Server IP : 192.158.238.246 / Your IP : 18.117.232.234 Web Server : LiteSpeed System : Linux uniform.iwebfusion.net 4.18.0-553.27.1.lve.1.el8.x86_64 #1 SMP Wed Nov 20 15:58:00 UTC 2024 x86_64 User : jenniferflocom ( 1321) PHP Version : 8.1.32 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /opt/alt/python37/lib64/python3.7/site-packages/Crypto/Cipher/__pycache__/ |
Upload File : |
B o~�^k � @ sh d Z dZddlmZ ddlmZ G dd� dej�Zdd� Zd Zd Z dZ dZd ZdZ dZdZedd�ZdS )a� Blowfish symmetric cipher Blowfish_ is a symmetric block cipher designed by Bruce Schneier. It has a fixed data block size of 8 bytes and its keys can vary in length from 32 to 448 bits (4 to 56 bytes). Blowfish is deemed secure and it is fast. However, its keys should be chosen to be big enough to withstand a brute force attack (e.g. at least 16 bytes). As an example, encryption can be done as follows: >>> from Crypto.Cipher import Blowfish >>> from Crypto import Random >>> from struct import pack >>> >>> bs = Blowfish.block_size >>> key = b'An arbitrarily long key' >>> iv = Random.new().read(bs) >>> cipher = Blowfish.new(key, Blowfish.MODE_CBC, iv) >>> plaintext = b'docendo discimus ' >>> plen = bs - divmod(len(plaintext),bs)[1] >>> padding = [plen]*plen >>> padding = pack('b'*plen, *padding) >>> msg = iv + cipher.encrypt(plaintext + padding) .. _Blowfish: http://www.schneier.com/blowfish.html :undocumented: __revision__, __package__ z$Id$� )� blockalgo)� _Blowfishc @ s e Zd ZdZdd� ZdS )�BlowfishCipherzBlowfish cipher objectc O s t jj| t|f|�|� dS )zZInitialize a Blowfish cipher object See also `new()` at the module level.N)r � BlockAlgo�__init__r )�self�key�args�kwargs� r �I/opt/alt/python37/lib64/python3.7/site-packages/Crypto/Cipher/Blowfish.pyr = s zBlowfishCipher.__init__N)�__name__� __module__�__qualname__�__doc__r r r r r r : s r c O s t | f|�|�S )ae Create a new Blowfish cipher :Parameters: key : byte string The secret key to use in the symmetric cipher. Its length can vary from 4 to 56 bytes. :Keywords: mode : a *MODE_** constant The chaining mode to use for encryption or decryption. Default is `MODE_ECB`. IV : byte string The initialization vector to use for encryption or decryption. It is ignored for `MODE_ECB` and `MODE_CTR`. For `MODE_OPENPGP`, IV must be `block_size` bytes long for encryption and `block_size` +2 bytes for decryption (in the latter case, it is actually the *encrypted* IV which was prefixed to the ciphertext). It is mandatory. For all other modes, it must be `block_size` bytes longs. It is optional and when not present it will be given a default value of all zeroes. counter : callable (*Only* `MODE_CTR`). A stateful function that returns the next *counter block*, which is a byte string of `block_size` bytes. For better performance, use `Crypto.Util.Counter`. segment_size : integer (*Only* `MODE_CFB`).The number of bits the plaintext and ciphertext are segmented in. It must be a multiple of 8. If 0 or not specified, it will be assumed to be 8. :Return: a `BlowfishCipher` object )r )r r r r r r �newC s "r � � � � � � � � �9 N)r �__revision__Z Crypto.Cipherr r r r r ZMODE_ECBZMODE_CBCZMODE_CFBZMODE_PGPZMODE_OFBZMODE_CTRZMODE_OPENPGPZ block_size�rangeZkey_sizer r r r �<module>3 s %