AnonSec Shell
Server IP : 209.38.156.173  /  Your IP : 216.73.216.122   [ Reverse IP ]
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux lakekumayuhotel 5.15.0-136-generic #147-Ubuntu SMP Sat Mar 15 15:53:30 UTC 2025 x86_64
User : root ( 0)
PHP Version : 8.1.2-1ubuntu2.22
Disable Function : NONE
Domains : 2 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/lib/python3/dist-packages/cryptography/hazmat/backends/openssl/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /usr/lib/python3/dist-packages/cryptography/hazmat/backends/openssl/__pycache__/rsa.cpython-310.pyc
o

�)%a�Q�
@snddlZddlmZddlmZmZmZddlmZm	Z	m
Z
ddlmZm
Z
ddlmZmZmZddlmZmZmZmZmZmZddlmZmZmZmZd	ed
ejeefdejde fd
d�Z!d
ejdde"dede"fdd�Z#d
ejdde"de dede"f
dd�Z$dd�Z%dd�Z&dd�Z'dd�Z(dd �Z)Gd!d"�d"e�Z*Gd#d$�d$e�Z+Gd%d&�d&e�Z,Gd'd(�d(e�Z-dS))�N)�utils)�InvalidSignature�UnsupportedAlgorithm�_Reasons)�_calculate_digest_and_algorithm�_check_not_prehashed�_warn_sign_verify_deprecated)�hashes�
serialization)�AsymmetricSignatureContext�AsymmetricVerificationContextr)�AsymmetricPadding�MGF1�OAEP�PKCS1v15�PSS�calculate_max_pss_salt_length)�
RSAPrivateKey�RSAPrivateNumbers�RSAPublicKey�RSAPublicNumbers�pss�key�hash_algorithm�returncCs(|j}|tjus
|tjurt||�S|S�N)�_salt_lengthr�
MAX_LENGTHrr)rrr�salt�r�J/usr/lib/python3/dist-packages/cryptography/hazmat/backends/openssl/rsa.py�_get_rsa_pss_salt_length)s
r!)�_RSAPrivateKey�
_RSAPublicKey�data�paddingcCs�t|t�s	td��t|t�r|jj}n+t|t�r4|jj}t|jt	�s(t
dtj��|�
|�s3t
dtj��n
t
d�|j�tj��t|||||�S)Nz1Padding must be an instance of AsymmetricPadding.�'Only MGF1 is supported by this backend.zPThis combination of padding and hash algorithm is not supported by this backend.�${} is not supported by this backend.)�
isinstancer
�	TypeErrorr�_lib�RSA_PKCS1_PADDINGr�RSA_PKCS1_OAEP_PADDING�_mgfrrr�UNSUPPORTED_MGF�rsa_padding_supported�UNSUPPORTED_PADDING�format�name�_enc_dec_rsa_pkey_ctx)�backendrr$r%�padding_enumrrr �_enc_dec_rsa6s,



�
��
�r6r5cCs�t|t�r|jj}|jj}n|jj}|jj}|j�|j|j	j
�}|�||j	j
k�|j	�||jj
�}||�}|�|dk�|j�||�}|�|dk�|j�|j�}	|�|	dk�t|t�r�|jjr�|�|jj�}
|j�||
�}|�|dk�|�|j�}|j�||�}|�|dk�t|t�r�|jdur�t|j�dkr�|j�t|j��}|�||j	j
k�|j	�||jt|j��|j�||t|j��}|�|dk�|j	�d|	�}
|j	�d|	�}||||
|t|��}|j	�|�d|
d�}|j��|dkr�td��|S)N�r�size_t *�unsigned char[]zEncryption/decryption failed.) r(r#r*�EVP_PKEY_encrypt_init�EVP_PKEY_encrypt�EVP_PKEY_decrypt_init�EVP_PKEY_decrypt�EVP_PKEY_CTX_new�	_evp_pkey�_ffi�NULL�openssl_assert�gc�EVP_PKEY_CTX_free�EVP_PKEY_CTX_set_rsa_padding�
EVP_PKEY_sizer�Cryptography_HAS_RSA_OAEP_MD�_evp_md_non_null_from_algorithmr-�
_algorithm�EVP_PKEY_CTX_set_rsa_mgf1_md�EVP_PKEY_CTX_set_rsa_oaep_md�_label�len�OPENSSL_malloc�memmove� EVP_PKEY_CTX_set0_rsa_oaep_label�new�buffer�ERR_clear_error�
ValueError)r4rr$r5r%�init�crypt�pkey_ctx�res�buf_size�mgf1_md�oaep_md�labelptr�outlen�buf�resbufrrr r3ZsX

�����
r3cCs�t|t�s	td��|j�|j�}|�|dk�t|t�r"|jj}|St|t	�rPt|j
t�s3tdt
j��t|tj�s=td��||jddkrJtd��|jj}|Std�|j�t
j��)Nz'Expected provider of AsymmetricPadding.rr&z*Expected instance of hashes.HashAlgorithm.�zDDigest too large for key size. Use a larger key or different digest.r')r(r
r)r*rFr?rBrr+rr-rrrr.r	�
HashAlgorithm�digest_sizerT�RSA_PKCS1_PSS_PADDINGr1r2r0)r4rr%�	algorithm�	pkey_sizer5rrr �_rsa_sig_determine_padding�s2


����
�rfc
Cs.t||||�}|j�|j|jj�}|�||jjk�|j�||jj�}||�}|�|dk�|durP|�	|�}|j�
||�}|dkrP|��td�
|j�tj��|j�||�}|dkri|��td�
|j�tj��t|t�r�|j�|t|||��}|�|dk�|�	|jj�}	|j�||	�}|�|dk�|S)Nr7rz4{} is not supported by this backend for RSA signing.z4{} is not supported for the RSA signature operation.)rfr*r>r?r@rArBrCrDrH�EVP_PKEY_CTX_set_signature_md�_consume_errorsrr1r2r�UNSUPPORTED_HASHrEr0r(r� EVP_PKEY_CTX_set_rsa_pss_saltlenr!r-rIrJ)
r4r%rdr�	init_funcr5rWrX�evp_mdrZrrr �_rsa_sig_setup�sJ
����
��rmc
Cs�t|||||jj�}|j�d�}|j�||jj||t|��}|�|dk�|j�d|d�}|j�||||t|��}|dkrG|�	�}	t
d|	��|j�|�dd�S)Nr8r7r9rzuDigest or salt length too long for key size. Use a larger key or shorter salt length if you are specifying a PSS salt)rmr*�EVP_PKEY_sign_initr@rQ�
EVP_PKEY_signrArMrB�_consume_errors_with_textrTrR)
r4r%rd�private_keyr$rW�buflenrXr^�errorsrrr �
_rsa_sig_sign�s*���rtcCsVt|||||jj�}|j�||t|�|t|��}|�|dk�|dkr)|��t�dS)Nr)rmr*�EVP_PKEY_verify_init�EVP_PKEY_verifyrMrBrhr)r4r%rd�
public_key�	signaturer$rWrXrrr �_rsa_sig_verify
s���rycCs�t|||||jj�}|j�|j�}|�|dk�|j�d|�}|j�d|�}|j�||||t	|��}	|j�
|�d|d�}
|j��|	dkrIt�|
S)Nrr9r8r7)
rmr*�EVP_PKEY_verify_recover_initrFr?rBr@rQ�EVP_PKEY_verify_recoverrMrRrSr)r4r%rdrwrxrW�maxlenr^rrrXr_rrr �_rsa_sig_recovers&�
�
r}c@sDeZdZdededejfdd�Zdeddfd	d
�Z	defdd�Z
dS)
�_RSASignatureContextrqr%rdcCs<||_||_t||||�||_||_t�|j|j�|_dSr)�_backend�_private_keyrf�_paddingrIr	�Hash�	_hash_ctx)�selfr4rqr%rdrrr �__init__=sz_RSASignatureContext.__init__r$rNcC�|j�|�dSr�r��update�r�r$rrr r�O�z_RSASignatureContext.updatecCst|j|j|j|j|j���Sr)rtrr�rIr�r��finalize�r�rrr r�Rs�z_RSASignatureContext.finalize)�__name__�
__module__�__qualname__rr
r	rar��bytesr�r�rrrr r~<s��
�r~c@sDeZdZdedededejfdd�Zdedd	fd
d�Z	ddd
�Z
d	S)�_RSAVerificationContextrwrxr%rdcCsF||_||_||_||_t||||�|}||_t�|j|j�|_dSr)	r�_public_key�
_signaturer�rfrIr	r�r�)r�r4rwrxr%rdrrr r�]sz _RSAVerificationContext.__init__r$rNcCr�rr�r�rrr r�rr�z_RSAVerificationContext.updatecCs"t|j|j|j|j|j|j���Sr)ryrr�rIr�r�r�r�r�rrr �verifyus�z_RSAVerificationContext.verify)rN)r�r�r�rr�r
r	rar�r�r�rrrr r�\s���
�r�c@s�eZdZdd�Ze�d�Zdedej	de
fdd�Zd	ededefd
d�Z
defdd
�Zdefdd�Zdejdejdejdefdd�Zdededejejej	fdefdd�ZdS)r"cCs�|j�|�}|dkr|��}td|��|j�||jj�}|�|dk�||_||_	||_
|jj�d�}|jj�|j	||jjj|jjj�|j�|d|jjjk�|jj�
|d�|_dS)Nr7zInvalid private key�	BIGNUM **r)r*�
RSA_check_keyrprT�RSA_blinding_onr@rArBr�
_rsa_cdatar?rQ�RSA_get0_key�BN_num_bits�	_key_size)r�r4�	rsa_cdata�evp_pkeyrXrs�nrrr r��s$
�z_RSAPrivateKey.__init__r�r%rdrcCst�t|�t|j|||�Sr)rrr~r)r�r%rdrrr �signer�sz_RSAPrivateKey.signer�
ciphertextcCs2|jdd}|t|�krtd��t|j|||�S)N��z,Ciphertext length must be equal to key size.)�key_sizerMrTr6r)r�r�r%�key_size_bytesrrr �decrypt�sz_RSAPrivateKey.decryptcCsV|jj�|j�}|j�||jjjk�|jj�||jjj�}|j�	|�}t
|j||�Sr)rr*�RSAPublicKey_dupr�rBr@rArC�RSA_free�_rsa_cdata_to_evp_pkeyr#)r��ctxr�rrr rw�s
z_RSAPrivateKey.public_keyc	
Cs�|jj�d�}|jj�d�}|jj�d�}|jj�d�}|jj�d�}|jj�d�}|jj�d�}|jj�d�}|jj�|j|||�|j�|d|jjjk�|j�|d|jjjk�|j�|d|jjjk�|jj�|j||�|j�|d|jjjk�|j�|d|jjjk�|jj�	|j|||�|j�|d|jjjk�|j�|d|jjjk�|j�|d|jjjk�t
|j�|d�|j�|d�|j�|d�|j�|d�|j�|d�|j�|d�t|j�|d�|j�|d�d�d�S)Nr�r��er�)�p�q�d�dmp1�dmq1�iqmp�public_numbers)
rr@rQr*r�r�rBrA�RSA_get0_factors�RSA_get0_crt_paramsr�
_bn_to_intr)	r�r�r�r�r�r�r�r�r�rrr �private_numbers�sB
���z_RSAPrivateKey.private_numbers�encodingr1�encryption_algorithmcCs|j�|||||j|j�Sr)r�_private_key_bytesr?r�)r�r�r1r�rrr �
private_bytes�s�z_RSAPrivateKey.private_bytesr$cCs$t|j||�\}}t|j||||�Sr)rrrt)r�r$r%rdrrr �sign�s�z_RSAPrivateKey.signN)r�r�r�r�r�read_only_propertyr�r
r	rarr�r�r�rrwrr�r
�Encoding�
PrivateFormat�KeySerializationEncryptionr��typing�Union�
asym_utils�	Prehashedr�rrrr r"�s>
��
�#���
�����r"c
@s�eZdZdd�Ze�d�Zdedede	j
defdd	�Zd
ededefdd�Z
defd
d�Zdejdejdefdd�Zdedededejeje	j
fddf
dd�Zdededeje	j
defdd�ZdS)r#cCst||_||_||_|jj�d�}|jj�|j||jjj|jjj�|j�|d|jjjk�|jj�	|d�|_
dS)Nr�r)rr�r?r@rQr*r�rArBr�r�)r�r4r�r�r�rrr r��s�z_RSAPublicKey.__init__r�rxr%rdrcCs,t�t�d|�t|�t|j||||�S)Nrx)rr�_check_bytesrr�r�r�rxr%rdrrr �verifiers�z_RSAPublicKey.verifier�	plaintextcCst|j|||�Sr)r6r)r�r�r%rrr �encryptr�z_RSAPublicKey.encryptcCs�|jj�d�}|jj�d�}|jj�|j|||jjj�|j�|d|jjjk�|j�|d|jjjk�t|j�	|d�|j�	|d�d�S)Nr�rr�)
rr@rQr*r�r�rArBrr�)r�r�r�rrr r�s��z_RSAPublicKey.public_numbersr�r1cCs|j�||||j|j�Sr)r�_public_key_bytesr?r�)r�r�r1rrr �public_bytess�z_RSAPublicKey.public_bytesr$NcCs&t|j||�\}}t|j|||||�Sr)rrry)r�rxr$r%rdrrr r�(s��z_RSAPublicKey.verifycCst|�t|j||||�Sr)rr}rr�rrr �recover_data_from_signature6s�z)_RSAPublicKey.recover_data_from_signature)r�r�r�r�rr�r�r�r
r	rarr�r�rr�r
r��PublicFormatr�r�r�r�r�r��Optionalr�rrrr r#�sR
���
�
��
�	����
���
��r#).r��cryptographyr�cryptography.exceptionsrrr�*cryptography.hazmat.backends.openssl.utilsrrr�cryptography.hazmat.primitivesr	r
�)cryptography.hazmat.primitives.asymmetricrrr��1cryptography.hazmat.primitives.asymmetric.paddingr
rrrrr�-cryptography.hazmat.primitives.asymmetric.rsarrrrr�ra�intr!r�r6r3rfrmrtryr}r~r�r"r#rrrr �<module>s\ ���
�
���
�$����
�A+* $o

Anon7 - 2022
AnonSec Team