ffLdZddlZddlmZddlmZmZmZmZm Z eddZ dZ dZ d Z d Zd Zd Zd ZdZdZdZeddZdS)a Module's constants for the modes of operation supported with Blowfish: :var MODE_ECB: :ref:`Electronic Code Book (ECB) ` :var MODE_CBC: :ref:`Cipher-Block Chaining (CBC) ` :var MODE_CFB: :ref:`Cipher FeedBack (CFB) ` :var MODE_OFB: :ref:`Output FeedBack (OFB) ` :var MODE_CTR: :ref:`CounTer Mode (CTR) ` :var MODE_OPENPGP: :ref:`OpenPGP Mode ` :var MODE_EAX: :ref:`EAX Mode ` N)_create_cipher)load_pycryptodome_raw_lib VoidPointer SmartPointerc_size_t c_uint8_ptrzCrypto.Cipher._raw_blowfishaT int Blowfish_start_operation(const uint8_t key[], size_t key_len, void **pResult); int Blowfish_encrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int Blowfish_decrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int Blowfish_stop_operation(void *state); c |d}n#t$rtdwxYwt|tvrt dt|zt j}t j}t}|t|tt|| }|rt d|zt||S)zThis method instantiates and returns a smart pointer to a low-level base cipher. It will absorb named parameters in the process.keyzMissing 'key' parameterz(Incorrect Blowfish key length (%d bytes)z0Error %X while instantiating the Blowfish cipher)popKeyError TypeErrorlenkey_size ValueError_raw_blowfish_libBlowfish_start_operationBlowfish_stop_operationrrr address_ofrget)dict_parametersr start_operationstop_operationvoid_presults x/builddir/build/BUILD/imunify360-venv-2.3.5/opt/imunify360/venv/lib64/python3.11/site-packages/Crypto/Cipher/Blowfish.py_create_base_cipherr<s 3!!%(( 33312223 3xxxCc#hhNOOO'@O&>N ]]F _[--%c#hh//#..0022F#K!"## #  n 5 55s2cPttjt||g|Ri|S)aCreate a new Blowfish cipher :param key: The secret key to use in the symmetric cipher. Its length can vary from 5 to 56 bytes. :type key: bytes, bytearray, memoryview :param mode: The chaining mode to use for encryption or decryption. :type mode: One of the supported ``MODE_*`` constants :Keyword Arguments: * **iv** (*bytes*, *bytearray*, *memoryview*) -- (Only applicable for ``MODE_CBC``, ``MODE_CFB``, ``MODE_OFB``, and ``MODE_OPENPGP`` modes). The initialization vector to use for encryption or decryption. For ``MODE_CBC``, ``MODE_CFB``, and ``MODE_OFB`` it must be 8 bytes long. For ``MODE_OPENPGP`` mode only, it must be 8 bytes long for encryption and 10 bytes for decryption (in the latter case, it is actually the *encrypted* IV which was prefixed to the ciphertext). If not provided, a random byte string is generated (you must then read its value with the :attr:`iv` attribute). * **nonce** (*bytes*, *bytearray*, *memoryview*) -- (Only applicable for ``MODE_EAX`` and ``MODE_CTR``). A value that must never be reused for any other encryption done with this key. For ``MODE_EAX`` there are no restrictions on its length (recommended: **16** bytes). For ``MODE_CTR``, its length must be in the range **[0..7]**. If not provided for ``MODE_EAX``, a random byte string is generated (you can read it back via the ``nonce`` attribute). * **segment_size** (*integer*) -- (Only ``MODE_CFB``).The number of **bits** the plaintext and ciphertext are segmented in. It must be a multiple of 8. If not specified, it will be assumed to be 8. * **mac_len** : (*integer*) -- (Only ``MODE_EAX``) Length of the authentication tag, in bytes. It must be no longer than 8 (default). * **initial_value** : (*integer*) -- (Only ``MODE_CTR``). The initial value for the counter within the counter block. By default it is **0**. :Return: a Blowfish object, of the applicable mode. )rsysmodules__name__)r modeargskwargss rnewr$Vs.x #+h/d LT L L LV L LL 9)__doc__r Crypto.CipherrCrypto.Util._raw_apirrrrrrrr$MODE_ECBMODE_CBCMODE_CFBMODE_OFBMODE_CTR MODE_OPENPGPMODE_EAX block_sizerangerr%rr=s,   ((((((//////////////.-%   &6664<M<M<M|       5F  r%