U +Mbb@sdZddlZddlmZddlmZddlmZmZm Z m Z m Z eddZ dd Z d d Zd Zd ZdZdZdZdZdZdZeddZdS)a Module's constants for the modes of operation supported with ARC2: :var MODE_ECB: :ref:`Electronic Code Book (ECB) ` :var MODE_CBC: :ref:`Cipher-Block Chaining (CBC) ` :var MODE_CFB: :ref:`Cipher FeedBack (CFB) ` :var MODE_OFB: :ref:`Output FeedBack (OFB) ` :var MODE_CTR: :ref:`CounTer Mode (CTR) ` :var MODE_OPENPGP: :ref:`OpenPGP Mode ` :var MODE_EAX: :ref:`EAX Mode ` N)_create_cipher) byte_string)load_pycryptodome_raw_lib VoidPointer SmartPointerc_size_t c_uint8_ptrzCrypto.Cipher._raw_arc2a? int ARC2_start_operation(const uint8_t key[], size_t key_len, size_t effective_key_len, void **pResult); int ARC2_encrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int ARC2_decrypt(const void *state, const uint8_t *in, uint8_t *out, size_t data_len); int ARC2_stop_operation(void *state); cCsz|d}Wntk r*tdYnX|dd}t|tkrTtdt|d|krhdksvntd|tj}tj}t }|t |t t|t || }|rtd|t ||S) z}This method instantiates and returns a handle to a low-level base cipher. It will absorb named parameters in the process.keyzMissing 'key' parametereffective_keyleniz$Incorrect ARC2 key length (%d bytes)(zH'effective_key_len' must be at least 40 and no larger than 1024 (not %d)z,Error %X while instantiating the ARC2 cipher)popKeyError TypeErrorlenkey_size ValueError _raw_arc2_libZARC2_start_operationZARC2_stop_operationrrrZ address_ofrget)Zdict_parametersr r Zstart_operationZstop_operationcipherresultr9/tmp/pip-target-t616c12r/lib/python/Crypto/Cipher/ARC2.py_create_base_cipher>s0   rcOsttjt||f||S)a Create a new RC2 cipher. :param key: The secret key to use in the symmetric cipher. Its length can vary from 5 to 128 bytes; the actual search space (and the cipher strength) can be reduced with the ``effective_keylen`` parameter. :type key: bytes, bytearray, memoryview :param mode: The chaining mode to use for encryption or decryption. :type mode: One of the supported ``MODE_*`` constants :Keyword Arguments: * **iv** (*bytes*, *bytearray*, *memoryview*) -- (Only applicable for ``MODE_CBC``, ``MODE_CFB``, ``MODE_OFB``, and ``MODE_OPENPGP`` modes). The initialization vector to use for encryption or decryption. For ``MODE_CBC``, ``MODE_CFB``, and ``MODE_OFB`` it must be 8 bytes long. For ``MODE_OPENPGP`` mode only, it must be 8 bytes long for encryption and 10 bytes for decryption (in the latter case, it is actually the *encrypted* IV which was prefixed to the ciphertext). If not provided, a random byte string is generated (you must then read its value with the :attr:`iv` attribute). * **nonce** (*bytes*, *bytearray*, *memoryview*) -- (Only applicable for ``MODE_EAX`` and ``MODE_CTR``). A value that must never be reused for any other encryption done with this key. For ``MODE_EAX`` there are no restrictions on its length (recommended: **16** bytes). For ``MODE_CTR``, its length must be in the range **[0..7]**. If not provided for ``MODE_EAX``, a random byte string is generated (you can read it back via the ``nonce`` attribute). * **effective_keylen** (*integer*) -- Optional. Maximum strength in bits of the actual key used by the ARC2 algorithm. If the supplied ``key`` parameter is longer (in bits) of the value specified here, it will be weakened to match it. If not specified, no limitation is applied. * **segment_size** (*integer*) -- (Only ``MODE_CFB``).The number of **bits** the plaintext and ciphertext are segmented in. It must be a multiple of 8. If not specified, it will be assumed to be 8. * **mac_len** : (*integer*) -- (Only ``MODE_EAX``) Length of the authentication tag, in bytes. It must be no longer than 8 (default). * **initial_value** : (*integer*) -- (Only ``MODE_CTR``). The initial value for the counter within the counter block. By default it is **0**. :Return: an ARC2 object, of the applicable mode. )rsysmodules__name__)r modeargskwargsrrrnew_sCr )__doc__rZ Crypto.CipherrZCrypto.Util.py3compatrZCrypto.Util._raw_apirrrrrrrrZMODE_ECBZMODE_CBCZMODE_CFBZMODE_OFBZMODE_CTRZ MODE_OPENPGPZMODE_EAX block_sizerangerrrrrs&   !E