File: //usr/local/CyberCP/lib/python3.10/site-packages/nacl/pwhash/__pycache__/argon2id.cpython-310.pyc
o
�hQ � @ s� d dl Zd dlZddlmZ ejZejjZ ej
Z
ejZejZej
Z
ejZejZejZejjZejjZejjZejjZejjZejjZejjZejjZ ejj!Z"ejj#Z$ee ej%j&fde'de(de(de'de'd ej%j)d
e(fdd�Z*eefde(de'de'd
e(fd
d�Z+dS )� N� )�_argon2�size�password�salt�opslimit�memlimit�encoder�returnc
C s |� tj�| ||||t��S )a�
Derive a ``size`` bytes long key from a caller-supplied
``password`` and ``salt`` pair using the argon2i
memory-hard construct.
the enclosing module provides the constants
- :py:const:`.OPSLIMIT_INTERACTIVE`
- :py:const:`.MEMLIMIT_INTERACTIVE`
- :py:const:`.OPSLIMIT_MODERATE`
- :py:const:`.MEMLIMIT_MODERATE`
- :py:const:`.OPSLIMIT_SENSITIVE`
- :py:const:`.MEMLIMIT_SENSITIVE`
as a guidance for correct settings.
:param size: derived key size, must be between
:py:const:`.BYTES_MIN` and
:py:const:`.BYTES_MAX`
:type size: int
:param password: password used to seed the key derivation procedure;
it length must be between
:py:const:`.PASSWD_MIN` and
:py:const:`.PASSWD_MAX`
:type password: bytes
:param salt: **RANDOM** salt used in the key derivation procedure;
its length must be exactly :py:const:`.SALTBYTES`
:type salt: bytes
:param opslimit: the time component (operation count)
of the key derivation procedure's computational cost;
it must be between
:py:const:`.OPSLIMIT_MIN` and
:py:const:`.OPSLIMIT_MAX`
:type opslimit: int
:param memlimit: the memory occupation component
of the key derivation procedure's computational cost;
it must be between
:py:const:`.MEMLIMIT_MIN` and
:py:const:`.MEMLIMIT_MAX`
:type memlimit: int
:rtype: bytes
.. versionadded:: 1.2
)�encode�nacl�bindings�crypto_pwhash_alg�ALG)r r r r r r � r �G/usr/local/CyberCP/lib/python3.10/site-packages/nacl/pwhash/argon2id.py�kdf5 s
5��r c C s t j�| ||t�S )a�
Hashes a password with a random salt, using the memory-hard
argon2id construct and returning an ascii string that has all
the needed info to check against a future password
The default settings for opslimit and memlimit are those deemed
correct for the interactive user login case.
:param bytes password:
:param int opslimit:
:param int memlimit:
:rtype: bytes
.. versionadded:: 1.2
)r r
�crypto_pwhash_str_algr )r r r r r r �strq s �r ),�
nacl.bindingsr �
nacl.encoding� r �ALG_ARGON2ID13r r
� crypto_pwhash_argon2id_STRPREFIX� STRPREFIX� SALTBYTES�
PASSWD_MIN�
PASSWD_MAX�PWHASH_SIZE� BYTES_MIN� BYTES_MAX�verify�#crypto_pwhash_argon2id_MEMLIMIT_MIN�MEMLIMIT_MIN�#crypto_pwhash_argon2id_MEMLIMIT_MAX�MEMLIMIT_MAX�#crypto_pwhash_argon2id_OPSLIMIT_MIN�OPSLIMIT_MIN�#crypto_pwhash_argon2id_OPSLIMIT_MAX�OPSLIMIT_MAX�+crypto_pwhash_argon2id_OPSLIMIT_INTERACTIVE�OPSLIMIT_INTERACTIVE�+crypto_pwhash_argon2id_MEMLIMIT_INTERACTIVE�MEMLIMIT_INTERACTIVE�)crypto_pwhash_argon2id_OPSLIMIT_SENSITIVE�OPSLIMIT_SENSITIVE�)crypto_pwhash_argon2id_MEMLIMIT_SENSITIVE�MEMLIMIT_SENSITIVE�(crypto_pwhash_argon2id_OPSLIMIT_MODERATE�OPSLIMIT_MODERATE�(crypto_pwhash_argon2id_MEMLIMIT_MODERATE�MEMLIMIT_MODERATE�encoding�
RawEncoder�int�bytes�Encoderr r r r r r �<module> sj ���������
�>�����