o
    »­§iX/  ã                   @   sp   d dl mZmZ d dlZd dlmZ d dlmZ d dlm	Z	m
Z
mZ G dd„ deje
ƒZG dd	„ d	eje
ƒZdS )
é    )ÚClassVarÚOptionalN)Úencoding)Ú
exceptions)ÚEncryptedMessageÚStringFixerÚrandomc                	   @   sÚ   e Zd ZU dZejjZee	 e
d< ejjZee	 e
d< ejjZee	 e
d< ejjZee	 e
d< ejfdedejfdd	„Zd
efdd„Zdejfdedee dejd
efdd„Zdejfdedee dejd
efdd„ZdS )Ú	SecretBoxuS  
    The SecretBox class encrypts and decrypts messages using the given secret
    key.

    The ciphertexts generated by :class:`~nacl.secret.Secretbox` include a 16
    byte authenticator which is checked as part of the decryption. An invalid
    authenticator will cause the decrypt function to raise an exception. The
    authenticator is not a signature. Once you've decrypted the message you've
    demonstrated the ability to create arbitrary valid message, so messages you
    send are repudiable. For non-repudiable messages, sign them after
    encryption.

    Encryption is done using `XSalsa20-Poly1305`_, and there are no practical
    limits on the number or size of messages (up to 2â¶â´ messages, each up to 2â¶â´
    bytes).

    .. _XSalsa20-Poly1305: https://doc.libsodium.org/secret-key_cryptography/secretbox#algorithm-details

    :param key: The secret key used to encrypt and decrypt messages
    :param encoder: The encoder class used to decode the given key

    :cvar KEY_SIZE: The size that the key is required to be.
    :cvar NONCE_SIZE: The size that the nonce is required to be.
    :cvar MACBYTES: The size of the authentication MAC tag in bytes.
    :cvar MESSAGEBYTES_MAX: The maximum size of a message which can be
                            safely encrypted with a single key/nonce
                            pair.
    ÚKEY_SIZEÚ
NONCE_SIZEÚMACBYTESÚMESSAGEBYTES_MAXÚkeyÚencoderc                 C   óF   |  |¡}t|tƒst d¡‚t|ƒ| jkrt d| j ¡‚|| _d S )Nz'SecretBox must be created from 32 bytesú%The key must be exactly %s bytes long©	ÚdecodeÚ
isinstanceÚbytesÚexcÚ	TypeErrorÚlenr
   Ú
ValueErrorÚ_key©Úselfr   r   © r   úB/home/app/Keep/.python/lib/python3.10/site-packages/nacl/secret.pyÚ__init__;   s   


ÿ
zSecretBox.__init__Úreturnc                 C   ó   | j S ©N©r   ©r   r   r   r   Ú	__bytes__I   ó   zSecretBox.__bytes__NÚ	plaintextÚnoncec                 C   sn   |du r	t | jƒ}t|ƒ| jkrt d| j ¡‚tj ||| j¡}| 	|¡}| 	|¡}t
 ||| 	|| ¡¡S )aL  
        Encrypts the plaintext message using the given `nonce` (or generates
        one randomly if omitted) and returns the ciphertext encoded with the
        encoder.

        .. warning:: It is **VITALLY** important that the nonce is a nonce,
            i.e. it is a number used only once for any given key. If you fail
            to do this, you compromise the privacy of the messages encrypted.
            Give your nonces a different prefix, or have one side use an odd
            counter and one an even counter. Just make sure they are different.

        :param plaintext: [:class:`bytes`] The plaintext message to encrypt
        :param nonce: [:class:`bytes`] The nonce to use in the encryption
        :param encoder: The encoder to use to encode the ciphertext
        :rtype: [:class:`nacl.utils.EncryptedMessage`]
        Nú'The nonce must be exactly %s bytes long)r   r   r   r   r   ÚnaclÚbindingsZcrypto_secretbox_easyr   Úencoder   Ú_from_parts)r   r'   r(   r   Ú
ciphertextÚencoded_nonceÚencoded_ciphertextr   r   r   ÚencryptL   s    
ÿÿ

ýzSecretBox.encryptr.   c                 C   sb   |  |¡}|du r|d| j… }|| jd… }t|ƒ| jkr&t d| j ¡‚tj ||| j¡}|S ©aá  
        Decrypts the ciphertext using the `nonce` (explicitly, when passed as a
        parameter or implicitly, when omitted, as part of the ciphertext) and
        returns the plaintext message.

        :param ciphertext: [:class:`bytes`] The encrypted message to decrypt
        :param nonce: [:class:`bytes`] The nonce used when encrypting the
            ciphertext
        :param encoder: The encoder used to decode the ciphertext.
        :rtype: [:class:`bytes`]
        Nr)   )	r   r   r   r   r   r*   r+   Zcrypto_secretbox_open_easyr   )r   r.   r(   r   r'   r   r   r   Údecryptw   s   
ÿÿzSecretBox.decrypt)Ú__name__Ú
__module__Ú__qualname__Ú__doc__r*   r+   Zcrypto_secretbox_KEYBYTESr
   r   ÚintÚ__annotations__Zcrypto_secretbox_NONCEBYTESr   Zcrypto_secretbox_MACBYTESr   Z!crypto_secretbox_MESSAGEBYTES_MAXr   r   Ú
RawEncoderr   ÚEncoderr   r%   r   r   r1   r3   r   r   r   r   r	      sH   
 ÿÿÿ
ÿüþýü
û.üþýüûr	   c                   @   s´   e Zd ZdZejjZejjZ	ejj
ZejjZejfdedejfdd„Zdefdd„Zd	d
ejfdededee dejdef
dd„Zd	d
ejfdededee dejdef
dd„Zd
S )ÚAeaduñ  
    The AEAD class encrypts and decrypts messages using the given secret key.

    Unlike :class:`~nacl.secret.SecretBox`, AEAD supports authenticating
    non-confidential data received alongside the message, such as a length
    or type tag.

    Like :class:`~nacl.secret.Secretbox`, this class provides authenticated
    encryption. An inauthentic message will cause the decrypt function to raise
    an exception.

    Likewise, the authenticator should not be mistaken for a (public-key)
    signature: recipients (with the ability to decrypt messages) are capable of
    creating arbitrary valid message; in particular, this means AEAD messages
    are repudiable. For non-repudiable messages, sign them after encryption.

    The cryptosystem used is `XChacha20-Poly1305`_ as specified for
    `standardization`_. There are `no practical limits`_ to how much can safely
    be encrypted under a given key (up to 2â¶â´ messages each containing up
    to 2â¶â´ bytes).

    .. _standardization: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha
    .. _XChacha20-Poly1305: https://doc.libsodium.org/secret-key_cryptography/aead#xchacha-20-poly1305
    .. _no practical limits: https://doc.libsodium.org/secret-key_cryptography/aead#limitations

    :param key: The secret key used to encrypt and decrypt messages
    :param encoder: The encoder class used to decode the given key

    :cvar KEY_SIZE: The size that the key is required to be.
    :cvar NONCE_SIZE: The size that the nonce is required to be.
    :cvar MACBYTES: The size of the authentication MAC tag in bytes.
    :cvar MESSAGEBYTES_MAX: The maximum size of a message which can be
                            safely encrypted with a single key/nonce
                            pair.
    r   r   c                 C   r   )Nz"AEAD must be created from 32 bytesr   r   r   r   r   r   r   È   s   


ÿ
zAead.__init__r    c                 C   r!   r"   r#   r$   r   r   r   r%   Ø   r&   zAead.__bytes__ó    Nr'   Úaadr(   c                 C   sp   |du r	t | jƒ}t|ƒ| jkrt d| j ¡‚tj |||| j¡}| 	|¡}| 	|¡}t
 ||| 	|| ¡¡S )a@  
        Encrypts the plaintext message using the given `nonce` (or generates
        one randomly if omitted) and returns the ciphertext encoded with the
        encoder.

        .. warning:: It is vitally important for :param nonce: to be unique.
            By default, it is generated randomly; [:class:`Aead`] uses XChacha20
            for extended (192b) nonce size, so the risk of reusing random nonces
            is negligible.  It is *strongly recommended* to keep this behaviour,
            as nonce reuse will compromise the privacy of encrypted messages.
            Should implicit nonces be inadequate for your application, the
            second best option is using split counters; e.g. if sending messages
            encrypted under a shared key between 2 users, each user can use the
            number of messages it sent so far, prefixed or suffixed with a 1bit
            user id.  Note that the counter must **never** be rolled back (due
            to overflow, on-disk state being rolled back to an earlier backup,
            ...)

        :param plaintext: [:class:`bytes`] The plaintext message to encrypt
        :param nonce: [:class:`bytes`] The nonce to use in the encryption
        :param encoder: The encoder to use to encode the ciphertext
        :rtype: [:class:`nacl.utils.EncryptedMessage`]
        Nr)   )r   r   r   r   r   r*   r+   Z*crypto_aead_xchacha20poly1305_ietf_encryptr   r,   r   r-   )r   r'   r>   r(   r   r.   r/   r0   r   r   r   r1   Û   s    
ÿ
ÿ

ýzAead.encryptr.   c                 C   sd   |  |¡}|du r|d| j… }|| jd… }t|ƒ| jkr&t d| j ¡‚tj |||| j¡}|S r2   )	r   r   r   r   r   r*   r+   Z*crypto_aead_xchacha20poly1305_ietf_decryptr   )r   r.   r>   r(   r   r'   r   r   r   r3     s   
ÿ
ÿzAead.decrypt)r4   r5   r6   r7   r*   r+   Z+crypto_aead_xchacha20poly1305_ietf_KEYBYTESr
   Z,crypto_aead_xchacha20poly1305_ietf_NPUBBYTESr   Z)crypto_aead_xchacha20poly1305_ietf_ABYTESr   Z3crypto_aead_xchacha20poly1305_ietf_MESSAGEBYTES_MAXr   r   r:   r   r;   r   r%   r   r   r1   r3   r   r   r   r   r<   œ   sT    $ÿýþ
ýûþýüû
ú6ûþýüûúr<   )Útypingr   r   Znacl.bindingsr*   r   r   r   Z
nacl.utilsr   r   r   Z	Encodabler	   r<   r   r   r   r   Ú<module>   s    