Files
ServerSync/lib/nacl/__pycache__/signing.cpython-314.pyc

114 lines
13 KiB
Plaintext
Raw Normal View History

2026-02-12 02:28:23 +02:00
+
u<10>i<EFBFBD> <00><00><><00>^RIHt^RIt^RIHt^RIHt^RIHt H
t ^RI H t Ht!RR]4t!R R
]P"] 4t!R R ]P"] 4tR#) <0A>)<01>OptionalN)<01>encoding)<01>
exceptions)<02>
PrivateKey<EFBFBD> PublicKey)<02> StringFixer<65>randomc<00><>a<00>]tRt^toRt]V3RlRl4t]V3RlRl4t]V3RlRl4t V3Rlt
R t Vt R
#) <0B> SignedMessagezV
A bytes subclass that holds a message that has been signed by a
:class:`SigningKey`.
c<00>0<<01>V^8<>dQhRS[RS[RS[RR/#)<06><00> signature<72>message<67>combined<65>returnr <00><01>bytes)<02>format<61> __classdict__s"<22><>3/tmp/pip-target-zhdecbcm/lib/python/nacl/signing.py<70> __annotate__<5F>SignedMessage.__annotate__$s-<00><><00><13><13><1D><13>(-<2D><13>9><3E><13> <18><13>c<08>.<00>V!V4pWnW$nV#<00>N)<02>
_signature<EFBFBD>_message)<05>clsrrr<00>objs&&&& r<00> _from_parts<74>SignedMessage._from_parts#s<00><00><12>(<28>m<EFBFBD><03>"<22><0E><1E> <0C><12>
rc<00> <<01>V^8<>dQhRS[/#<00>r rr)rrs"<22>rrr-s<00><><00><1F><1F>5<EFBFBD>rc <0C><00>VP#)z<
The signature contained within the :class:`SignedMessage`.
)r<00><01>selfs&rr<00>SignedMessage.signature,s<00><00>
<14><EFBFBD><EFBFBD>rc<00> <<01>V^8<>dQhRS[/#r#r)rrs"<22>rrr4s<00><><00><1D><1D><15>rc <0C><00>VP#)z:
The message contained within the :class:`SignedMessage`.
)rr%s&rr<00>SignedMessage.message3s<00><00>
<14>}<7D>}<7D>rc<00>2<<01>V^8<>dQh/S[;R&S[;R&#)r rrr)rrs"<22>rrrs<00><><00><00> <16><15> <01><14>O<EFBFBD>r<00>N) <0A>__name__<5F>
__module__<EFBFBD> __qualname__<5F>__firstlineno__<5F>__doc__<5F> classmethodr <00>propertyrr<00>__annotate_func__<5F>__static_attributes__<5F>__classdictcell__<5F>rs@rr r sM<00><><00><00><08><11><13><11><13><0E><1F><0E><1F> <0E><1D><0E><1D>5<01>rr c<00><>a<00>]tRt^;toRt]P 3V3RlRlltV3RlRltV3RlRlt V3RlR lt
V3R
lR lt R ]P 3V3R lRllt V3RlRlt RtVtR #)<12> VerifyKeyz<79>
The public key counterpart to an Ed25519 SigningKey for producing digital
signatures.
:param key: [:class:`bytes`] Serialized Ed25519 public key
:param encoder: A class that is able to decode the `key`
c<00>:<<01>V^8<>dQhRS[RS[P/#)r <00>key<65>encoder<65>rr<00>Encoder)rrs"<22>rr<00>VerifyKey.__annotate__Ds#<00><><00><18><18><18><18>#+<2B>#3<>#3<>rc<08>F<00>VPV4p\V\4'g\P!R4h\ V4\ PP8wd6\P!R\ PP,4hWn
R#)z'VerifyKey must be created from 32 bytesz%The key must be exactly %s bytes longN) <0B>decode<64>
isinstancer<00>exc<78> TypeError<6F>len<65>nacl<63>bindings<67>crypto_sign_PUBLICKEYBYTES<45>
ValueError<EFBFBD>_key)r&r;r<s&&&r<00>__init__<5F>VerifyKey.__init__Dsr<00><00><16>n<EFBFBD>n<EFBFBD>S<EFBFBD>!<21><03><19>#<23>u<EFBFBD>%<25>%<25><15>-<2D>-<2D> I<>J<> J<> <0E>s<EFBFBD>8<EFBFBD>t<EFBFBD>}<7D>}<7D>?<3F>?<3F> ?<3F><15>.<2E>.<2E>7<><16>-<2D>-<2D>:<3A>:<3A>;<3B><0E> <0E>
<18> rc<00> <<01>V^8<>dQhRS[/#r#r)rrs"<22>rrr?Ts<00><><00><19><19>5<EFBFBD>rc<08><00>VP#r<00>rJr%s&r<00> __bytes__<5F>VerifyKey.__bytes__Ts <00><00><13>y<EFBFBD>y<EFBFBD>rc<00> <<01>V^8<>dQhRS[/#r#<00><01>int)rrs"<22>rrr?W<00><00><><00>!<21>!<21>#<23>!rc<08>*<00>\\V44#r<00><02>hashrr%s&r<00>__hash__<5F>VerifyKey.__hash__W<00><00><00><13>E<EFBFBD>$<24>K<EFBFBD> <20> rc<00>&<<01>V^8<>dQhRS[RS[/#<00>r <00>otherr<00><02>object<63>bool)rrs"<22>rrr?Z<00><00><><00>F<01>F<01>F<EFBFBD>F<01>t<EFBFBD>Frc<08><><00>\WP4'gR#\PP \ V4\ V44#<00>F<>rB<00> __class__rFrG<00> sodium_memcmpr<00>r&r^s&&r<00>__eq__<5F>VerifyKey.__eq__Z<00>3<00><00><19>%<25><1E><1E>0<>0<><18><13>}<7D>}<7D>*<2A>*<2A>5<EFBFBD><14>;<3B><05>e<EFBFBD> <0C>E<>Erc<00>&<<01>V^8<>dQhRS[RS[/#r]r_)rrs"<22>rrr?_<00><00><><00>#<23>#<23>F<EFBFBD>#<23>t<EFBFBD>#rc<08> <00>W8X*#rr,rhs&&r<00>__ne__<5F>VerifyKey.__ne___<00> <00><00><18>"<22>"rNc<00>V<<01>V^8<>dQhRS[RS[S[,RS[PRS[/#)r <00>smessagerr<r)rrrr>)rrs"<22>rrr?bsC<00><><00>'C<01>'C<01><17>'C<01><1C>E<EFBFBD>?<3F>'C<01><1A>!<21>!<21> 'C<01>
<0F> 'Crc <0C><><00>Ve<>\V\4'g6\P!R\P
P ,4h\V4\P
P 8wd6\P!R\P
P ,4hW#PV4,pMVPV4p\P
PWP4#)a<>
Verifies the signature of a signed message, returning the message
if it has not been tampered with else raising
:class:`~nacl.exceptions.BadSignatureError`.
:param smessage: [:class:`bytes`] Either the original messaged or a
signature and message concated together.
:param signature: [:class:`bytes`] If an unsigned message is given for
smessage then the detached signature must be provided.
:param encoder: A class that is able to decode the secret message and
signature.
:rtype: :class:`bytes`
z4Verification signature must be created from %d bytesz+The signature must be exactly %d bytes long) rBrrCrDrFrG<00>crypto_sign_BYTESrErIrA<00>crypto_sign_openrJ)r&rsrr<s&&&&r<00>verify<66>VerifyKey.verifybs<><00><00>& <15> <20><1E>i<EFBFBD><15>/<2F>/<2F><19>m<EFBFBD>m<EFBFBD>J<><1A>m<EFBFBD>m<EFBFBD>5<>5<>6<><12><12>
<13>9<EFBFBD>~<7E><14><1D><1D>!@<40>!@<40>@<40><19>n<EFBFBD>n<EFBFBD>A<><1A>m<EFBFBD>m<EFBFBD>5<>5<>6<><12><12>
!<21>><3E>><3E>(<28>#;<3B>;<3B>H<EFBFBD><1F>~<7E>~<7E>h<EFBFBD>/<2F>H<EFBFBD><13>}<7D>}<7D>-<2D>-<2D>h<EFBFBD> <09> <09>B<>Brc<00> <<01>V^8<>dQhRS[/#r#)<01>_Curve25519_PublicKey)rrs"<22>rrr?<00>s<00><><00>-<2D>-<2D>*?<3F>-rc <0C>j<00>\PPVP4p\ V4#)z{
Converts a :class:`~nacl.signing.VerifyKey` to a
:class:`~nacl.public.PublicKey`
:rtype: :class:`~nacl.public.PublicKey`
)rFrG<00>$crypto_sign_ed25519_pk_to_curve25519rJrz)r&<00>raw_pks& r<00>to_curve25519_public_key<65>"VerifyKey.to_curve25519_public_key<65>s'<00><00><16><1D><1D>C<>C<>D<EFBFBD>I<EFBFBD>I<EFBFBD>N<><06>$<24>V<EFBFBD>,<2C>,rrO)r-r.r/r0r1r<00>
RawEncoderrKrPrYrirorwr~r5r6r7s@rr9r9;sn<00><><00><00><08>7?<3F>6I<36>6I<36><18><18> <19><19>!<21>!<21>F<01>F<01>
#<23>#<23> &*<2A>$,<2C>$7<>$7<> 'C<01>'C<01>R-<2D>-rr9c<00><>a<00>]tRt^<5E>toRt]P 3V3RlRlltV3RlRltV3RlRlt V3RlR lt
V3R
lR lt ] V3R lR l4t ]P 3V3RlRlltV3RlRltRtVtR#)<14>
SigningKeya<EFBFBD>
Private key for producing digital signatures using the Ed25519 algorithm.
Signing keys are produced from a 32-byte (256-bit) random seed value. This
value can be passed into the :class:`~nacl.signing.SigningKey` as a
:func:`bytes` whose length is 32.
.. warning:: This **must** be protected and remain secret. Anyone who knows
the value of your :class:`~nacl.signing.SigningKey` or it's seed can
masquerade as you.
:param seed: [:class:`bytes`] Random 32-byte value (i.e. private key)
:param encoder: A class that is able to decode the seed
:ivar: verify_key: [:class:`~nacl.signing.VerifyKey`] The verify
(i.e. public) key that corresponds with this signing key.
c<00>:<<01>V^8<>dQhRS[RS[P/#)r <00>seedr<r=)rrs"<22>rr<00>SigningKey.__annotate__<5F>s%<00><><00>0<>0<><13>0<><1A>!<21>!<21>0rc<08><><00>VPV4p\V\4'g\P!R4h\ V4\ PP8wd6\P!R\ PP,4h\ PPV4wr4Wn W@n \V4VnR#)z.SigningKey must be created from a 32 byte seedz&The seed must be exactly %d bytes longN)rArBrrCrDrErFrG<00>crypto_sign_SEEDBYTESrI<00>crypto_sign_seed_keypair<69>_seed<65> _signing_keyr9<00>
verify_key)r&r<>r<<00>
public_key<EFBFBD>
secret_keys&&& rrK<00>SigningKey.__init__<5F>s<><00><00> <17>~<7E>~<7E>d<EFBFBD>#<23><04><19>$<24><05>&<26>&<26><15>-<2D>-<2D>@<40><0E> <0E>
<0F>t<EFBFBD>9<EFBFBD><04> <0A> <0A>;<3B>;<3B> ;<3B><15>.<2E>.<2E>8<><16>-<2D>-<2D>5<>5<>6<><0E> <0E>
"&<26><1D><1D>!G<>!G<><04>!M<><1E>
<EFBFBD><19>
<EFBFBD>&<26><19>#<23>J<EFBFBD>/<2F><04>rc<00> <<01>V^8<>dQhRS[/#r#r)rrs"<22>rrr<><00>s<00><><00><1A><1A>5<EFBFBD>rc<08><00>VP#r)r<>r%s&rrP<00>SigningKey.__bytes__<5F>s <00><00><13>z<EFBFBD>z<EFBFBD>rc<00> <<01>V^8<>dQhRS[/#r#rS)rrs"<22>rrr<><00>rUrc<08>*<00>\\V44#rrWr%s&rrY<00>SigningKey.__hash__<5F>r[rc<00>&<<01>V^8<>dQhRS[RS[/#r]r_)rrs"<22>rrr<><00>rbrc<08><><00>\WP4'gR#\PP \ V4\ V44#rdrerhs&&rri<00>SigningKey.__eq__<5F>rkrc<00>&<<01>V^8<>dQhRS[RS[/#r]r_)rrs"<22>rrr<><00>rmrc<08> <00>W8X*#rr,rhs&&rro<00>SigningKey.__ne__<5F>rqrc<00><<01>V^8<>dQhRR/#)r rr<>r,)rrs"<22>rrr<><00>s<00><><00> 
<EFBFBD> 
<EFBFBD><1C> 
rc <0C>t<00>V!\\PP4\P
R7#)zi
Generates a random :class:`~nacl.signing.SigningKey` object.
:rtype: :class:`~nacl.signing.SigningKey`
)r<)r rFrGr<>rr<>)rs&r<00>generate<74>SigningKey.generate<74>s,<00><00><13> <12>4<EFBFBD>=<3D>=<3D>6<>6<> 7<><1C>'<27>'<27>
<EFBFBD>
rc<00>@<<01>V^8<>dQhRS[RS[PRS[/#)r rr<r)rrr>r )rrs"<22>rrr<><00>s4<00><><00>E<01>E<01><16>E<01><1A>!<21>!<21>E<01>
<17> Erc <0C>$<00>\PPWP4p\PPpVP VRV4pVP W4R4pVP V4p\ PWQV4#)z<>
Sign a message using this key.
:param message: [:class:`bytes`] The data to be signed.
:param encoder: A class that is used to encode the signed message.
:rtype: :class:`~nacl.signing.SignedMessage`
N)rFrG<00> crypto_signr<6E>ru<00>encoder r )r&rr<<00>
raw_signedrur<00>signeds&&& r<00>sign<67>SigningKey.sign<67>sz<00><00><1A>]<5D>]<5D>.<2E>.<2E>w<EFBFBD>8I<38>8I<38>J<>
<EFBFBD> <20>M<EFBFBD>M<EFBFBD>;<3B>;<3B><19><1B>N<EFBFBD>N<EFBFBD>:<3A>.@<40>/@<40>#A<>B<> <09><19>.<2E>.<2E><1A>,><3E>!?<3F>@<40><07><18><1E><1E>
<EFBFBD>+<2B><06><1C>(<28>(<28><19>V<EFBFBD>D<>Drc<00> <<01>V^8<>dQhRS[/#r#)<01>_Curve25519_PrivateKey)rrs"<22>rrr<><00>s<00><><00> 3<> 3<>+A<> 3rc <0C>n<00>VPp\PPV4p\ V4#)z~
Converts a :class:`~nacl.signing.SigningKey` to a
:class:`~nacl.public.PrivateKey`
:rtype: :class:`~nacl.public.PrivateKey`
)r<>rFrG<00>$crypto_sign_ed25519_sk_to_curve25519r<39>)r&<00>sk<73> raw_privates& r<00>to_curve25519_private_key<65>$SigningKey.to_curve25519_private_key<65>s.<00><00><12> <1E> <1E><02><1A>m<EFBFBD>m<EFBFBD>H<>H<><12>L<> <0B>%<25>k<EFBFBD>2<>2r)r<>r<>r<>N)r-r.r/r0r1rr<>rKrPrYriror2r<>r<>r<>r5r6r7s@rr<>r<><00>s~<00><><00><00><08>*%-<2D>$7<>$7<>0<>0<>2<1A><1A>!<21>!<21>F<01>F<01>
#<23>#<23><11> 
<EFBFBD><11> 
<EFBFBD>%-<2D>$7<>$7<>E<01>E<01>* 3<> 3rr<>)<14>typingr<00> nacl.bindingsrFrrrC<00> nacl.publicrr<>rrz<00>
nacl.utilsrr rr <00> Encodabler9r<>r,rr<00><module>r<>sW<00><01><1C><14><19>"<22><02>+<2B><1D>E<EFBFBD><1D>BX-<2D><08>"<22>"<22>K<EFBFBD>X-<2D>vd3<><18>#<23>#<23>[<5B>d3r