NaCl + PKCS#11 crypto provider for Swarmauri
Project description
Swarmauri Crypto NaCl PKCS#11
swarmauri_crypto_nacl_pkcs11 is a hybrid crypto provider that combines PyNaCl for X25519 sealed-box operations with python-pkcs11 for AES key wrapping. The provider implements the CryptoBase contract and is discoverable via the swarmauri.cryptos entry-point as NaClPkcs11Crypto.
Supported operations
- AES-GCM authenticated encryption via
encrypt/decryptusing symmetricKeyRefmaterial that is exactly 16, 24, or 32 bytes long. - AES Key Wrap (AES-KW) via
wrap/unwrapagainst an HSM-protected key. The PKCS#11 session is resolved from theKeyRef.tags(module,slot_label,user_pin,label) or the environment variablesPKCS11_MODULE,PKCS11_SLOT_LABEL,PKCS11_USER_PIN, andPKCS11_KEK_LABEL. - X25519 sealed boxes via
seal/unsealandencrypt_for_many, enabling single or multi-recipient payload distribution. When additional authenticated data (AAD) is supplied the envelope is rebound with AES-GCM before delivery.
Installation
Choose the workflow that matches your project:
pip install swarmauri_crypto_nacl_pkcs11
poetry add swarmauri_crypto_nacl_pkcs11
uv add swarmauri_crypto_nacl_pkcs11
Usage
All cryptographic methods are asynchronous. The quick-start example below performs an AES-GCM round trip using a 256-bit symmetric key.
import asyncio
from swarmauri_crypto_nacl_pkcs11 import NaClPkcs11Crypto
from swarmauri_core.crypto.types import ExportPolicy, KeyRef, KeyType, KeyUse
async def main() -> None:
crypto = NaClPkcs11Crypto()
symmetric_key = KeyRef(
kid="sym1",
version=1,
type=KeyType.SYMMETRIC,
uses=(KeyUse.ENCRYPT, KeyUse.DECRYPT),
export_policy=ExportPolicy.SECRET_WHEN_ALLOWED,
material=b"\x00" * 32,
)
ciphertext = await crypto.encrypt(symmetric_key, b"hello")
plaintext = await crypto.decrypt(symmetric_key, ciphertext)
assert plaintext == b"hello"
asyncio.run(main())
Sealed box key exchange
seal and encrypt_for_many expect X25519 KeyRef instances. Provide the public key bytes via KeyRef.public for recipients and the private key bytes via KeyRef.material for unsealing. Each recipient receives an opaque sealed payload generated with nacl.public.SealedBox.
PKCS#11-backed key wrapping
wrap and unwrap require a key-encryption-key (KEK) stored in the configured PKCS#11 slot. Supply connection details through KeyRef.tags or environment variables as described above. The wrapped material is returned as a WrappedKey using the AES-KW algorithm.
Want to help?
If you want to contribute to swarmauri-sdk, read up on our guidelines for contributing that will help you get started.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file swarmauri_crypto_nacl_pkcs11-0.4.0.dev3.tar.gz.
File metadata
- Download URL: swarmauri_crypto_nacl_pkcs11-0.4.0.dev3.tar.gz
- Upload date:
- Size: 9.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.12 {"installer":{"name":"uv","version":"0.10.12","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
33d9ef502ed6a82910c34df85411e25f07a7e7a627d059c82b283152f50d909d
|
|
| MD5 |
3c0a554b52d617cc4a7f7c6cf638b209
|
|
| BLAKE2b-256 |
b5793b245cb961929d7fee9cf802c68cbbaf951455cdf5337e36328ffb515186
|
File details
Details for the file swarmauri_crypto_nacl_pkcs11-0.4.0.dev3-py3-none-any.whl.
File metadata
- Download URL: swarmauri_crypto_nacl_pkcs11-0.4.0.dev3-py3-none-any.whl
- Upload date:
- Size: 10.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.12 {"installer":{"name":"uv","version":"0.10.12","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f58da4aa66368277237f993db8d69c37955ee98c3ad608ed6e2ffbeffb45173e
|
|
| MD5 |
ee76bbe78f0e0fbfdd50cc576a3c4ecb
|
|
| BLAKE2b-256 |
a43e29ce222d42f51bda7f920c62330838d8a8d159692a5524520cc8ce31b35a
|