[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.145.199.101: ~ $
# ===================================================================
#
# Copyright (c) 2019, Legrandin <helderijs@gmail.com>
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
#
# 1. Redistributions of source code must retain the above copyright
#    notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
#    notice, this list of conditions and the following disclaimer in
#    the documentation and/or other materials provided with the
#    distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
# ===================================================================

import sys

from Crypto.Cipher import _create_cipher
from Crypto.Util._raw_api import (load_pycryptodome_raw_lib,
                                  VoidPointer, SmartPointer, c_size_t,
                                  c_uint8_ptr, c_uint)

_raw_blowfish_lib = load_pycryptodome_raw_lib(
        "Crypto.Cipher._raw_eksblowfish",
        """
        int EKSBlowfish_start_operation(const uint8_t key[],
                                        size_t key_len,
                                        const uint8_t salt[16],
                                        size_t salt_len,
                                        unsigned cost,
                                        unsigned invert,
                                        void **pResult);
        int EKSBlowfish_encrypt(const void *state,
                                const uint8_t *in,
                                uint8_t *out,
                                size_t data_len);
        int EKSBlowfish_decrypt(const void *state,
                                const uint8_t *in,
                                uint8_t *out,
                                size_t data_len);
        int EKSBlowfish_stop_operation(void *state);
        """
        )


def _create_base_cipher(dict_parameters):
    """This method instantiates and returns a smart pointer to
    a low-level base cipher. It will absorb named parameters in
    the process."""

    try:
        key = dict_parameters.pop("key")
        salt = dict_parameters.pop("salt")
        cost = dict_parameters.pop("cost")
    except KeyError as e:
        raise TypeError("Missing EKSBlowfish parameter: " + str(e))
    invert = dict_parameters.pop("invert", True)

    if len(key) not in key_size:
        raise ValueError("Incorrect EKSBlowfish key length (%d bytes)" % len(key))

    start_operation = _raw_blowfish_lib.EKSBlowfish_start_operation
    stop_operation = _raw_blowfish_lib.EKSBlowfish_stop_operation

    void_p = VoidPointer()
    result = start_operation(c_uint8_ptr(key),
                             c_size_t(len(key)),
                             c_uint8_ptr(salt),
                             c_size_t(len(salt)),
                             c_uint(cost),
                             c_uint(int(invert)),
                             void_p.address_of())
    if result:
        raise ValueError("Error %X while instantiating the EKSBlowfish cipher"
                         % result)
    return SmartPointer(void_p.get(), stop_operation)


def new(key, mode, salt, cost, invert):
    """Create a new EKSBlowfish cipher
    
    Args:

      key (bytes, bytearray, memoryview):
        The secret key to use in the symmetric cipher.
        Its length can vary from 0 to 72 bytes.

      mode (one of the supported ``MODE_*`` constants):
        The chaining mode to use for encryption or decryption.

      salt (bytes, bytearray, memoryview):
        The salt that bcrypt uses to thwart rainbow table attacks

      cost (integer):
        The complexity factor in bcrypt

      invert (bool):
        If ``False``, in the inner loop use ``ExpandKey`` first over the salt
        and then over the key, as defined in
        the `original bcrypt specification <https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node4.html>`_.
        If ``True``, reverse the order, as in the first implementation of
        `bcrypt` in OpenBSD.

    :Return: an EKSBlowfish object
    """

    kwargs = { 'salt':salt, 'cost':cost, 'invert':invert }
    return _create_cipher(sys.modules[__name__], key, mode, **kwargs)


MODE_ECB = 1

# Size of a data block (in bytes)
block_size = 8
# Size of a key (in bytes)
key_size = range(0, 72 + 1)

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
AES.py File 8.71 KB 0644
AES.pyi File 3.63 KB 0644
ARC2.py File 6.85 KB 0644
ARC2.pyi File 980 B 0644
ARC4.py File 5 KB 0644
ARC4.pyi File 413 B 0644
Blowfish.py File 5.82 KB 0644
Blowfish.pyi File 1016 B 0644
CAST.py File 5.93 KB 0644
CAST.pyi File 981 B 0644
ChaCha20.py File 10.48 KB 0644
ChaCha20.pyi File 788 B 0644
ChaCha20_Poly1305.py File 11.29 KB 0644
ChaCha20_Poly1305.pyi File 1.08 KB 0644
DES.py File 5.81 KB 0644
DES.pyi File 961 B 0644
DES3.py File 6.76 KB 0644
DES3.pyi File 1.01 KB 0644
PKCS1_OAEP.py File 8.62 KB 0644
PKCS1_OAEP.pyi File 1.15 KB 0644
PKCS1_v1_5.py File 7.95 KB 0644
PKCS1_v1_5.pyi File 686 B 0644
Salsa20.py File 6.2 KB 0644
Salsa20.pyi File 751 B 0644
_ARC4.abi3.so File 20.52 KB 0755
_EKSBlowfish.py File 5.08 KB 0644
_EKSBlowfish.pyi File 266 B 0644
_Salsa20.abi3.so File 26.38 KB 0755
__init__.py File 2.78 KB 0644
__init__.pyi File 0 B 0644
_chacha20.abi3.so File 29.91 KB 0755
_mode_cbc.py File 10.63 KB 0644
_mode_cbc.pyi File 687 B 0644
_mode_ccm.py File 23.8 KB 0644
_mode_ccm.pyi File 1.56 KB 0644
_mode_cfb.py File 10.47 KB 0644
_mode_cfb.pyi File 727 B 0644
_mode_ctr.py File 15.44 KB 0644
_mode_ctr.pyi File 800 B 0644
_mode_eax.py File 14.11 KB 0644
_mode_eax.pyi File 1.51 KB 0644
_mode_ecb.py File 8.11 KB 0644
_mode_ecb.pyi File 592 B 0644
_mode_gcm.py File 20.8 KB 0644
_mode_gcm.pyi File 1.5 KB 0644
_mode_ocb.py File 19.47 KB 0644
_mode_ocb.pyi File 1.2 KB 0644
_mode_ofb.py File 9.97 KB 0644
_mode_ofb.pyi File 691 B 0644
_mode_openpgp.py File 6.89 KB 0644
_mode_openpgp.pyi File 556 B 0644
_mode_siv.py File 13.65 KB 0644
_mode_siv.pyi File 1.23 KB 0644
_pkcs1_decode.abi3.so File 34.85 KB 0755
_raw_aes.abi3.so File 104.3 KB 0755
_raw_aesni.abi3.so File 103.89 KB 0755
_raw_arc2.abi3.so File 45.38 KB 0755
_raw_blowfish.abi3.so File 76.8 KB 0755
_raw_cast.abi3.so File 56.06 KB 0755
_raw_cbc.abi3.so File 22.46 KB 0755
_raw_cfb.abi3.so File 26.23 KB 0755
_raw_ctr.abi3.so File 30.6 KB 0755
_raw_des.abi3.so File 69.88 KB 0755
_raw_des3.abi3.so File 70.82 KB 0755
_raw_ecb.abi3.so File 18.57 KB 0755
_raw_eksblowfish.abi3.so File 176.95 KB 0755
_raw_ocb.abi3.so File 44.78 KB 0755
_raw_ofb.abi3.so File 21.61 KB 0755