import base64, binascii, hmac, os, socket, ssl, typing

def ssl_context(cert: str=None, key: str=None, verify: bool=True
        ) -> ssl.SSLContext:
    context = ssl.SSLContext(ssl.PROTOCOL_TLS)
    context.options |= ssl.OP_NO_SSLv2
    context.options |= ssl.OP_NO_SSLv3
    context.options |= ssl.OP_NO_TLSv1
    context.load_default_certs()

    if verify:
        context.verify_mode = ssl.CERT_REQUIRED
    if cert and key:
        context.load_cert_chain(cert, keyfile=key)

    return context

def ssl_wrap(sock: socket.socket, cert: str=None, key: str=None,
        verify: bool=True, server_side: bool=False, hostname: str=None
        ) -> ssl.SSLSocket:
    context = ssl_context(cert=cert, key=key, verify=verify)
    return context.wrap_socket(sock, server_side=server_side,
        server_hostname=hostname)

def constant_time_compare(a: typing.AnyStr, b: typing.AnyStr) -> bool:
    return hmac.compare_digest(a, b)

import scrypt
def password(byte_n: int=32):
    return binascii.hexlify(os.urandom(byte_n)).decode("utf8")
def salt(byte_n: int=64) -> bytes:
    return base64.b64encode(os.urandom(byte_n)).decode("utf8")
def hash(given_salt: str, data: str):
    return base64.b64encode(scrypt.hash(data, given_salt)).decode("utf8")
def hash_verify(salt: str, data: str, compare: str):
    given_hash = hash(salt, data)
    return constant_time_compare(given_hash, compare)

from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.asymmetric import padding

def a_encrypt(key_filename: str, data: str):
    with open(key_filename, "rb") as key_file:
        key_content = key_file.read()
    key = serialization.load_pem_public_key(
        key_content, backend=default_backend())
    out = key.encrypt(data.encode("utf8"), padding.OAEP(
        mgf=padding.MGF1(algorithm=hashes.SHA256()),
        algorithm=hashes.SHA256(), label=None))
    return base64.b64encode(out).decode("iso-8859-1")

def a_decrypt(key_filename: str, data: str):
    with open(key_filename, "rb") as key_file:
        key_content = key_file.read()
    key = serialization.load_pem_private_key(
        key_content, password=None, backend=default_backend())
    out = key.decrypt(base64.b64decode(data), padding.OAEP(
        mgf=padding.MGF1(algorithm=hashes.SHA256()),
        algorithm=hashes.SHA256(), label=None))
    return out.decode("utf8")