U +Mb!@sTddlTddlmZmZmZmZddlmZmZm Z ddgZ d ddZ d ddZ dS) )*)DerNull DerSequence DerObjectIdDerOctetString)PBES1PBES2 PbesErrorwrapunwrapNc Csr|dkrt}tdtt||gt|g}|}|dkr@|S|sLtdt|}|dkr`d}t|||||S)a Wrap a private key into a PKCS#8 blob (clear or encrypted). Args: private_key (byte string): The private key encoded in binary form. The actual encoding is algorithm specific. In most cases, it is DER. key_oid (string): The object identifier (OID) of the private key to wrap. It is a dotted string, like ``1.2.840.113549.1.1.1`` (for RSA keys). passphrase (bytes string or string): The secret passphrase from which the wrapping key is derived. Set it only if encryption is required. protection (string): The identifier of the algorithm to use for securely wrapping the key. The default value is ``PBKDF2WithHMAC-SHA1AndDES-EDE3-CBC``. prot_params (dictionary): Parameters for the protection algorithm. +------------------+-----------------------------------------------+ | Key | Description | +==================+===============================================+ | iteration_count | The KDF algorithm is repeated several times to| | | slow down brute force attacks on passwords | | | (called *N* or CPU/memory cost in scrypt). | | | The default value for PBKDF2 is 1000. | | | The default value for scrypt is 16384. | +------------------+-----------------------------------------------+ | salt_size | Salt is used to thwart dictionary and rainbow | | | attacks on passwords. The default value is 8 | | | bytes. | +------------------+-----------------------------------------------+ | block_size | *(scrypt only)* Memory-cost (r). The default | | | value is 8. | +------------------+-----------------------------------------------+ | parallelization | *(scrypt only)* CPU-cost (p). The default | | | value is 1. | +------------------+-----------------------------------------------+ key_params (DER object): The algorithm parameters associated to the private key. It is required for algorithms like DSA, but not for others like RSA. randfunc (callable): Random number generation function; it should accept a single integer N and return a string of random data, N bytes long. If not specified, a new RNG will be instantiated from :mod:`Crypto.Random`. Return: The PKCS#8-wrapped private key (possibly encrypted), as a byte string. NrzEmpty passphrasez"PBKDF2WithHMAC-SHA1AndDES-EDE3-CBC) rrrrencode ValueErrortobytesrencrypt) private_keyZkey_oid passphraseZ protectionZ prot_paramsZ key_paramsZrandfuncpk_infoZ pk_info_derr6/tmp/pip-target-t616c12r/lib/python/Crypto/IO/PKCS8.pyr 2s.; c Cs|rt|}d}zt||}d}WnDtk rR}zdt|}W5d}~XYntk rhd}YnX|szt||}d}WnLtk r}z|dt|7}W5d}~XYntk r|d7}YnX|std|tj|d d }t |d kr |s td |d d kr"tdtj|ddd }t |d j }t |dkr\d}n.zt |dd}Wn|d}YnXt |d j} || |fS)aHUnwrap a private key from a PKCS#8 blob (clear or encrypted). Args: p8_private_key (byte string): The private key wrapped into a PKCS#8 blob, DER encoded. passphrase (byte string or string): The passphrase to use to decrypt the blob (if it is encrypted). Return: A tuple containing #. the algorithm identifier of the wrapped key (OID, dotted string) #. the private key (byte string, DER encoded) #. the associated parameters (byte string, DER encoded) or ``None`` Raises: ValueError : if decoding fails FTz PBES1[%s]NzPBES1[Invalid]z ,PBES2[%s]z,PBES2[Invalid]zError decoding PKCS#8 (%s)))Z nr_elementsrz;Not a valid clear PKCS#8 structure (maybe it is encrypted?)rz#Not a valid PrivateKeyInfo SEQUENCE)rr)rrdecryptr strr rrdecodelenrvaluerrpayload) Zp8_private_keyrfoundeZ error_strralgoZalgo_oidZ algo_paramsrrrrr sH      )NNNNN)N) ZCrypto.Util.py3compatZCrypto.Util.asn1rrrrZCrypto.IO._PBESrrr __all__r r rrrr#s ^