pymobiledevice3 4.26.0__py3-none-any.whl → 4.26.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pymobiledevice3 might be problematic. Click here for more details.

@@ -28,7 +28,7 @@ version_tuple: VERSION_TUPLE
28
28
  commit_id: COMMIT_ID
29
29
  __commit_id__: COMMIT_ID
30
30
 
31
- __version__ = version = '4.26.0'
32
- __version_tuple__ = version_tuple = (4, 26, 0)
31
+ __version__ = version = '4.26.1'
32
+ __version_tuple__ = version_tuple = (4, 26, 1)
33
33
 
34
34
  __commit_id__ = commit_id = None
pymobiledevice3/ca.py CHANGED
@@ -1,6 +1,6 @@
1
- from datetime import datetime, timedelta
1
+ from datetime import datetime, timedelta, timezone
2
2
  from pathlib import Path
3
- from typing import Optional
3
+ from typing import Optional, Union
4
4
 
5
5
  from cryptography import x509
6
6
  from cryptography.hazmat.primitives import hashes, serialization
@@ -10,8 +10,235 @@ from cryptography.hazmat.primitives.serialization import Encoding, NoEncryption,
10
10
  from cryptography.x509 import Certificate
11
11
  from cryptography.x509.oid import NameOID
12
12
 
13
+ _SERIAL = 1
14
+
15
+
16
+ def select_hash_algorithm(device_version: Union[tuple[int, int, int], str, None]) -> hashes.HashAlgorithm:
17
+ """
18
+ Choose hash algorithm to match libimobiledevice (idevicepair) logic.
19
+
20
+ :param device_version: Device version tuple (major, minor, patch) or "a.b.c" string.
21
+ If None, defaults to SHA-256 (modern).
22
+ :returns: SHA-1 if version < 4.0.0, else SHA-256.
23
+ """
24
+ if device_version is None:
25
+ return hashes.SHA256()
26
+ if isinstance(device_version, str):
27
+ parts = tuple(int(x) for x in device_version.split("."))
28
+ else:
29
+ parts = device_version
30
+ return hashes.SHA1() if parts < (4, 0, 0) else hashes.SHA256()
31
+
32
+
33
+ def get_validity_bounds(years: int = 10) -> tuple[datetime, datetime]:
34
+ """
35
+ Compute notBefore / notAfter validity window.
36
+
37
+ :param years: Number of years for certificate validity.
38
+ :returns: (not_before, not_after) in UTC.
39
+ """
40
+ now = datetime.now(timezone.utc)
41
+ return now - timedelta(minutes=1), now + timedelta(days=365 * years)
42
+
43
+
44
+ def serialize_cert_pem(cert: Certificate) -> bytes:
45
+ """
46
+ Serialize an X.509 certificate in PEM format.
47
+
48
+ :param cert: Certificate object.
49
+ :returns: PEM-encoded certificate bytes.
50
+ """
51
+ return cert.public_bytes(Encoding.PEM)
52
+
53
+
54
+ def serialize_private_key_pkcs8_pem(key: RSAPrivateKey) -> bytes:
55
+ """
56
+ Serialize a private key in PKCS#8 PEM format (like OpenSSL's PEM_write_bio_PrivateKey).
57
+
58
+ :param key: RSA private key.
59
+ :returns: PEM-encoded PKCS#8 key bytes (unencrypted).
60
+ """
61
+ return key.private_bytes(Encoding.PEM, PrivateFormat.PKCS8, NoEncryption())
62
+
63
+
64
+ # =======================================
65
+ # Certificate builders (empty DN, v3, KU)
66
+ # =======================================
67
+
68
+ def build_root_certificate(root_key: RSAPrivateKey, alg: hashes.HashAlgorithm) -> Certificate:
69
+ """
70
+ Build a self-signed root (CA) certificate:
71
+ - Empty subject/issuer (x509.Name([]))
72
+ - Serial = 1
73
+ - X.509 v3 with BasicConstraints CA:TRUE (critical)
74
+ - Signed with root_key using the chosen hash
75
+
76
+ :param root_key: RSA private key for the root CA.
77
+ :param alg: Hash algorithm (SHA-1 or SHA-256).
78
+ :returns: Root CA certificate.
79
+ """
80
+ not_before, not_after = get_validity_bounds()
81
+ empty = x509.Name([])
82
+ builder = (
83
+ x509.CertificateBuilder()
84
+ .subject_name(empty)
85
+ .issuer_name(empty)
86
+ .public_key(root_key.public_key())
87
+ .serial_number(_SERIAL)
88
+ .not_valid_before(not_before)
89
+ .not_valid_after(not_after)
90
+ .add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
91
+ )
92
+ return builder.sign(root_key, alg)
93
+
94
+
95
+ def build_host_certificate(
96
+ host_key: RSAPrivateKey,
97
+ root_cert: Certificate,
98
+ root_key: RSAPrivateKey,
99
+ alg: hashes.HashAlgorithm,
100
+ ) -> Certificate:
101
+ """
102
+ Build the host (leaf) certificate signed by the root:
103
+ - Empty subject
104
+ - Issuer = root's (empty) subject
105
+ - Serial = 1
106
+ - BasicConstraints CA:FALSE (critical)
107
+ - KeyUsage: digitalSignature, keyEncipherment (critical)
108
+ - Signed with root_key
109
+
110
+ :param host_key: Host RSA private key (leaf).
111
+ :param root_cert: Root CA certificate.
112
+ :param root_key: Root RSA private key.
113
+ :param alg: Hash algorithm (SHA-1 or SHA-256).
114
+ :returns: Host certificate (leaf).
115
+ """
116
+ not_before, not_after = get_validity_bounds()
117
+ builder = (
118
+ x509.CertificateBuilder()
119
+ .subject_name(x509.Name([]))
120
+ .issuer_name(root_cert.subject) # empty
121
+ .public_key(host_key.public_key())
122
+ .serial_number(_SERIAL)
123
+ .not_valid_before(not_before)
124
+ .not_valid_after(not_after)
125
+ .add_extension(x509.BasicConstraints(ca=False, path_length=None), critical=True)
126
+ .add_extension(
127
+ x509.KeyUsage(
128
+ digital_signature=True,
129
+ key_encipherment=True,
130
+ key_cert_sign=False, crl_sign=False,
131
+ content_commitment=False, data_encipherment=False,
132
+ key_agreement=False, encipher_only=False, decipher_only=False,
133
+ ),
134
+ critical=True,
135
+ )
136
+ )
137
+ return builder.sign(root_key, alg)
138
+
139
+
140
+ def build_device_certificate(
141
+ device_public_key: RSAPublicKey,
142
+ root_cert: Certificate,
143
+ root_key: RSAPrivateKey,
144
+ alg: hashes.HashAlgorithm,
145
+ ) -> Certificate:
146
+ """
147
+ Build the device certificate (leaf) signed by the root:
148
+ - Empty subject
149
+ - Issuer = root's (empty) subject
150
+ - Serial = 1
151
+ - BasicConstraints CA:FALSE (critical)
152
+ - KeyUsage: digitalSignature, keyEncipherment (critical)
153
+ - SubjectKeyIdentifier = hash
154
+ - Signed with root_key
155
+
156
+ :param device_public_key: Device's RSA public key (as advertised by lockdown).
157
+ :param root_cert: Root CA certificate.
158
+ :param root_key: Root RSA private key.
159
+ :param alg: Hash algorithm (SHA-1 or SHA-256).
160
+ :returns: Device certificate (leaf).
161
+ """
162
+ not_before, not_after = get_validity_bounds()
163
+ builder = (
164
+ x509.CertificateBuilder()
165
+ .subject_name(x509.Name([]))
166
+ .issuer_name(root_cert.subject) # empty
167
+ .public_key(device_public_key)
168
+ .serial_number(_SERIAL)
169
+ .not_valid_before(not_before)
170
+ .not_valid_after(not_after)
171
+ .add_extension(x509.BasicConstraints(ca=False, path_length=None), critical=True)
172
+ .add_extension(
173
+ x509.KeyUsage(
174
+ digital_signature=True,
175
+ key_encipherment=True,
176
+ key_cert_sign=False, crl_sign=False,
177
+ content_commitment=False, data_encipherment=False,
178
+ key_agreement=False, encipher_only=False, decipher_only=False,
179
+ ),
180
+ critical=True,
181
+ )
182
+ .add_extension(x509.SubjectKeyIdentifier.from_public_key(device_public_key), critical=False)
183
+ )
184
+ return builder.sign(root_key, alg)
185
+
186
+
187
+ # ==========================================
188
+ # Public API for your pairing flow (renamed)
189
+ # ==========================================
190
+
191
+ def generate_pairing_cert_chain(
192
+ device_public_key_pem: bytes,
193
+ private_key: Optional[RSAPrivateKey] = None,
194
+ device_version: Union[tuple[int, int, int], str, None] = (4, 0, 0),
195
+ ) -> tuple[bytes, bytes, bytes, bytes, bytes]:
196
+ """
197
+ Generate a root→host certificate chain and a device certificate that mirror the
198
+ libimobiledevice C behavior (empty DN, serial=1, BC/KU/SKI, SHA1 flip for < 4.0).
199
+
200
+ :param device_public_key_pem: Device RSA public key in PEM ("RSA PUBLIC KEY") format.
201
+ :param private_key: Optional host RSA private key to reuse; if None, a new one is generated.
202
+ :param device_version: Version to select hash (tuple or "a.b.c"). < 4.0.0 => SHA-1; else SHA-256.
203
+ :returns: (host_cert_pem, host_key_pem, device_cert_pem, root_cert_pem, root_key_pem)
204
+ """
205
+ alg = select_hash_algorithm(device_version)
206
+
207
+ # Root CA (self-signed)
208
+ root_key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
209
+ root_cert = build_root_certificate(root_key, alg)
210
+
211
+ # Host leaf (reuse provided key if given)
212
+ host_key = private_key or rsa.generate_private_key(public_exponent=65537, key_size=2048)
213
+ host_cert = build_host_certificate(host_key, root_cert, root_key, alg)
214
+
215
+ # Device leaf (public key provided by the device)
216
+ dev_pub = load_pem_public_key(device_public_key_pem)
217
+ if not isinstance(dev_pub, RSAPublicKey):
218
+ raise ValueError("device_public_key_pem must be an RSA PUBLIC KEY in PEM format")
219
+ device_cert = build_device_certificate(dev_pub, root_cert, root_key, alg)
220
+
221
+ return (
222
+ serialize_cert_pem(host_cert),
223
+ serialize_private_key_pkcs8_pem(host_key),
224
+ serialize_cert_pem(device_cert),
225
+ serialize_cert_pem(root_cert),
226
+ serialize_private_key_pkcs8_pem(root_key),
227
+ )
228
+
13
229
 
14
230
  def make_cert(key: RSAPrivateKey, public_key: RSAPublicKey, common_name: Optional[str] = None) -> Certificate:
231
+ """
232
+ Create a simple self-signed certificate for the provided key.
233
+
234
+ NOTE: This is not suitable for pairing (it sets subject/issuer and lacks C-style fields).
235
+ It is preserved as-is for your keybag usage.
236
+
237
+ :param key: RSA private key for signing.
238
+ :param public_key: RSA public key to embed in the certificate.
239
+ :param common_name: Optional CN to include in subject/issuer.
240
+ :returns: Self-signed certificate.
241
+ """
15
242
  attributes = [x509.NameAttribute(NameOID.COMMON_NAME, common_name)] if common_name else []
16
243
  subject = issuer = x509.Name(attributes)
17
244
  cert = x509.CertificateBuilder()
@@ -27,22 +254,23 @@ def make_cert(key: RSAPrivateKey, public_key: RSAPublicKey, common_name: Optiona
27
254
  return cert
28
255
 
29
256
 
30
- def dump_cert(cert):
31
- return cert.public_bytes(Encoding.PEM)
257
+ def dump_cert(cert: Certificate) -> bytes:
258
+ """
259
+ Serialize a certificate in PEM format.
32
260
 
33
-
34
- def ca_do_everything(device_public_key, private_key: Optional[rsa.RSAPrivateKey] = None):
35
- if private_key is None:
36
- private_key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
37
-
38
- cert = make_cert(private_key, private_key.public_key())
39
- dev_key = load_pem_public_key(device_public_key)
40
- dev_cert = make_cert(private_key, dev_key, 'Device')
41
- return dump_cert(cert), private_key.private_bytes(Encoding.PEM, PrivateFormat.PKCS8, NoEncryption()), dump_cert(
42
- dev_cert)
261
+ :param cert: Certificate object.
262
+ :returns: PEM-encoded certificate bytes.
263
+ """
264
+ return cert.public_bytes(Encoding.PEM)
43
265
 
44
266
 
45
267
  def create_keybag_file(file: Path, common_name: str) -> None:
268
+ """
269
+ Write a private key and a simple self-signed certificate to a file (PEM concatenated).
270
+
271
+ :param file: Destination file path.
272
+ :param common_name: Common Name to embed in the self-signed certificate.
273
+ """
46
274
  private_key = rsa.generate_private_key(public_exponent=65537, key_size=2048)
47
275
  cer = make_cert(private_key, private_key.public_key(), common_name)
48
276
  file.write_bytes(
@@ -50,4 +278,5 @@ def create_keybag_file(file: Path, common_name: str) -> None:
50
278
  encoding=serialization.Encoding.PEM,
51
279
  format=PrivateFormat.TraditionalOpenSSL,
52
280
  encryption_algorithm=serialization.NoEncryption()
53
- ) + cer.public_bytes(encoding=serialization.Encoding.PEM))
281
+ ) + cer.public_bytes(encoding=serialization.Encoding.PEM)
282
+ )
@@ -24,13 +24,13 @@ from packaging.version import Version
24
24
 
25
25
  from pymobiledevice3 import usbmux
26
26
  from pymobiledevice3.bonjour import DEFAULT_BONJOUR_TIMEOUT, browse_mobdev2
27
- from pymobiledevice3.ca import ca_do_everything
27
+ from pymobiledevice3.ca import generate_pairing_cert_chain
28
28
  from pymobiledevice3.common import get_home_folder
29
29
  from pymobiledevice3.exceptions import BadDevError, CannotStopSessionError, ConnectionFailedError, \
30
30
  ConnectionTerminatedError, DeviceNotFoundError, FatalPairingError, GetProhibitedError, IncorrectModeError, \
31
31
  InvalidConnectionError, InvalidHostIDError, InvalidServiceError, LockdownError, MissingValueError, \
32
32
  NoDeviceConnectedError, NotPairedError, PairingDialogResponsePendingError, PairingError, PasswordRequiredError, \
33
- SetProhibitedError, StartServiceError, UserDeniedPairingError
33
+ PyMobileDevice3Exception, SetProhibitedError, StartServiceError, UserDeniedPairingError
34
34
  from pymobiledevice3.irecv_devices import IRECV_DEVICES
35
35
  from pymobiledevice3.lockdown_service_provider import LockdownServiceProvider
36
36
  from pymobiledevice3.pair_records import create_pairing_records_cache_folder, generate_host_id, \
@@ -308,6 +308,7 @@ class LockdownClient(ABC, LockdownServiceProvider):
308
308
  if not response or response.get('Result') != 'Success':
309
309
  raise CannotStopSessionError()
310
310
  return response
311
+ raise PyMobileDevice3Exception('No active session')
311
312
 
312
313
  def validate_pairing(self) -> bool:
313
314
  if self.pair_record is None:
@@ -363,15 +364,17 @@ class LockdownClient(ABC, LockdownServiceProvider):
363
364
  raise PairingError()
364
365
 
365
366
  self.logger.info('Creating host key & certificate')
366
- cert_pem, private_key_pem, device_certificate = ca_do_everything(self.device_public_key,
367
- private_key=private_key)
368
-
369
- pair_record = {'DevicePublicKey': self.device_public_key,
370
- 'DeviceCertificate': device_certificate,
371
- 'HostCertificate': cert_pem,
367
+ host_cert_pem, host_key_pem, device_cert_pem, root_cert_pem, root_key_pem = generate_pairing_cert_chain(
368
+ self.device_public_key,
369
+ private_key=private_key
370
+ # TODO: consider parsing product_version to support iOS < 4
371
+ )
372
+
373
+ pair_record = {'DeviceCertificate': device_cert_pem,
374
+ 'HostCertificate': host_cert_pem,
372
375
  'HostID': self.host_id,
373
- 'RootCertificate': cert_pem,
374
- 'RootPrivateKey': private_key_pem,
376
+ 'RootCertificate': root_cert_pem,
377
+ 'RootPrivateKey': root_key_pem,
375
378
  'WiFiMACAddress': self.wifi_mac_address,
376
379
  'SystemBUID': self.system_buid}
377
380
 
@@ -380,7 +383,7 @@ class LockdownClient(ABC, LockdownServiceProvider):
380
383
 
381
384
  pair = self._request_pair(pair_options, timeout=timeout)
382
385
 
383
- pair_record['HostPrivateKey'] = private_key_pem
386
+ pair_record['HostPrivateKey'] = host_key_pem
384
387
  escrow_bag = pair.get('EscrowBag')
385
388
 
386
389
  if escrow_bag is not None:
@@ -405,14 +408,16 @@ class LockdownClient(ABC, LockdownServiceProvider):
405
408
  raise PairingError()
406
409
 
407
410
  self.logger.info('Creating host key & certificate')
408
- cert_pem, private_key_pem, device_certificate = ca_do_everything(self.device_public_key)
411
+ host_cert_pem, host_key_pem, device_cert_pem, root_cert_pem, root_key_pem = generate_pairing_cert_chain(
412
+ self.device_public_key
413
+ # TODO: consider parsing product_version to support iOS < 4
414
+ )
409
415
 
410
- pair_record = {'DevicePublicKey': self.device_public_key,
411
- 'DeviceCertificate': device_certificate,
412
- 'HostCertificate': cert_pem,
416
+ pair_record = {'DeviceCertificate': device_cert_pem,
417
+ 'HostCertificate': host_cert_pem,
413
418
  'HostID': self.host_id,
414
- 'RootCertificate': cert_pem,
415
- 'RootPrivateKey': private_key_pem,
419
+ 'RootCertificate': root_cert_pem,
420
+ 'RootPrivateKey': root_key_pem,
416
421
  'WiFiMACAddress': self.wifi_mac_address,
417
422
  'SystemBUID': self.system_buid}
418
423
 
@@ -434,7 +439,7 @@ class LockdownClient(ABC, LockdownServiceProvider):
434
439
  # second pair with Response to Challenge
435
440
  pair = self._request_pair(pair_options, timeout=timeout)
436
441
 
437
- pair_record['HostPrivateKey'] = private_key_pem
442
+ pair_record['HostPrivateKey'] = host_key_pem
438
443
  escrow_bag = pair.get('EscrowBag')
439
444
 
440
445
  if escrow_bag is not None:
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: pymobiledevice3
3
- Version: 4.26.0
3
+ Version: 4.26.1
4
4
  Summary: Pure python3 implementation for working with iDevices (iPhone, etc...)
5
5
  Author-email: doronz88 <doron88@gmail.com>, matan <matan1008@gmail.com>
6
6
  Maintainer-email: doronz88 <doron88@gmail.com>, matan <matan1008@gmail.com>
@@ -8,14 +8,14 @@ misc/understanding_idevice_protocol_layers.md,sha256=8tEqRXWOUPoxOJLZVh7C7H9JGCh
8
8
  misc/usbmux_sniff.sh,sha256=iWtbucOEQ9_UEFXk9x-2VNt48Jg5zrPsnUbZ_LfZxwA,212
9
9
  pymobiledevice3/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
10
10
  pymobiledevice3/__main__.py,sha256=tBERBLftc5ENGB4NQfNJRIecok0LQfNvkqXlsi1feFw,11572
11
- pymobiledevice3/_version.py,sha256=hNrVJOR4hLThWMRcdRZRNkj64SfPTisebBA-EZ7azAM,706
11
+ pymobiledevice3/_version.py,sha256=qneizFYIunJ9wWwPPVKHWiU6zVellqgeXXUE9ezfGGg,706
12
12
  pymobiledevice3/bonjour.py,sha256=-Q_TLBGJ6qW3CX_DgBcz-CXfWSwxWVQ2L64hk6PxnDY,5631
13
- pymobiledevice3/ca.py,sha256=Ho0NaOtATe5hdruUSlVDRpfR9ltEYXjL3MoKwEvEJjw,2296
13
+ pymobiledevice3/ca.py,sha256=mTvWdSjTZw6Eb-22-IZ323GyA1G6CXYmdPedImTjm3A,10542
14
14
  pymobiledevice3/common.py,sha256=-PG6oaUkNFlB3jb7E0finMrX8wqhkS-cuTAfmLvZUmc,329
15
15
  pymobiledevice3/exceptions.py,sha256=VqWB6WWoMrXt8GDdKqRHeJ1otP-eZIThoHERswXWqpw,10347
16
16
  pymobiledevice3/irecv.py,sha256=FoEln1_zHkAiNcEctB5bStfhKNgniOSg7lg9xcX1U2Q,10596
17
17
  pymobiledevice3/irecv_devices.py,sha256=BG30ecXSChxdyYCCGIrIO0sVWT31hbKymB78nZWVfWc,38506
18
- pymobiledevice3/lockdown.py,sha256=AAcJ3QjnAITaatn01SQYQSbv4_uBBaPpYlGIeu8KSJY,38642
18
+ pymobiledevice3/lockdown.py,sha256=xejqmSLhJsvM-F4rs4InxtVVtSYYSN3VJXnxd-ijspI,38814
19
19
  pymobiledevice3/lockdown_service_provider.py,sha256=l5N72tiuI-2uowk8wu6B7qkjY2UmqQsnhdJqvJy3I8A,1744
20
20
  pymobiledevice3/pair_records.py,sha256=Tr28mlBWPXvOF7vdKBDOuw1rCRwm6RViDTGbikfP77I,6034
21
21
  pymobiledevice3/service_connection.py,sha256=_-PTLFr3krtwEBNHEKXCd_2eOGwMpbsfPbB8AX2uN-g,14861
@@ -164,9 +164,9 @@ pymobiledevice3/services/web_protocol/switch_to.py,sha256=hDddJUEePbRN-8xlllOeGh
164
164
  pymobiledevice3/tunneld/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
165
165
  pymobiledevice3/tunneld/api.py,sha256=EfGKXEWhsMSB__menPmRmL9R6dpazVJDUy7B3pn05MM,2357
166
166
  pymobiledevice3/tunneld/server.py,sha256=SvC57AV_R8YQhA0fCwGNUdhfy8TKMFWwL_fp_FmXrBI,22715
167
- pymobiledevice3-4.26.0.dist-info/licenses/LICENSE,sha256=jOtLnuWt7d5Hsx6XXB2QxzrSe2sWWh3NgMfFRetluQM,35147
168
- pymobiledevice3-4.26.0.dist-info/METADATA,sha256=4lY2IeOmA1nALJ_Ixi48DJBBmmjfrTzqLZWVbmmg_lM,17463
169
- pymobiledevice3-4.26.0.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
170
- pymobiledevice3-4.26.0.dist-info/entry_points.txt,sha256=jJMlOanHlVwUxcY__JwvKeWPrvBJr_wJyEq4oHIZNKE,66
171
- pymobiledevice3-4.26.0.dist-info/top_level.txt,sha256=MjZoRqcWPOh5banG-BbDOnKEfsS3kCxqV9cv-nzyg2Q,21
172
- pymobiledevice3-4.26.0.dist-info/RECORD,,
167
+ pymobiledevice3-4.26.1.dist-info/licenses/LICENSE,sha256=jOtLnuWt7d5Hsx6XXB2QxzrSe2sWWh3NgMfFRetluQM,35147
168
+ pymobiledevice3-4.26.1.dist-info/METADATA,sha256=xkmBpgcU9uIklTKsi-zlXIUmy03ERVPu_YcRmHhnlaU,17463
169
+ pymobiledevice3-4.26.1.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
170
+ pymobiledevice3-4.26.1.dist-info/entry_points.txt,sha256=jJMlOanHlVwUxcY__JwvKeWPrvBJr_wJyEq4oHIZNKE,66
171
+ pymobiledevice3-4.26.1.dist-info/top_level.txt,sha256=MjZoRqcWPOh5banG-BbDOnKEfsS3kCxqV9cv-nzyg2Q,21
172
+ pymobiledevice3-4.26.1.dist-info/RECORD,,