ó
    ­”iL  ã                   óˆ   • S r SSKrSSKJr  SSKJrJrJrJrJ	r	  \" SS5      r
S rS rS	rS
rSrSrSrSrSrSr\" SS5      rg)aÅ  
Module's constants for the modes of operation supported with Blowfish:

:var MODE_ECB: :ref:`Electronic Code Book (ECB) <ecb_mode>`
:var MODE_CBC: :ref:`Cipher-Block Chaining (CBC) <cbc_mode>`
:var MODE_CFB: :ref:`Cipher FeedBack (CFB) <cfb_mode>`
:var MODE_OFB: :ref:`Output FeedBack (OFB) <ofb_mode>`
:var MODE_CTR: :ref:`CounTer Mode (CTR) <ctr_mode>`
:var MODE_OPENPGP:  :ref:`OpenPGP Mode <openpgp_mode>`
:var MODE_EAX: :ref:`EAX Mode <eax_mode>`
é    N)Ú_create_cipher)Úload_pycryptodome_raw_libÚVoidPointerÚSmartPointerÚc_size_tÚc_uint8_ptrzCrypto.Cipher._raw_blowfishaT  
        int Blowfish_start_operation(const uint8_t key[],
                                     size_t key_len,
                                     void **pResult);
        int Blowfish_encrypt(const void *state,
                             const uint8_t *in,
                             uint8_t *out,
                             size_t data_len);
        int Blowfish_decrypt(const void *state,
                             const uint8_t *in,
                             uint8_t *out,
                             size_t data_len);
        int Blowfish_stop_operation(void *state);
        c                 óÄ  •  U R                  S5      n[        U5      [        ;  a  [        S[        U5      -  5      e[        R                  n[        R                  n[        5       nU" [        U5      [        [        U5      5      UR                  5       5      nU(       a  [        SU-  5      e[        UR                  5       U5      $ ! [         a    [        S5      ef = f)z€This method instantiates and returns a smart pointer to
a low-level base cipher. It will absorb named parameters in
the process.ÚkeyzMissing 'key' parameterz(Incorrect Blowfish key length (%d bytes)z0Error %X while instantiating the Blowfish cipher)ÚpopÚKeyErrorÚ	TypeErrorÚlenÚkey_sizeÚ
ValueErrorÚ_raw_blowfish_libÚBlowfish_start_operationÚBlowfish_stop_operationr   r   r   Ú
address_ofr   Úget)Údict_parametersr
   Ústart_operationÚstop_operationÚvoid_pÚresults         ÚQ/var/www/html/trading/venv/lib/python3.13/site-packages/Crypto/Cipher/Blowfish.pyÚ_create_base_cipherr   <   sÍ   € ð
3Ø×!Ñ! %Ó(ˆô ˆ3ƒx”xÓÜÐCÄcÈ#ÃhÑNÓOÐOä'×@Ñ@€OÜ&×>Ñ>€Nä‹]€FÙœ[¨Ó-Ü%¤c¨#£hÓ/Ø#×.Ñ.Ó0ó2€Fö ÜÐKØ!ñ"ó #ð 	#ä˜Ÿ
™
› nÓ5Ð5øô! ó 3ÜÐ1Ó2Ð2ð3ús   ‚C	 Ã	Cc                 óL   • [        [        R                  [           X/UQ70 UD6$ )aZ  Create a new Blowfish cipher

:param key:
    The secret key to use in the symmetric cipher.
    Its length can vary from 5 to 56 bytes.
:type key: bytes, bytearray, memoryview

:param mode:
    The chaining mode to use for encryption or decryption.
:type mode: One of the supported ``MODE_*`` constants

:Keyword Arguments:
    *   **iv** (*bytes*, *bytearray*, *memoryview*) --
        (Only applicable for ``MODE_CBC``, ``MODE_CFB``, ``MODE_OFB``,
        and ``MODE_OPENPGP`` modes).

        The initialization vector to use for encryption or decryption.

        For ``MODE_CBC``, ``MODE_CFB``, and ``MODE_OFB`` it must be 8 bytes long.

        For ``MODE_OPENPGP`` mode only,
        it must be 8 bytes long for encryption
        and 10 bytes for decryption (in the latter case, it is
        actually the *encrypted* IV which was prefixed to the ciphertext).

        If not provided, a random byte string is generated (you must then
        read its value with the :attr:`iv` attribute).

    *   **nonce** (*bytes*, *bytearray*, *memoryview*) --
        (Only applicable for ``MODE_EAX`` and ``MODE_CTR``).

        A value that must never be reused for any other encryption done
        with this key.

        For ``MODE_EAX`` there are no
        restrictions on its length (recommended: **16** bytes).

        For ``MODE_CTR``, its length must be in the range **[0..7]**.

        If not provided for ``MODE_EAX``, a random byte string is generated (you
        can read it back via the ``nonce`` attribute).

    *   **segment_size** (*integer*) --
        (Only ``MODE_CFB``).The number of **bits** the plaintext and ciphertext
        are segmented in. It must be a multiple of 8.
        If not specified, it will be assumed to be 8.

    *   **mac_len** : (*integer*) --
        (Only ``MODE_EAX``)
        Length of the authentication tag, in bytes.
        It must be no longer than 8 (default).

    *   **initial_value** : (*integer*) --
        (Only ``MODE_CTR``). The initial value for the counter within
        the counter block. By default it is **0**.

:Return: a Blowfish object, of the applicable mode.
)r   ÚsysÚmodulesÚ__name__)r
   ÚmodeÚargsÚkwargss       r   Únewr$   V   s%   € ôx œ#Ÿ+™+¤hÑ/°ÐL¸TÒLÀVÑLÐLó    é   é   é   é   é   é   é	   é   é   é9   )Ú__doc__r   ÚCrypto.Cipherr   ÚCrypto.Util._raw_apir   r   r   r   r   r   r   r$   ÚMODE_ECBÚMODE_CBCÚMODE_CFBÚMODE_OFBÚMODE_CTRÚMODE_OPENPGPÚMODE_EAXÚ
block_sizeÚranger   © r%   r   Ú<module>r=      su   ðñ,
ó å (÷/õ /ñ .Ø%ð	ó
Ð ò&6ò4<Mð| €Ø€Ø€Ø€Ø€Ø€Ø€ð €
áFÓr%   