úÎ5ò3®     None!Data format version. Currently 3.bit 0 - uses password#iff option includes "uses password"$iff options includes "uses password" OThe initialisation vector The ciphertext is variable and encrypted in CBC mode YThe HMAC (32 bytes). This field is a continuation as the HMAC is at the end of the file. Generates a new , suitable for encryption. Concatenates this Š into a raw sequence of bytes, up to the IV. This means you need to append the ciphertext plus the HMAC to finalise the encrypted file.         NoneThe ¬ the streamer can be at. This is needed to drive the computation as well as reading leftovers unread back in case we need to chop the buffer read, if not multiple of the  .Parse the input  to extract the ,, as defined in the V3 spec. The incoming x is expected to have at least 34 bytes available. As the HMAC can be found only at the very end of an encrypted file, h provides by default a function to parse the HMAC, callable at the right time during streaming/parsing.³This was taken directly from the Python implementation, see "post_decrypt_data", even though it doesn't seem to be a usual PKCS#7 removal: data = data[:-bord(data[-1])] https:/ github.com RNCryptorRNCryptor-pythonblobmasterRNCryptor.py#L69VDecrypt a raw Bytestring block. The function returns the clear text block plus a new Œ, which is needed because the IV needs to be set to the last 16 bytes of the previous cipher text. (Thanks to Rob Napier for the insight).ÿDecrypt an encrypted message. Please be aware that this is a user-friendly but dangerous function, in the sense that it will load the *ENTIRE* input in memory. It's mostly suitable for small inputs like passwords. For large inputs, where size exceeds the available memory, please use .1Efficiently decrypts an incoming stream of bytes. !"#$%&'The user key (e.g. password)&The input source (mostly likely stdin)(The output source (mostly likely stdout) !"#$%&' Safe-InferredKComputes the padding as per PKCS#7. The specification can be found here: .http://tools.ietf.org/html/rfc5652#section-6.3The block size (e.g. 16 bytes)The input sizeThe resulting paddingNone(The (¬ the streamer can be at. This is needed to drive the computation as well as reading leftovers unread back in case we need to chop the buffer read, if not multiple of the  .XEncrypt a raw Bytestring block. The function returns the encrypt text block plus a new Œ, which is needed because the IV needs to be set to the last 16 bytes of the previous cipher text. (Thanks to Rob Napier for the insight).ÿEncrypt a message. Please be aware that this is a user-friendly but dangerous function, in the sense that it will load the *ENTIRE* input in memory. It's mostly suitable for small inputs like passwords. For large inputs, where size exceeds the available memory, please use .0Efficiently encrypt an incoming stream of bytes.()*+The user key (e.g. password)&The input source (mostly likely stdin)(The output source (mostly likely stdout)(+*)None,       !"#$%&'()*+,-.#$%/rncryptor-0.0.2.0Crypto.RNCryptor.TypesCrypto.RNCryptor.V3.DecryptCrypto.RNCryptor.PaddingCrypto.RNCryptor.V3.EncryptCrypto.RNCryptor.V3RNCryptorContext ctxHeader ctxCipherRNCryptorHeader rncVersion rncOptionsrncEncryptionSalt rncHMACSaltrncIVrncHMAC blockSizenewRNCryptorHeaderrenderRNCryptorHeadernewRNCryptorContext parseHeader decryptBlockdecrypt decryptStream pkcs7Padding encryptBlockencrypt encryptStreamsaltSize randomSaltIODecryptionStatebytestring-0.10.4.0Data.ByteString.Internal ByteStringremovePaddingSymbols DrainSource FetchLeftOverContinueparseSingleWord8 parseBSOfSize parseVersion parseOptionsparseEncryptionSalt parseHMACSaltparseIV parseHMACEncryptionState