úÎ>:Õ(      !"#$%&'None!"0S!Data format version. Currently 3.bit 0 - uses password#iff option includes "uses password" $iff options includes "uses password" OThe initialisation vector The ciphertext is variable and encrypted in CBC mode\HMAC validation failed. First parameter is the untrusted hmac, the second the computed one.Generates a new , suitable for encryption.Concatenates this ‰ into a raw sequence of bytes, up to the IV. This means you need to append the ciphertext plus the HMAC to finalise the encrypted file.#( )*+,   ( )*+,None-The -¬ the streamer can be at. This is needed to drive the computation as well as reading leftovers unread back in case we need to chop the buffer read, if not multiple of the ..2Efficiently transform an incoming stream of bytes.-/01.(The RNCryptor context for this operation&The input source (mostly likely stdin)(The output source (mostly likely stdout)$The action to perform over the block The finaliser-/01.-/01.NoneTParse the input 2 to extract the +, as defined in the V3 spec. The incoming 2x is expected to have at least 34 bytes available. As the HMAC can be found only at the very end of an encrypted file, h provides by default a function to parse the HMAC, callable at the right time during streaming/parsing.3¬This was taken directly from the Python implementation, see "post_decrypt_data", even though it doesn't seem to be a usual PKCS#7 removal: data = data[:-bord(data[-1])] Jhttps://github.com/RNCryptor/RNCryptor-python/blob/master/RNCryptor.py#L69 VDecrypt a raw Bytestring block. The function returns the clear text block plus a new Œ, which is needed because the IV needs to be set to the last 16 bytes of the previous cipher text. (Thanks to Rob Napier for the insight).!ÿDecrypt an encrypted message. Please be aware that this is a user-friendly but dangerous function, in the sense that it will load the *ENTIRE* input in memory. It's mostly suitable for small inputs like passwords. For large inputs, where size exceeds the available memory, please use ".MReturns either the reason for failure, or the successfully decrypted message."1Efficiently decrypts an incoming stream of bytes.456789:3; <!"The user key (e.g. password)&The input source (mostly likely stdin)(The output source (mostly likely stdout) !"! "456789:3; <!"Safe#KComputes the padding as per PKCS#7. The specification can be found here: .http://tools.ietf.org/html/rfc5652#section-6.3#The block size (e.g. 16 bytes)The input sizeThe resulting padding###None$XEncrypt a raw Bytestring block. The function returns the encrypt text block plus a new Œ, which is needed because the IV needs to be set to the last 16 bytes of the previous cipher text. (Thanks to Rob Napier for the insight).%ÿEncrypt a message. Please be aware that this is a user-friendly but dangerous function, in the sense that it will load the *ENTIRE* input in memory. It's mostly suitable for small inputs like passwords. For large inputs, where size exceeds the available memory, please use '.&0Efficiently encrypt an incoming stream of bytes.'0Efficiently encrypt an incoming stream of bytes.=$%&The RNCryptorContext&The input source (mostly likely stdin)(The output source (mostly likely stdout)'The user key (e.g. password)&The input source (mostly likely stdin)(The output source (mostly likely stdout)$%&'%$'&=$%&'None"  !"$%&'>       !"#$%&'()*+,-./0123456789:;<=>?@ABCDE(rncryptor-0.3.0.0-LVuAjT32GT51y7lRZOSynyCrypto.RNCryptor.TypesCrypto.RNCryptor.V3.DecryptCrypto.RNCryptor.PaddingCrypto.RNCryptor.V3.EncryptCrypto.RNCryptor.V3.StreamCrypto.RNCryptor.V3RNCryptorContext ctxHeader ctxCipher ctxHMACCtxRNCryptorHeader rncVersion rncOptionsrncEncryptionSalt rncHMACSaltrncIVIVHMACSaltEncryptionSaltSalt EncryptionKeyHMACPasswordRNCryptorExceptionInvalidHMACException blockSizemakeHMACnewRNCryptorHeadernewRNCryptorHeaderFromrenderRNCryptorHeadernewRNCryptorContext$fArbitraryRNCryptorHeader$fShowRNCryptorHeader$fExceptionRNCryptorException$fShowRNCryptorException$fEqRNCryptorException parseHeader decryptBlockdecrypt decryptStream pkcs7Padding encryptBlockencryptencryptStreamWithContext encryptStreamsaltSize randomSaltIOmakeKeycipherInitNoErrorStreamingState processStreamContinue FetchLeftOver DrainSourcebytestring-0.10.8.1Data.ByteString.Internal ByteStringremovePaddingSymbolsparseSingleWord8 parseBSOfSize parseVersion parseOptionsparseEncryptionSalt parseHMACSaltparseIV decryptBytesconsistentTimeEqual encryptBytes