECP384R1<52> SECP521R1rOr<00> classmethodrlrorxr<><00>propertyr<79>r<>r<>r<>r<>r<>r<>r<>r<>rMrLr<>r<>r<>r'r(r)s@rrArA_s<><00><><00><00><08>
#<23> <17><02> <0C> <0C>j<EFBFBD> 1<> <17><02> <0C> <0C>j<EFBFBD> 1<> <17><02> <0C> <0C>j<EFBFBD> 1<>
<EFBFBD><06>M<EFBFBD><9<>|<11>B<01><11>B<01><11>!<21><11>!<21><1B>(<1E><0E>
<EFBFBD><0E>
<EFBFBD>6<>+<2B>,<2C><11><18> 
<EFBFBD>
<EFBFBD><11><1E>L<EFBFBD>L<EFBFBD>N<EFBFBD>$<24>T<EFBFBD>F<01><11>F<01>&<1F><1F>%N<01>N<1D> <14>r!rAN)r&<00>cryptography.exceptionsrr<00>cryptography.hazmat.backendsr<00>cryptography.hazmat.primitivesrr<00>)cryptography.hazmat.primitives.asymmetricr<00>/cryptography.hazmat.primitives.asymmetric.utilsrr <00>paramiko.commonr
<00>paramiko.messager <00> paramiko.pkeyr <00>paramiko.ssh_exceptionr <00> paramiko.utilrrr,rA<00>r!r<00><module>r<>sQ<00><01>&<04>K<01>8<>@<40>8<><02>
&<26>$<24><1E>/<2F>&<26>'<27>'<27>6<1D><1D>:t<14>t<EFBFBD>tr!