GIF89a=( õ' 7IAXKgNgYvYx\%wh…hŽth%ˆs%—x¨}9®Œ©€&©‰%¶†(¹–.¹5·œD¹&Çš)ÇŸ5ǘ;Í£*È¡&Õ²)ׯ7×µ<Ñ»4ï°3ø‘HÖ§KͯT÷¨Yÿšqÿ»qÿÔFØ !ù ' !ÿ NETSCAPE2.0 , =( þÀ“pH,È¤rÉl:ŸÐ¨tJ­Z¯Ø¬vËíz¿à°xL.›Ïè´zÍn»ßð¸|N¯Ûïø¼~Ïïûÿ€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§gª«ªE¯°¨¬ª±²Œ¹º¹E¾­”´ÂB¶¯ §Åȸ»ÑD¾¿Á•ÄÅ®° ÝH¾ÒLÀÆDÙ«D¶BÝïðÀ¾DÑÑÔTÌÍíH òGö¨A RÎڐ |¥ ٭&ºìE8œ¹kGÔAÞpx­a¶­ã R2XB®åE8I€Õ6Xî:vT)äžþÀq¦è³¥ì仕F~%xñ  4#ZÔ‰O|-4Bs‘X:= QÉ œš lºÒyXJŠGȦ|s hÏíK–3l7·B|¥$'7Jީܪ‰‡àá”Dæn=Pƒ ¤Òëí‰`䌨ljóá¯Éüv>á–Á¼5 ½.69ûϸd«­ºÀûnlv©‹ªîf{¬ÜãPbŸ  l5‘ޝpß ´ ˜3aÅùäI«O’ý·‘áÞ‡˜¾Æ‚ÙÏiÇÿ‹Àƒ #öó)pâš Þ½ ‘Ý{ó)vmÞü%D~ 6f s}ŃƒDØW Eþ`‡þ À…L8xá†ç˜{)x`X/> Ì}mø‚–RØ‘*|`D=‚Ø_ ^ð5 !_…'aä“OÚ—7âcð`D”Cx`ÝÂ¥ä‹éY¹—F¼¤¥Š?¡Õ™ n@`} lď’ÄÉ@4>ñd œ à‘vÒxNÃ×™@žd=ˆgsžG±æ ´²æud &p8Qñ)ˆ«lXD©øÜéAžHìySun jª×k*D¤LH] †¦§C™Jä–´Xb~ʪwStŽ6K,°£qÁœ:9ت:¨þªl¨@¡`‚ûÚ ».Û¬¯t‹ÆSÉ[:°=Š‹„‘Nåû”Ìî{¿ÂA ‡Rà›ÀÙ6úë°Ÿð0Ä_ ½;ÃϱîÉì^ÇÛÇ#Ëë¼ôº!±Ä˜íUîÅÇ;0L1óÁµö«p% AÀºU̬ݵ¼á%霼€‡¯Á~`ÏG¯»À× ­²± =4ªnpð3¾¤³¯­ü¾¦îuÙuµÙ®|%2ÊIÿür¦#0·ÔJ``8È@S@5ê¢ ö×Þ^`8EÜ]ý.뜃Âç 7 ú ȉÞj œ½Dç zý¸iþœÑÙûÄë!ˆÞÀl§Ïw‹*DçI€nEX¯¬¼ &A¬Go¼QföõFç°¯;é¦÷îŽêJ°îúôF5¡ÌQ|îúöXªæ»TÁÏyñêï]ê² o óÎC=öõ›ÒÓPB@ D×½œä(>èCÂxŽ`±«Ÿ–JЀ»Û á¤±p+eE0`ëŽ`A Ú/NE€Ø†À9‚@¤à H½7”à‡%B‰`Àl*ƒó‘–‡8 2ñ%¸ —€:Ù1Á‰E¸àux%nP1ð!‘ðC)¾P81lÑɸF#ˆ€{´âé°ÈB„0>±û °b¡Š´±O‚3È–Ù()yRpbµ¨E.Z‘D8ÊH@% òŒx+%Ù˜Æcü »¸˜fõ¬b·d`Fê™8èXH"ÉÈ-±|1Ô6iI, 2““¬$+](A*jÐ QTÂo‰.ÛU슬Œã„Ž`¯SN¡–¶Äåyše¯ª’­¬‚´b¦Éož œ)åyâ@Ì®3 ÎtT̉°&Ø+žLÀf"Ø-|žçÔ>‡Ðv¦Ðžì\‚ Q1)Ž@Žh#aP72”ˆ™¨$‚ !ù " , =( …7IAXG]KgNgYvYxR"k\%w]'}hŽth%ˆg+ˆs%—r.—m3šx3˜x¨}9®€&©€+¨‡7§‰%¶†(¹–.¹œD¹&ǘ;Í•&ײ)×»4ïÌ6ò§KÍ þ@‘pH,È¤rÉl:ŸÐ¨tJ­Z¯Ø¬vËíz¿à°xL.›Ïè´zÍn»ßð¸|N¯Ûïø¼~Ïïûÿ€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§g «¬ E ±± ¨­¶°ººE Á´”·®C¬²§Ç¶Œ»ÓDÃÕƷ¯Ê±H½ºM×ÁGÚ¬D¶BËÁ½î½DÓôTÏÛßîG»ôõC×CÌ l&âž:'òtU³6ɹ#·Ø)€'Ü.6±&ëÍÈ» K(8p0N?!æ2"ÛˆNIJX>R¼ÐO‚M '¡¨2¸*Ÿþ>#n↠å@‚<[:¡Iïf’ ¤TÚ˘CdbÜÙ“[«ŽEú5MBo¤×@€`@„€Êt W-3 ¶Ÿ¡BíêäjIÝ…Eò9[T…$íêﯧ„…•s»Óȳ¹€ÅÚdc®UUρ#±Ùïldj?´í¼²`\ŽÁðÞu|3'ÖŒ]ë6 ¶S#²‡˜FKLÈ *N E´‘áäŠ$˜›eÄYD„ºq«.è촁ƒs \-ÔjA 9²õ÷å- üúM[Âx(ís÷ì®x€|í¡Ù’p¦‚ ŽkÛTÇDpE@WÜ ²Ç]kŠ1¨ þ€·Yb ÓÁ‰l°*n0 ç™—žzBdОu¾7ĉBl€â‰-ºx~|UåU‰  h*Hœ|e"#"?vpÄiŠe6^ˆ„+qâŠm8 #VÇá ‘å–ÄV„œ|Аè•m"сœn|@›U¶ÆÎž—Špb¥G¨ED”€±Úê2FÌIç? >Éxå Œ± ¡¤„%‘žjŸ‘ꄯ<Ìaà9ijÐ2˜D¦È&›†Z`‚å]wþ¼Â:ç6àB¤7eFJ|õÒ§Õ,¨äàFÇ®cS·Ê¶+B°,‘Þ˜ºNûãØ>PADÌHD¹æž«ÄÀnÌ¥}­#Ë’ë QÀÉSÌÂÇ2ÌXÀ{æk²lQÁ2«ÊðÀ¯w|2Í h‹ÄÂG€,m¾¶ë3ÐÙ6-´ÅE¬L°ÆIij*K½ÀÇqï`DwVÍQXœÚÔpeœ±¬Ñ q˜§Tœ½µƒ°Œìu Â<¶aØ*At¯lmEØ ü ôÛN[P1ÔÛ¦­±$ÜÆ@`ùåDpy¶yXvCAyåB`ŽD¶ 0QwG#¯ æš[^Äþ $ÀÓÝǦ{„L™[±úKÄgÌ;ï£S~¹ìGX.ôgoT.»åˆ°ùŸûù¡?1zö¦Ÿž:ÅgÁ|ìL¹ „®£œŠ‚à0œ]PÁ^p F<"•ç?!,ñ‡N4—…PÄ Á„ö¨Û:Tè@hÀ‹%táÿ:ø-žI<`þ‹p I….)^ 40D#p@ƒj4–؀:²‰1Øâr˜¼F2oW¼#Z†;$Q q” ‘ ÂK¦ñNl#29 !’F@¥Bh·ᏀL!—XFóLH‘Kh¤.«hE&JòG¨¥<™WN!€ÑÙÚˆY„@†>Œž19J" 2,/ &.GXB%ÌRÈ9B6¹W]’î×ÔW¥’IÎ$ ñ‹ÓŒE8YÆ ¼³™ñA5“à®Q.aŸB€&Ø©³ JÁ—! ¦t)K%tœ-¦JF bòNMxLôþ)ÐR¸Ð™‘ èÝ6‘O!THÌ„HÛ ‰ !ù ) , =( …AXKgNgYvYxR"k\%wh…hŽh%ˆg+ˆs%—r.—x3˜x¨}9®€&©€+¨Œ,©‡7§‰%¶†(¹–.¹5·&Çš)ǘ;Í•&×£*Ȳ)ׯ7×»4ï°3øÌ6ò‘HÖ§KÍ»Hó¯T÷¨Yÿ»qÿÇhÿ þÀ”pH,È¤rÉl:ŸÐ¨tJ­Z¯Ø¬vËíz¿à°xL.›Ïè´zÍn»ßð¸|N¯Ûïø¼~Ïïûÿ€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§g ª« E$±²¨ª­ · °²½$E$ÂÕ««D· Í ¿¦Ç¶¸ÌŒ¾³CÃÅÆ E ééH½MÛÂGâªD­ çBêêϾD²ÒaÀà€Š1r­ðÓ¤ ÔožzU!L˜C'¾yW½UGtäÇïÙllê0×àÂuGþ)AÀs[þ·xì ÁxO%ƒûX2ó—  P£n›R/¡ÑšHše+êDm?# —‘Ç£6¡8íJ¡ŸâDiäªM¥Ö„ôj“¬¹£5oQ7°- <‡ *´lãÓŒ2r/a!l)dÈ A™ÈE¢ôÔ͆…ð ;Ö˜c ¡%ß‚’Ùˆâ¸b½—pe~C"BíëÚHïeF2§æŠ8qb t_`urŠeü wÅu3êæPv§h•"ß`íÍxçLĹÜÖ3á  ~Öº“®›¸ÏMDfJÙ °„ÛµáWõ%§œ‚à©–‚X ÓØ)@®Ñ›Eþ´wëuÅSxb8y\mÖzœ¥§ZbºE—ÂLªÌw!y(>¡™wú=Ç|ÅÝs¢d €CÁW)HÜcC$€L Ä7„r.á\{)@ð` @ äXÈ$PD” `šaG:§æˆOˆ72EÐamn]ù"ŒcÊxÑŒ° &dR8`g«iÙŸLR!¦P …d’ä¡“¦ðÎTƒ¦ià|À _ ¥ Qi#¦Šg›Æ ›noMµ ›V ã£)p ç£ÎW…š=Âeªk§†j„ ´®1ß²sÉxéW«jšl|0¯B0Û, \jÛ´›6±¬¶C ÛíWþï|ëÙ‹¸ñzĸV {ì;Ýñn¼òVˆm³I¼³.Ðã¤PN¥ ²µ¼„µCã+¹ÍByî£Ñ¾HŸ›ëê 7ìYÆFTk¨SaoaY$Dµœìï¿Ã29RÈkt Çïfñ ÇÒ:ÀÐSp¹3ÇI¨â¥DZÄ ü9Ïýögñ½­uÔ*3)O‘˜Ö[_hv ,àî×Et Ÿé¶BH€ Õ[ü±64M@ÔSÌM7dÐl5-ÄÙU܍´©zߌ3Ô€3ž„ „ ¶ÛPô½5×g› êÚ˜kN„Ý…0Îj4€Ìë°“#{þÕ3S2çKÜ'ợlø¼Ú2K{° {Û¶?žm𸧠ËI¼nEò='êüóºè^üæÃ_Û=°óž‚ì#Oý¿Í'¡½áo..ÏYìnüñCœO±Áa¿¢Kô½o,üÄËbö²çºíï{ËC Ú— "”Ï{ËK ÍÒw„õ±Oz dÕ¨à:$ ƒô—«v»] A#ð «€¿šéz)Rx׿ˆ¥‚d``èw-îyÏf×K!ð€þ­Ð|ìPľ„=Ì`ý(f” 'Pa ¥ÐBJa%Ðâf§„%Š¡}FàáÝ×6>ÉäŠG"éŽè=ø!oа^FP¼Ø©Q„ÀCÙÁ`(Ž\ÄÝ® ©Â$<n@dÄ E#ììUÒI! ‚#lù‹`k¦ÐÇ'Rró’ZýNBÈMF Í[¤+‹ðɈ-áwj¨¥þ8¾rá ,VÂh„"|½œ=×G_¦Ñ™EØ 0i*%̲˜Æda0mV‚k¾)›;„&6 p>ÓjK “¦Ç# âDÂ:ûc?:R Ó¬fÞéI-Ì“•Ã<ä=™Ï7˜3œ¨˜c2ŒW ,ˆ”8(T™P‰F¡Jhç"‚ ; 403WebShell
403Webshell
Server IP : 172.67.177.218  /  Your IP : 216.73.216.66
Web Server : LiteSpeed
System : Linux premium229.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
User : akhalid ( 749)
PHP Version : 8.3.22
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /opt/imunify360/venv/lib/python3.11/site-packages/Crypto/Signature/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /opt/imunify360/venv/lib/python3.11/site-packages/Crypto/Signature/__pycache__/DSS.cpython-311.pyc
�

��h�;����ddlmZddlmZddlmZddlmZddlm	Z	ddl
mZddgZGd	�de
��ZGd
�de��ZGd�d
e��ZGd�de��Zdd�ZdS)�)�DerSequence)�
long_to_bytes)�Integer)�HMAC)�EccKey)�DsaKey�DssSigScheme�newc�6�eZdZdZd�Zd�Zd�Zd�Zd�Zd�Z	dS)	r	zkA (EC)DSA signature object.
    Do not instantiate directly.
    Use :func:`Crypto.Signature.DSS.new`.
    c��||_||_||_|j���|_|jdz
dzdz|_dS)z�Create a new Digital Signature Standard (DSS) object.

        Do not instantiate this object directly,
        use `Crypto.Signature.DSS.new` instead.
        ��N)�_key�	_encoding�_order�size_in_bits�_order_bits�_order_bytes)�self�key�encoding�orders    �v/builddir/build/BUILD/imunify360-venv-2.5.2/opt/imunify360/venv/lib64/python3.11/site-packages/Crypto/Signature/DSS.py�__init__zDssSigScheme.__init__3sO����	�!�������;�3�3�5�5���!�-��1�a�7�!�;�����c�4�|j���S)zRReturn ``True`` if this signature object can be used
        for signing messages.)r�has_private)rs r�can_signzDssSigScheme.can_signAs���y�$�$�&�&�&rc� �td����NzTo be provided by subclasses��NotImplementedError�r�msg_hashs  r�_compute_noncezDssSigScheme._compute_nonceG���!�"@�A�A�Arc� �td���r r!r#s  r�_valid_hashzDssSigScheme._valid_hashJr&rc����j���std�����|��st	d�����|��}t
j|���d�j	���}�j�
||��}�jdkr"d��fd�|D����}n!t|�����}|S)aCompute the DSA/ECDSA signature of a message.

        Args:
          msg_hash (hash object):
            The hash that was carried out over the message.
            The object belongs to the :mod:`Crypto.Hash` package.
            Under mode ``'fips-186-3'``, the hash must be a FIPS
            approved secure hash (SHA-2 or SHA-3).

        :return: The signature as ``bytes``
        :raise ValueError: if the hash algorithm is incompatible to the (EC)DSA key
        :raise TypeError: if the (EC)DSA key has no private half
        zPrivate key is needed to sign�Hash is not sufficiently strongN�binaryrc�:��g|]}t|�j����S�)rr)�.0�xrs  �r�
<listcomp>z%DssSigScheme.sign.<locals>.<listcomp>ks6���2�2�2�#$� -�Q��0A�B�B�2�2�2r)rr�	TypeErrorr(�
ValueErrorr%r�
from_bytes�digestr�_signr�joinr�encode)rr$�nonce�z�sig_pair�outputs`     r�signzDssSigScheme.signMs����y�$�$�&�&�	=��;�<�<�<�����)�)�	@��>�?�?�?��#�#�H�-�-��
��x���0�0�1C�$�2C�1C�D�E�E���9�?�?�1�e�,�,���>�X�%�%��X�X�2�2�2�2�(0�2�2�2�3�3�F�F�!��*�*�1�1�3�3�F��
rc��|�|��std���|jdkrVt|��d|jzkrtd���d�|d|j�||jd�fD��\}}n�	t���|d���}n$#ttf$rtd	���wxYwt|��dks|���std
���t|d��t|d��}}d|cxkr|j
krnnd|cxkr|j
ksntd
���tj|���d|j���}|j
�|||f��}|std���dS)a�Check if a certain (EC)DSA signature is authentic.

        Args:
          msg_hash (hash object):
            The hash that was carried out over the message.
            This is an object belonging to the :mod:`Crypto.Hash` module.
            Under mode ``'fips-186-3'``, the hash must be a FIPS
            approved secure hash (SHA-2 or SHA-3).

          signature (``bytes``):
            The signature that needs to be validated.

        :raise ValueError: if the signature is not authentic
        r*r+�z'The signature is not authentic (length)c�6�g|]}tj|����Sr-)rr3)r.r/s  rr0z'DssSigScheme.verify.<locals>.<listcomp>�s9�� J� J� J�$%�!(� 2�1� 5� 5� J� J� JrNT)�strictz$The signature is not authentic (DER)z,The signature is not authentic (DER content)rr
z"The signature is not authentic (d)zThe signature is not authenticF)r(r2r�lenrr�decode�
IndexError�hasOnlyIntsrrr3r4r�_verify)rr$�	signature�r_prime�s_prime�der_seqr9�results        r�verifyzDssSigScheme.verifyzs
�� ����)�)�	@��>�?�?�?��>�X�%�%��9�~�~�!�d�&7�"7�8�8� �!J�K�K�K� J� J�*3�4F�T�5F�4F�*G�*3�D�4E�4F�4F�*G�*I� J� J� J��G�W�W�
I�%�-�-�.�.�y��.�F�F�����
�+�
I�
I�
I� �!G�H�H�H�
I�����7�|�|�q� � ��(;�(;�(=�(=� � �!O�P�P�P�&�w�q�z�2�2�G�G�A�J�4G�4G�W�G��G�)�)�)�)�d�k�)�)�)�)�)�1�w�3L�3L�3L�3L���3L�3L�3L�3L��A�B�B�B���x���0�0�1C�$�2C�1C�D�E�E����"�"�1�w��&8�9�9���	?��=�>�>�>��us�#B+�+!CN)
�__name__�
__module__�__qualname__�__doc__rrr%r(r<rKr-rrr	r	-s��������
<�<�<�'�'�'�B�B�B�B�B�B�+�+�+�Z*�*�*�*�*rc�<��eZdZ�fd�Zd�Zd�Zd�Zd�Zd�Z�xZ	S)�DeterministicDsaSigSchemec�j��tt|���|||��||_dS�N)�superrQr�_private_key)rrrr�private_key�	__class__s     �rrz"DeterministicDsaSigScheme.__init__�s4���
�'��.�.�7�7��X�u�M�M�M�'����rc��tj|��}|j���}t	|��dz}||kr|||z
z}|S)zSee 2.3.2 in RFC6979r)rr3rrrA)r�bstrrJ�q_len�b_lens     r�	_bits2intz#DeterministicDsaSigScheme._bits2int�sR���#�D�)�)����(�(�*�*���D�	�	�A�
���5�=�=����
�&�F��
rc�X�d|cxkr|jksnJ�t||j��S)zSee 2.3.3 in RFC6979r)rrr)r�	int_mod_qs  r�_int2octetsz%DeterministicDsaSigScheme._int2octets�s>���9�*�*�*�*�t�{�*�*�*�*�*�*��Y��(9�:�:�:rc��|�|��}||jkr|}n
||jz
}|�|��S)zSee 2.3.4 in RFC6979)r\rr_)rrY�z1�z2s    r�_bits2octetsz&DeterministicDsaSigScheme._bits2octets�sI���^�^�D�
!�
!��
������B�B��d�k�!�B�����#�#�#rc�X�|���}d|jz}d|jz}dD]�}tj|||z|�|j��z|�|��z|�����}tj|||�����}��d}d|cxkr|jks�n|dkrStj||dz|�����}tj|||�����}d}t|��|j	krEtj|||�����}||z
}t|��|j	k�E|�
|��}d|cxkr|jk��n��|S)z!Generate k in a deterministic way��)rfre���rr)r4�digest_sizerr
r_rUrcrrArr\)r�mhash�h1�mask_v�nonce_k�int_octr8�mask_ts        rr%z(DeterministicDsaSigScheme._compute_nonce�s���
�\�\�^�^���5�,�,���E�-�-��)�	?�	?�G��h�w�%��/�#�/�/��0A�B�B� C�#�0�0��4�4� 5�6;�=�=�>D�V�X�X�
�
�X�g�v�u�5�5�<�<�>�>�F�F����u�*�*�*�*�t�{�*�*�*�*���{�{��(�7�F�W�,<�#(�*�*�*0�&�(�(����'�6�5�9�9�@�@�B�B���F��f�+�+�� 1�1�1���'�6�5�9�9�@�@�B�B���&� ���f�+�+�� 1�1�1�
�N�N�6�*�*�E�!�u�*�*�*�*�t�{�*�*�*�*�*�"�rc��dS)NTr-r#s  rr(z%DeterministicDsaSigScheme._valid_hash�s���tr)
rLrMrNrr\r_rcr%r(�
__classcell__�rWs@rrQrQ�s��������(�(�(�(�(�	�	�	�;�;�;�$�$�$�&�&�&�P������rrQc�.��eZdZdZ�fd�Zd�Zd�Z�xZS)�FipsDsaSigScheme))i�)���)ru�)irwc���tt|���|||��||_t	|j�����}||jf|jvrd||jfz}t|���dS)Nz+L/N (%d, %d) is not compliant to FIPS 186-3)
rTrsr�	_randfuncr�prr�_fips_186_3_L_Nr2)rrrr�randfunc�L�errorrWs       �rrzFipsDsaSigScheme.__init__s����
���%�%�.�.�s�H�e�D�D�D�!����C�E�N�N�'�'�)�)��
�t�� ��(<�<�<�B��4�+�,�-�E��U�#�#�#�=�<rc�D�tjd|j|j���S�Nr
)�
min_inclusive�
max_exclusiver|)r�random_rangerryr#s  rr%zFipsDsaSigScheme._compute_nonces(���#�!�26�+�-1�^�=�=�=�	=rc�L�|jdkp|j�d��S)z*Verify that SHA-1, SHA-2 or SHA-3 are usedz
1.3.14.3.2.26z2.16.840.1.101.3.4.2.)�oid�
startswithr#s  rr(zFipsDsaSigScheme._valid_hashs,�����/�A���'�'�(?�@�@�	Br)rLrMrNr{rr%r(rprqs@rrsrs�sd�������
�O�$�$�$�$�$�=�=�=�B�B�B�B�B�B�Brrsc�*��eZdZ�fd�Zd�Zd�Z�xZS)�FipsEcDsaSigSchemec�j��tt|���|||��||_dSrS)rTr�rry)rrrrr|rWs     �rrzFipsEcDsaSigScheme.__init__s1���
� �$�'�'�0�0��h��F�F�F�!����rc�X�tjd|jjj|j���Sr�)rr�r�_curverryr#s  rr%z!FipsEcDsaSigScheme._compute_nonces.���#�!�26�)�2B�2H�-1�^�=�=�=�	=rc��|jj���}d}d}d}d}||z|z|z}	|j|v}n#t$rd}YnwxYw|S)zxVerify that the strength of the hash matches or exceeds
        the strength of the EC. We fail if the hash is too weak.)z2.16.840.1.101.3.4.2.4z2.16.840.1.101.3.4.2.7z2.16.840.1.101.3.4.2.5)z2.16.840.1.101.3.4.2.1z2.16.840.1.101.3.4.2.8z2.16.840.1.101.3.4.2.6)z2.16.840.1.101.3.4.2.2z2.16.840.1.101.3.4.2.9)z2.16.840.1.101.3.4.2.3z2.16.840.1.101.3.4.2.10F)r�pointQrr��AttributeError)	rr$�modulus_bits�sha224�sha256�sha384�sha512�shsrJs	         rr(zFipsEcDsaSigScheme._valid_hash"s����y�'�4�4�6�6��`��_��E��F���v�o��&��/��	��\�S�(�F�F���	�	�	��F�F�F�	�����
s�	=�A�A)rLrMrNrr%r(rprqs@rr�r�sV�������"�"�"�"�"�=�=�=�
������rr�r+Nc��|dvrtd|z���t|t��r.|jj}d}|jjdkrtd���nXt|t��rt|j��}d}n,tdtt|����z���|���rt||��}nd}|d	krt||||��S|d
kr9t|t��rt||||��St||||��Std|z���)a�
Create a signature object :class:`DssSigScheme` that
    can perform (EC)DSA signature or verification.

    .. note::
        Refer to `NIST SP 800 Part 1 Rev 4`_ (or newer release) for an
        overview of the recommended key lengths.

    Args:
        key (:class:`Crypto.PublicKey.DSA` or :class:`Crypto.PublicKey.ECC`):
            The key to use for computing the signature (*private* keys only)
            or for verifying one.
            For DSA keys, let ``L`` and ``N`` be the bit lengths of the modulus ``p``
            and of ``q``: the pair ``(L,N)`` must appear in the following list,
            in compliance to section 4.2 of `FIPS 186-4`_:

            - (1024, 160) *legacy only; do not create new signatures with this*
            - (2048, 224) *deprecated; do not create new signatures with this*
            - (2048, 256)
            - (3072, 256)

            For ECC, only keys over P-224, P-256, P-384, and P-521 are accepted.

        mode (string):
            The parameter can take these values:

            - ``'fips-186-3'``. The signature generation is randomized and carried out
              according to `FIPS 186-3`_: the nonce ``k`` is taken from the RNG.
            - ``'deterministic-rfc6979'``. The signature generation is not
              randomized. See RFC6979_.

        encoding (string):
            How the signature is encoded. This value determines the output of
            :meth:`sign` and the input to :meth:`verify`.

            The following values are accepted:

            - ``'binary'`` (default), the signature is the raw concatenation
              of ``r`` and ``s``. It is defined in the IEEE P.1363 standard.
              For DSA, the size in bytes of the signature is ``N/4`` bytes
              (e.g. 64 for ``N=256``).
              For ECDSA, the signature is always twice the length of a point
              coordinate (e.g. 64 bytes for P-256).

            - ``'der'``, the signature is a ASN.1 DER SEQUENCE
              with two INTEGERs (``r`` and ``s``). It is defined in RFC3279_.
              The size of the signature is variable.

        randfunc (callable):
            A function that returns random ``bytes``, of a given length.
            If omitted, the internal RNG is used.
            Only applicable for the *'fips-186-3'* mode.

    .. _FIPS 186-3: http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf
    .. _FIPS 186-4: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
    .. _NIST SP 800 Part 1 Rev 4: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
    .. _RFC6979: http://tools.ietf.org/html/rfc6979
    .. _RFC3279: https://tools.ietf.org/html/rfc3279#section-2.2.2
    )r+�derzUnknown encoding '%s'�d�ed25519z ECC key is not on a NIST P curver/zUnsupported key type Nzdeterministic-rfc6979z
fips-186-3zUnknown DSS mode '%s')r2�
isinstancerr�r�namerr�q�str�typer�getattrrQr�rs)r�moderr|r�private_key_attrrVs       rr
r
6sW��D�(�(�(��0�8�;�<�<�<��#�v���	C��
� �����:�?�i�'�'��?�@�@�@�(�	�C��	 �	 �C�����������0�3�t�C�y�y�>�>�A�B�B�B�
�������c�#3�4�4������&�&�&�(��h��{�K�K�K�	
��	�	��c�6�"�"�	D�%�c�8�U�H�E�E�E�#�C��5�(�C�C�C��0�4�7�8�8�8r)r+N)�Crypto.Util.asn1r�Crypto.Util.numberr�Crypto.Math.Numbersr�Crypto.Hashr�Crypto.PublicKey.ECCr�Crypto.PublicKey.DSAr�__all__�objectr	rQrsr�r
r-rr�<module>r�se��D)�(�(�(�(�(�,�,�,�,�,�,�'�'�'�'�'�'�������'�'�'�'�'�'�'�'�'�'�'�'��5�
!��w�w�w�w�w�6�w�w�w�tK�K�K�K�K��K�K�K�\B�B�B�B�B�|�B�B�B�D���������>]9�]9�]9�]9�]9�]9r

Youez - 2016 - github.com/yon3zu
LinuXploit