HEX
Server: Apache
System: Linux scp1.abinfocom.com 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
User: confeduphaar (1010)
PHP: 8.1.33
Disabled: exec,passthru,shell_exec,system
Upload Files
File: //proc/self/root/lib/python3/dist-packages/nacl/pwhash/__pycache__/argon2id.cpython-38.pyc
U

�֫[�@s�ddlmZddlmZddlZddlZddlmZejZ	ej
jZej
Z
ejZejZejZejZejZejZej
jZej
jZej
jZej
jZej
jZej
jZej
j Z!ej
j"Z#ej
j$Z%ej
j&Z'e!e#ej(j)fdd�Z*eefdd	�Z+dS)
�)�absolute_import)�divisionN�)�_argon2c
Cs|�tj�|||||t��S)a�
    Derive a ``size`` bytes long key from a caller-supplied
    ``password`` and ``salt`` pair using the argon2i
    memory-hard construct.

    the enclosing module provides the constants

        - :py:const:`.OPSLIMIT_INTERACTIVE`
        - :py:const:`.MEMLIMIT_INTERACTIVE`
        - :py:const:`.OPSLIMIT_MODERATE`
        - :py:const:`.MEMLIMIT_MODERATE`
        - :py:const:`.OPSLIMIT_SENSITIVE`
        - :py:const:`.MEMLIMIT_SENSITIVE`

    as a guidance for correct settings.

    :param size: derived key size, must be between
                 :py:const:`.BYTES_MIN` and
                 :py:const:`.BYTES_MAX`
    :type size: int
    :param password: password used to seed the key derivation procedure;
                     it length must be between
                     :py:const:`.PASSWD_MIN` and
                     :py:const:`.PASSWD_MAX`
    :type password: bytes
    :param salt: **RANDOM** salt used in the key derivation procedure;
                 its length must be exactly :py:const:`.SALTBYTES`
    :type salt: bytes
    :param opslimit: the time component (operation count)
                     of the key derivation procedure's computational cost;
                     it must be between
                     :py:const:`.OPSLIMIT_MIN` and
                     :py:const:`.OPSLIMIT_MAX`
    :type opslimit: int
    :param memlimit: the memory occupation component
                     of the key derivation procedure's computational cost;
                     it must be between
                     :py:const:`.MEMLIMIT_MIN` and
                     :py:const:`.MEMLIMIT_MAX`
    :type memlimit: int
    :rtype: bytes

    .. versionadded:: 1.2
    )�encode�nacl�bindingsZcrypto_pwhash_alg�ALG)�size�passwordZsalt�opslimit�memlimit�encoder�r�6/usr/lib/python3/dist-packages/nacl/pwhash/argon2id.py�kdf9s1��rcCstj�|||t�S)a�
    Hashes a password with a random salt, using the memory-hard
    argon2id construct and returning an ascii string that has all
    the needed info to check against a future password

    The default settings for opslimit and memlimit are those deemed
    correct for the interactive user login case.

    :param bytes password:
    :param int opslimit:
    :param int memlimit:
    :rtype: bytes

    .. versionadded:: 1.2
    )rrZcrypto_pwhash_str_algr	)rrr
rrr�strqs
�r),Z
__future__rrZ
nacl.bindingsrZ
nacl.encoding�rZALG_ARGON2ID13r	rZ crypto_pwhash_argon2id_STRPREFIXZ	STRPREFIXZ	SALTBYTESZ
PASSWD_MINZ
PASSWD_MAXZPWHASH_SIZEZ	BYTES_MINZ	BYTES_MAXZverifyZ#crypto_pwhash_argon2id_MEMLIMIT_MINZMEMLIMIT_MINZ#crypto_pwhash_argon2id_MEMLIMIT_MAXZMEMLIMIT_MAXZ#crypto_pwhash_argon2id_OPSLIMIT_MINZOPSLIMIT_MINZ#crypto_pwhash_argon2id_OPSLIMIT_MAXZOPSLIMIT_MAXZ+crypto_pwhash_argon2id_OPSLIMIT_INTERACTIVEZOPSLIMIT_INTERACTIVEZ+crypto_pwhash_argon2id_MEMLIMIT_INTERACTIVEZMEMLIMIT_INTERACTIVEZ)crypto_pwhash_argon2id_OPSLIMIT_SENSITIVEZOPSLIMIT_SENSITIVEZ)crypto_pwhash_argon2id_MEMLIMIT_SENSITIVEZMEMLIMIT_SENSITIVEZ(crypto_pwhash_argon2id_OPSLIMIT_MODERATEZOPSLIMIT_MODERATEZ(crypto_pwhash_argon2id_MEMLIMIT_MODERATEZMEMLIMIT_MODERATE�encodingZ
RawEncoderrrrrrr�<module>sH�������
9�