403Webshell
Server IP : 15.235.198.142  /  Your IP : 216.73.216.190
Web Server : Apache/2.4.58 (Ubuntu)
System : Linux ballsack 6.8.0-45-generic #45-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 30 12:02:04 UTC 2024 x86_64
User : www-data ( 33)
PHP Version : 8.3.6
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : OFF
Directory :  /lib/python3/dist-packages/cryptography/hazmat/backends/openssl/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /lib/python3/dist-packages/cryptography/hazmat/backends/openssl/__pycache__/rsa.cpython-312.pyc
�

�3TfAU����ddlmZddlZddlZddlmZmZmZddlm	Z	ddl
mZmZddl
mZddlmZmZmZmZmZmZmZmZmZddlmZmZmZmZej>rdd	l m!Z!										dd
�Z"										dd�Z#												dd�Z$										dd
�Z%										dd�Z&												dd�Z'														dd�Z(												dd�Z)Gd�de�Z*Gd�de�Z+y)�)�annotationsN)�InvalidSignature�UnsupportedAlgorithm�_Reasons)�_calculate_digest_and_algorithm)�hashes�
serialization)�utils)	�MGF1�OAEP�PSS�AsymmetricPadding�PKCS1v15�_Auto�
_DigestLength�
_MaxLength�calculate_max_pss_salt_length)�
RSAPrivateKey�RSAPrivateNumbers�RSAPublicKey�RSAPublicNumbers)�Backendc��|j}t|t�rt||�St|t�r|j
St|t�r1t|t�rtd��|jjS|S)Nz6PSS salt length can only be set to AUTO when verifying)�_salt_length�
isinstancerrr�digest_sizerr�
ValueError�_lib�RSA_PSS_SALTLEN_AUTO)�backend�pss�key�hash_algorithm�salts     �J/usr/lib/python3/dist-packages/cryptography/hazmat/backends/openssl/rsa.py�_get_rsa_pss_salt_lengthr&*sw�����D��$�
�#�,�S�.�A�A�	�D�-�	(��)�)�)�	�D�%�	 ��c�=�)��H��
��|�|�0�0�0���c��t|t�std��t|t�r|jj
}n�t|t�ru|jj}t|jt�stdtj��|j|�sAtdtj��t|j�d�tj��t!|||||�S)Nz1Padding must be an instance of AsymmetricPadding.�'Only MGF1 is supported by this backend.zPThis combination of padding and hash algorithm is not supported by this backend.�" is not supported by this backend.)rr�	TypeErrorrr�RSA_PKCS1_PADDINGr�RSA_PKCS1_OAEP_PADDING�_mgfrrr�UNSUPPORTED_MGF�rsa_padding_supported�UNSUPPORTED_PADDING�name�_enc_dec_rsa_pkey_ctx)r r"�data�padding�padding_enums     r%�_enc_dec_rsar7@s����g�0�1��K�L�L��'�8�$��|�|�5�5��	�G�T�	"��|�|�:�:���'�,�,��-�&�9��(�(��
�
�,�,�W�5�&�-��,�,��
�#��|�|�n�>�?��(�(�
�	
�
!��#�t�\�7�K�Kr'c	��t|t�r-|jj}|jj}n,|jj
}|jj}|jj|j|jj�}|j||jjk7�|jj||jj�}||�}|j|dk(�|jj||�}|j|dkD�|jj|j�}	|j|	dkD�t|t �r�|j#|j$j&�}
|jj)||
�}|j|dkD�|j#|j&�}|jj+||�}|j|dkD�t|t �r�|j,��t/|j,�dkDr�|jj1t/|j,��}|j||jjk7�|jj3||j,t/|j,��|jj5||t/|j,��}|j|dk(�|jj7d|	�}
|jj7d|	�}||||
|t/|��}|jj9|�d|
d}|jj;�|dkrt=d��|S)N�r�size_t *�unsigned char[]zEncryption/decryption failed.)r�
_RSAPublicKeyr�EVP_PKEY_encrypt_init�EVP_PKEY_encrypt�EVP_PKEY_decrypt_init�EVP_PKEY_decrypt�EVP_PKEY_CTX_new�	_evp_pkey�_ffi�NULL�openssl_assert�gc�EVP_PKEY_CTX_free�EVP_PKEY_CTX_set_rsa_padding�
EVP_PKEY_sizer�_evp_md_non_null_from_algorithmr.�
_algorithm�EVP_PKEY_CTX_set_rsa_mgf1_md�EVP_PKEY_CTX_set_rsa_oaep_md�_label�len�OPENSSL_malloc�memmove� EVP_PKEY_CTX_set0_rsa_oaep_label�new�buffer�ERR_clear_errorr)r r"r4r6r5�init�crypt�pkey_ctx�res�buf_size�mgf1_md�oaep_md�labelptr�outlen�buf�resbufs                r%r3r3ds����#�}�%��|�|�1�1�����-�-���|�|�1�1�����-�-���|�|�,�,�S�]�]�G�L�L�<M�<M�N�H����8�w�|�|�'8�'8�8�9��|�|���x����)G�)G�H�H�
�x�.�C����3�!�8�$�
�,�,�
3�
3�H�l�
K�C����3��7�#��|�|�)�)�#�-�-�8�H����8�a�<�(��'�4� ��9�9��L�L�#�#�
���l�l�7�7��'�J�����s�Q�w�'��9�9�'�:L�:L�M���l�l�7�7��'�J�����s�Q�w�'�	�7�D�!��N�N�&������!�#��<�<�.�.�s�7�>�>�/B�C�����x�7�<�<�+<�+<�<�=������X�w�~�~�s�7�>�>�7J�K��l�l�;�;��h��G�N�N� 3�
��	���s�a�x�(�
�\�\�
�
�j�(�
3�F�
�,�,�
�
�,�h�
7�C���#�v�t�S��Y�
7�C�
�\�\�
 �
 ��
%�k��q�	�
2�F��L�L� � �"�
�a�x��8�9�9��Mr'c��t|t�std��|jj	|j
�}|j
|dkD�t|t�r|jj}|St|t�r�t|jt�stdtj��t|tj �std��||j"z
dz
dkrt%d��|jj&}|St|j(�d�tj*��)Nz'Expected provider of AsymmetricPadding.rr)z*Expected instance of hashes.HashAlgorithm.�zDDigest too large for key size. Use a larger key or different digest.r*)rrr+rrIrBrErr,r
r.rrrr/r�
HashAlgorithmrr�RSA_PKCS1_PSS_PADDINGr2r1)r r"r5�	algorithm�	pkey_sizer6s      r%�_rsa_sig_determine_paddingrg�s#���g�0�1��A�B�B����*�*�3�=�=�9�I����9�q�=�)��'�8�$��|�|�5�5��6��5
�G�S�	!��'�,�,��-�&�9��(�(��
��)�V�%9�%9�:��H�I�I��y�,�,�,�q�0�1�4��+��
�
�|�|�9�9����#��|�|�n�>�?��(�(�
�	
r'c	���t||||�}|jj|j|jj
�}|j
||jj
k7�|jj||jj�}||�}|dk7r|j�}td|��|�u|j|�}	|jj||	�}|dkrC|j�tdj|j�t j"��|jj%||�}|dkrC|j�tdj|j�t j&��t)|t*�r�t)|t,j.�sJ�|jj1|t3||||��}|j
|dkD�|j|j4j6�}
|jj9||
�}|j
|dkD�|S)Nr9z#Unable to sign/verify with this keyrz4{} is not supported by this backend for RSA signing.z4{} is not supported for the RSA signature operation.)rgrrArBrCrDrErFrG�_consume_errorsrrJ�EVP_PKEY_CTX_set_signature_mdr�formatr2r�UNSUPPORTED_HASHrHr1rr
rrc� EVP_PKEY_CTX_set_rsa_pss_saltlenr&r.rKrL)r r5rer"�	init_funcr6rXrY�errors�evp_mdr[s           r%�_rsa_sig_setuprq�s��.�g�s�G�Y�O�L��|�|�,�,�S�]�]�G�L�L�<M�<M�N�H����8�w�|�|�'8�'8�8�9��|�|���x����)G�)G�H�H�
�H�
�C�
�a�x��(�(�*���>��G�G����8�8��C���l�l�8�8��6�J���!�8��#�#�%�&�F�M�M��N�N���)�)�	�
��,�,�
3�
3�H�l�
K�C�
�a�x����!�"�B�I�I����
�
�(�(�	
�	
��'�3���)�V�%9�%9�:�:�:��l�l�;�;��$�W�g�s�I�F�
��	���s�Q�w�'��9�9��L�L�#�#�
���l�l�7�7��'�J�����s�Q�w�'��Or'�_RSAPrivateKeyc	�*�t|||||jj�}|jj	d�}|jj||jj||t|��}|j|dk(�|jj	d|d�}|jj||||t|��}|dk7r|j�}	td|	��|jj|�ddS)Nr:r9r;rzuDigest or salt length too long for key size. Use a larger key or shorter salt length if you are specifying a PSS salt)rqr�EVP_PKEY_sign_initrCrS�
EVP_PKEY_signrDrOrErirrT)
r r5re�private_keyr4rX�buflenrYr_ros
          r%�
_rsa_sig_signrxs����������'�'��H��\�\�
�
�j�
)�F�
�,�,�
$�
$��'�,�,�#�#�V�T�3�t�9��C����3�!�8�$�
�,�,�
�
�,�f�Q�i�
8�C�
�,�,�
$�
$�X�s�F�D�#�d�)�
L�C�
�a�x��(�(�*���
F��
�	
��<�<���s�#�A�&�&r'r<c	�
�t|||||jj�}|jj||t	|�|t	|��}|j|dk\�|dk(r|j
�t�y)Nr)rqr�EVP_PKEY_verify_init�EVP_PKEY_verifyrOrErir)r r5re�
public_key�	signaturer4rXrYs        r%�_rsa_sig_verifyr~,s�����������)�)��H��,�,�
&�
&��)�S��^�T�3�t�9��C����3�!�8�$�
�a�x����!���r'c	�
�t|||||jj�}|jj|j�}|j|dkD�|jjd|�}|jjd|�}|jj||||t|��}	|jj|�d|d}
|jj�|	dk7rt�|
S)Nrr;r:r9)
rqr�EVP_PKEY_verify_recover_initrIrBrErCrS�EVP_PKEY_verify_recoverrOrTrUr)r r5rer|r}rX�maxlenr_rwrYr`s           r%�_rsa_sig_recoverr�Gs�����������1�1��H��\�\�
'�
'�
�(<�(<�
=�F����6�A�:�&�
�,�,�
�
�,�f�
5�C�
�\�\�
�
�j�&�
1�F�
�,�,�
.�
.��#�v�y�#�i�.��C��\�\�
 �
 ��
%�k��q�	�
2�F��L�L� � �"��a�x����Mr'c��eZdZUded<ded<ded<				dd�Zdd�Zdd�Zedd	��Zdd
�Z	dd�Z
dd�Z								dd
�Z								dd�Z
y)rr�objectrB�
_rsa_cdata�int�	_key_sizec��|�sG|jj|�}|dk7r|j�}td|��|jjd�}|jjd�}|jj
|||�|j|d|jjk7�|j|d|jjk7�|jj|d�}	|jj|d�}
|	dk7s|
dk7r|j�}td|��||_
||_||_d|_
tj�|_|jjjd�}|jjj#|j||jjj|jjj�|jj|d|jjjk7�|jjj%|d�|_y)Nr9zInvalid private key�	BIGNUM **rF)r�
RSA_check_keyrirrCrS�RSA_get0_factorsrErD�	BN_is_odd�_backendr�rB�_blinded�	threading�Lock�_blinding_lock�RSA_get0_key�BN_num_bitsr�)�selfr �	rsa_cdata�evp_pkey�unsafe_skip_rsa_key_validationrYro�p�q�p_odd�q_odd�ns            r%�__init__z_RSAPrivateKey.__init__ps���.��,�,�,�,�Y�7�C��a�x� �0�0�2�� �!6��?�?���� � ��-�A���� � ��-�A��L�L�)�)�)�Q��:��"�"�1�Q�4�7�<�<�+<�+<�#<�=��"�"�1�Q�4�7�<�<�+<�+<�#<�=��L�L�*�*�1�Q�4�0�E��L�L�*�*�1�Q�4�0�E���z�U�a�Z� �0�0�2�� �!6��?�?���
�#���!�����
�'�n�n�.����M�M���"�"�;�/���
�
���'�'��O�O�
��M�M���#�#��M�M���#�#�		
�	
�
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E����+�+�7�7��!��=��r'c��|js&|j5|j�ddd�yy#1swYyxYw�N)r�r��_non_threadsafe_enable_blinding�r�s r%�_enable_blindingz_RSAPrivateKey._enable_blinding�s?���}�}��$�$�
7��4�4�6�
7�
7��
7�
7�s�4�=c��|jst|jjj|j|jj
j�}|jj|dk(�d|_yy)Nr9T)r�r�r�RSA_blinding_onr�rCrDrE)r�rYs  r%r�z._RSAPrivateKey._non_threadsafe_enable_blinding�sb��
�}�}��-�-�$�$�4�4�������!3�!3�!8�!8��C�
�M�M�(�(����2� �D�M�r'c��|jSr��r�r�s r%�key_sizez_RSAPrivateKey.key_size�����~�~�r'c��|j�|jdzdz}|t|�k7rtd��t	|j
|||�S)N��z,Ciphertext length must be equal to key size.)r�r�rOrr7r�)r��
ciphertextr5�key_size_bytess    r%�decryptz_RSAPrivateKey.decrypt�sN�������-�-�!�+��1���S��_�,��K�L�L��D�M�M�4��W�E�Er'c���|jjj|j�}|jj	||jj
jk7�|jj
j||jjj�}|jj|�}t|j||�Sr�)r�r�RSAPublicKey_dupr�rErCrDrF�RSA_free�_rsa_cdata_to_evp_pkeyr<)r��ctxr�s   r%r|z_RSAPrivateKey.public_key�s����m�m� � �1�1�$�/�/�B���
�
�$�$�S�D�M�M�,>�,>�,C�,C�%C�D��m�m� � �#�#�C����);�);�)D�)D�E���=�=�7�7��<���T�]�]�C��:�:r'c�f	�|jjjd�}|jjjd�}|jjjd�}|jjjd�}|jjjd�}|jjjd�}|jjjd�}|jjjd�}|jjj	|j
|||�|jj
|d|jjjk7�|jj
|d|jjjk7�|jj
|d|jjjk7�|jjj|j
||�|jj
|d|jjjk7�|jj
|d|jjjk7�|jjj|j
|||�|jj
|d|jjjk7�|jj
|d|jjjk7�|jj
|d|jjjk7�t|jj|d�|jj|d�|jj|d�|jj|d�|jj|d�|jj|d�t|jj|d�|jj|d�����S)Nr�r��er�)r�r��d�dmp1�dmq1�iqmp�public_numbers)
r�rCrSrr�r�rErDr��RSA_get0_crt_paramsr�
_bn_to_intr)	r�r�r�r�r�r�r�r�r�s	         r%�private_numbersz_RSAPrivateKey.private_numbers�sX���M�M���"�"�;�/���M�M���"�"�;�/���M�M���"�"�;�/���M�M���"�"�;�/���M�M���"�"�;�/���}�}�!�!�%�%�k�2���}�}�!�!�%�%�k�2���}�}�!�!�%�%�k�2���
�
���'�'�����A�q�A��
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E��
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E��
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E��
�
���+�+�D�O�O�Q��B��
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E��
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E��
�
���.�.��O�O�T�4��	
�	
�
�
�$�$�T�!�W��
�
�0B�0B�0G�0G�%G�H��
�
�$�$�T�!�W��
�
�0B�0B�0G�0G�%G�H��
�
�$�$�T�!�W��
�
�0B�0B�0G�0G�%G�H� ��m�m�&�&�q��t�,��m�m�&�&�q��t�,��m�m�&�&�q��t�,����)�)�$�q�'�2����)�)�$�q�'�2����)�)�$�q�'�2�+��-�-�*�*�1�Q�4�0��-�-�*�*�1�Q�4�0��
�	
r'c�j�|jj|||||j|j�Sr�)r��_private_key_bytesrBr�)r��encodingrk�encryption_algorithms    r%�
private_bytesz_RSAPrivateKey.private_bytes�s5���}�}�/�/��� ���N�N��O�O�

�	
r'c�r�|j�t||�\}}t|j||||�Sr�)r�rrxr�)r�r4r5res    r%�signz_RSAPrivateKey.sign�s7��	
����9�$�	�J���i��T�]�]�G�Y��d�K�Kr'N)r rr��bool)�return�None�r�r�)r��bytesr5rr�r�)r�r)r�r)r��serialization.Encodingrkzserialization.PrivateFormatr�z(serialization.KeySerializationEncryptionr�r�)r4r�r5rre�8typing.Union[asym_utils.Prehashed, hashes.HashAlgorithm]r�r�)�__name__�
__module__�__qualname__�__annotations__r�r�r��propertyr�r�r|r�r�r��r'r%rrrrks��������N�/>��/>�)-�
/>�b7�
!�����F�;�!
�F

�(�

�,�

�G�	

�

�

�L��L�#�L�L�	L�

�Lr'c��eZdZUded<ded<ded<dd�Zedd��Zdd�Zdd	�Zdd
�Z							dd�Z
										dd�Z								dd
�Zy)r<r�rBr�r�r�c�,�||_||_||_|jjj	d�}|jj
j
|j||jjj|jjj�|jj|d|jjjk7�|jj
j|d�|_
y)Nr�r)r�r�rBrCrSrr�rDrEr�r�)r�r r�r�r�s     r%r�z_RSAPublicKey.__init__	s�����
�#���!����M�M���"�"�;�/���
�
���'�'��O�O�
��M�M���#�#��M�M���#�#�		
�	
�
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E����+�+�7�7��!��=��r'c��|jSr�r�r�s r%r�z_RSAPublicKey.key_sizer�r'c��t|t�stS|jjj|j|j�dk(S)Nr9)rr<�NotImplementedr�r�EVP_PKEY_cmprB)r��others  r%�__eq__z_RSAPublicKey.__eq__sC���%��/�!�!�
�M�M���+�+�D�N�N�E�O�O�L��
�	
r'c�2�t|j|||�Sr�)r7r�)r��	plaintextr5s   r%�encryptz_RSAPublicKey.encrypt%s���D�M�M�4��G�D�Dr'c��|jjjd�}|jjjd�}|jjj	|j
|||jjj�|jj|d|jjjk7�|jj|d|jjjk7�t|jj|d�|jj|d���S)Nr�rr�)
r�rCrSrr�r�rDrErr�)r�r�r�s   r%r�z_RSAPublicKey.public_numbers(s����M�M���"�"�;�/���M�M���"�"�;�/���
�
���'�'��O�O�Q��4�=�=�#5�#5�#:�#:�	
�	
�
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E��
�
�$�$�Q�q�T�T�]�]�-?�-?�-D�-D�%D�E���m�m�&�&�q��t�,��m�m�&�&�q��t�,�
�	
r'c�h�|jj||||j|j�Sr�)r��_public_key_bytesrBr�)r�r�rks   r%�public_bytesz_RSAPublicKey.public_bytes5s.��
�}�}�.�.��f�d�D�N�N�D�O�O�
�	
r'c�V�t||�\}}t|j|||||�yr�)rr~r�)r�r}r4r5res     r%�verifyz_RSAPublicKey.verify>s-��:�$�	�J���i���M�M�7�I�t�Y��	
r'c�~�t|tj�rtd��t	|j
||||�S)NzoPrehashed is only supported in the sign and verify methods. It cannot be used with recover_data_from_signature.)r�
asym_utils�	Prehashedr+r�r�)r�r}r5res    r%�recover_data_from_signaturez)_RSAPublicKey.recover_data_from_signatureJsE���i��!5�!5�6��F��
� ��M�M�7�I�t�Y�
�	
r'N)r rr�)r�r�r�r�)r�r�r5rr�r�)r�r)r�r�rkzserialization.PublicFormatr�r�)
r}r�r4r�r5rrer�r�r�)r}r�r5rre�%typing.Optional[hashes.HashAlgorithm]r�r�)
r�r�r�r�r�r�r�r�r�r�r�r�r�r�r'r%r<r<s��������N�
>�����
�E�
�
�(�
�+�
�
�	
�

��

��

�#�	

�
L�

�
�

�

��

�#�

�9�	

�

�

r')
r rr!r
r"z)typing.Union[RSAPrivateKey, RSAPublicKey]r#�hashes.HashAlgorithmr�r�)
r rr"�+typing.Union[_RSAPrivateKey, _RSAPublicKey]r4r�r5rr�r�)r rr"r�r4r�r6r�r5rr�r�)
r rr"r�r5rrer�r�r�)
r rr5rrer�r"z+typing.Union[_RSAPublicKey, _RSAPrivateKey]rnz"typing.Callable[[typing.Any], int])r rr5rrer�rvrrr4r�r�r�)r rr5rrer�r|r<r}r�r4r�r�r�)r rr5rrer�r|r<r}r�r�r�),�
__future__rr��typing�cryptography.exceptionsrrr�*cryptography.hazmat.backends.openssl.utilsr�cryptography.hazmat.primitivesrr	�)cryptography.hazmat.primitives.asymmetricr
r��1cryptography.hazmat.primitives.asymmetric.paddingrrr
rrrrrr�-cryptography.hazmat.primitives.asymmetric.rsarrrr�
TYPE_CHECKING�,cryptography.hazmat.backends.openssl.backendrr&r7r3rgrqrxr~r�rrr<r�r'r%�<module>r�sK��
#��
���
�A�I�
�
�
���
���D��
��	��
3��)�	�
	��,!L�
�!L�	4�!L��!L��	!L�
�!L�H@�
�@�	4�@��@��	@�
�@��
@�F)�
�)�	4�)��)�5�	)�
	�)�`2�
�2�
�2�5�2�
5�	2�
2�2�j'�
�'�
�'�$�'� �	'�
�'��
'�@�
��
��$���	�
���
�
��6!�
�!�
�!�5�!��	!�
�!��
!�HVL�]�VL�rS
�L�S
r'

Youez - 2016 - github.com/yon3zu
LinuXploit