Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.221.59.242
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python2.7 /
site-packages /
passlib /
utils /
[ HOME SHELL ]
Name
Size
Permission
Action
compat
[ DIR ]
drwxr-xr-x
__init__.py
36
KB
-rw-r--r--
__init__.pyc
30.42
KB
-rw-r--r--
__init__.pyo
30.05
KB
-rw-r--r--
binary.py
30.69
KB
-rw-r--r--
binary.pyc
24.15
KB
-rw-r--r--
binary.pyo
23.76
KB
-rw-r--r--
decor.py
7.47
KB
-rw-r--r--
decor.pyc
7.94
KB
-rw-r--r--
decor.pyo
7.94
KB
-rw-r--r--
des.py
2.11
KB
-rw-r--r--
des.pyc
1.54
KB
-rw-r--r--
des.pyo
1.54
KB
-rw-r--r--
handlers.py
101.77
KB
-rw-r--r--
handlers.pyc
77.22
KB
-rw-r--r--
handlers.pyo
75.71
KB
-rw-r--r--
md4.py
1.19
KB
-rw-r--r--
md4.pyc
790
B
-rw-r--r--
md4.pyo
790
B
-rw-r--r--
pbkdf2.py
6.67
KB
-rw-r--r--
pbkdf2.pyc
5.97
KB
-rw-r--r--
pbkdf2.pyo
5.97
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pbkdf2.pyo
� � 5Xc @ s d Z d d l m Z d d l Z e j e � Z d d l m Z d d l m Z d d l m Z d d l m Z m Z m Z m Z m Z d d d d g Z d d l m Z e d e � e d d d d d e d d � e � Z i a d Z d � Z d d d � Z d d d � Z d S( s� passlib.pbkdf2 - PBKDF2 support this module is getting increasingly poorly named. maybe rename to "kdf" since it's getting more key derivation functions added. i����( t divisionN( t ExpectedTypeError( t deprecated_function( t native_string_types( t norm_hash_namet lookup_hasht pbkdf1t pbkdf2_hmact compile_hmacR t get_prfR t pbkdf2( t warns� the module 'passlib.utils.pbkdf2' is deprecated as of Passlib 1.7, and will be removed in Passlib 2.0, please use 'passlib.crypto' insteadt deprecateds 1.7t removeds 1.8t func_modulet replacements$ passlib.crypto.digest.norm_hash_namet hmac_s hmac-c s� | t k r t | St | t � r | j t � sH t d | f � � n t | d � j � � f d � } | | j j f } nB t | � r� t | d d � � } | | f } n t | d d � � | t | <| S( s Lookup pseudo-random family (PRF) by name. :arg name: This must be the name of a recognized prf. Currently this only recognizes names with the format :samp:`hmac-{digest}`, where :samp:`{digest}` is the name of a hash function such as ``md5``, ``sha256``, etc. todo: restore text about callables. :raises ValueError: if the name is not known :raises TypeError: if the name is not a callable or string :returns: a tuple of :samp:`({prf_func}, {digest_size})`, where: * :samp:`{prf_func}` is a function implementing the specified PRF, and has the signature ``prf_func(secret, message) -> digest``. * :samp:`{digest_size}` is an integer indicating the number of bytes the function returns. Usage example:: >>> from passlib.utils.pbkdf2 import get_prf >>> hmac_sha256, dsize = get_prf("hmac-sha256") >>> hmac_sha256 <function hmac_sha256 at 0x1e37c80> >>> dsize 32 >>> digest = hmac_sha256('password', 'message') .. deprecated:: 1.7 This function is deprecated, and will be removed in Passlib 2.0. This only related replacement is :func:`passlib.crypto.digest.compile_hmac`. s unknown prf algorithm: %ri c s t � | � | � S( N( R ( t keyt msg( t digest( s8 /usr/lib/python2.7/site-packages/passlib/utils/pbkdf2.pyt hmach s t xt ys str or callables prf name( t _prf_cachet isinstanceR t startswitht _HMAC_PREFIXESt ValueErrorR t namet digest_infot digest_sizet callablet lenR ( R R t recordR ( ( R s8 /usr/lib/python2.7/site-packages/passlib/utils/pbkdf2.pyR 9 s ) t sha1c C s t | | | | | � S( sL pkcs#5 password-based key derivation v1.5 :arg secret: passphrase to use to generate key :arg salt: salt string to use when generating key :param rounds: number of rounds to use to generate key :arg keylen: number of bytes to generate (if ``None``, uses digest's native size) :param hash: hash function to use. must be name of a hash recognized by hashlib. :returns: raw bytes of generated key .. note:: This algorithm has been deprecated, new code should use PBKDF2. Among other limitations, ``keylen`` cannot be larger than the digest size of the specified hash. .. deprecated:: 1.7 This has been relocated to :func:`passlib.crypto.digest.pbkdf1`, and this version will be removed in Passlib 2.0. *Note the call signature has changed.* ( t _pbkdf1( t secrett saltt roundst keylent hash( ( s8 /usr/lib/python2.7/site-packages/passlib/utils/pbkdf2.pyR w s s hmac-sha1c C sZ t | � s+ t | t � r: | j t � r: t d � � n | d } t | | | | | � S( sW pkcs#5 password-based key derivation v2.0 :arg secret: passphrase to use to generate key :arg salt: salt string to use when generating key :param rounds: number of rounds to use to generate key :arg keylen: number of bytes to generate. if set to ``None``, will use digest size of selected prf. :param prf: psuedo-random family to use for key strengthening. this must be a string starting with ``"hmac-"``, followed by the name of a known digest. this defaults to ``"hmac-sha1"`` (the only prf explicitly listed in the PBKDF2 specification) .. rst-class:: warning .. versionchanged 1.7: This argument no longer supports arbitrary PRF callables -- These were rarely / never used, and created too many unwanted codepaths. :returns: raw bytes of generated key .. deprecated:: 1.7 This has been deprecated in favor of :func:`passlib.crypto.digest.pbkdf2_hmac`, and will be removed in Passlib 2.0. *Note the call signature has changed.* s1 non-HMAC prfs are not supported as of Passlib 1.7i ( R R R R R t NotImplementedErrorR ( R$ R% R&