U
    M}gg                     @  s   U d dl mZ d dlZd dlZd dlZd dlZd dlZdZdZe	dd ej
ejjfD Zded< d	d
dddZd
d
d
ddddZdd
d
d	d
dddZd
d
ddddZd
d
ddddZdS )     )annotationsNZ>abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789i'	 c                 c  s"   | ]}|d k	r|dkr|V  qd S )N/ .0sepr   r   5/tmp/pip-unpacked-wheel-s46b54kd/werkzeug/security.py	<genexpr>   s      r	   z	list[str]_os_alt_sepsintstr)lengthreturnc                 C  s(   | dkrt dddd t| D S )zAGenerate a random string of SALT_CHARS with specified ``length``.r   zSalt length must be at least 1. c                 s  s   | ]}t tV  qd S N)secretschoice
SALT_CHARS)r   _r   r   r   r	      s     zgen_salt.<locals>.<genexpr>)
ValueErrorjoinrange)r   r   r   r   gen_salt   s    r   ztuple[str, str])methodsaltpasswordr   c                 C  sF  |  d^} }| }| }| dkr|s8d}d}d}n4ztt|\}}}W n tk
rj   tdd Y nX d| | | }	tj||||||	d d	| d| d| fS | d
kr2t|}
|
dkrd}t	}n>|
dkr|d }t	}n(|
dkr|d }t|d }ntdt
|||| d| d| fS td|  dd S )N:scrypti         z'scrypt' takes 3 arguments.   )r   nrpmaxmemzscrypt:Zpbkdf2r   sha256   z'pbkdf2' takes 2 arguments.zpbkdf2:zInvalid hash method 'z'.)splitencodemapr   r   hashlibr   hexlenDEFAULT_PBKDF2_ITERATIONSpbkdf2_hmac)r   r   r   argsZ
salt_bytesZpassword_bytesr!   r"   r#   r$   Zlen_args	hash_nameZ
iterationsr   r   r   _hash_internal   sX         

   r1   r      )r   r   salt_lengthr   c                 C  s,   t |}t||| \}}| d| d| S )a  Securely hash a password for storage. A password can be compared to a stored hash
    using :func:`check_password_hash`.

    The following methods are supported:

    -   ``scrypt``, the default. The parameters are ``n``, ``r``, and ``p``, the default
        is ``scrypt:32768:8:1``. See :func:`hashlib.scrypt`.
    -   ``pbkdf2``, less secure. The parameters are ``hash_method`` and ``iterations``,
        the default is ``pbkdf2:sha256:600000``. See :func:`hashlib.pbkdf2_hmac`.

    Default parameters may be updated to reflect current guidelines, and methods may be
    deprecated and removed if they are no longer considered secure. To migrate old
    hashes, you may generate a new hash when checking an old hash, or you may contact
    users with a link to reset their password.

    :param password: The plaintext password.
    :param method: The key derivation function and parameters.
    :param salt_length: The number of characters to generate for the salt.

    .. versionchanged:: 2.3
        Scrypt support was added.

    .. versionchanged:: 2.3
        The default iterations for pbkdf2 was increased to 600,000.

    .. versionchanged:: 2.3
        All plain hashes are deprecated and will not be supported in Werkzeug 3.0.
    $)r   r1   )r   r   r3   r   hZactual_methodr   r   r   generate_password_hashI   s    r6   bool)pwhashr   r   c                 C  sF   z|  dd\}}}W n tk
r,   Y dS X tt|||d |S )aA  Securely check that the given stored password hash, previously generated using
    :func:`generate_password_hash`, matches the given password.

    Methods may be deprecated and removed if they are no longer considered secure. To
    migrate old hashes, you may generate a new hash when checking an old hash, or you
    may contact users with a link to reset their password.

    :param pwhash: The hashed password.
    :param password: The plaintext password.

    .. versionchanged:: 2.3
        All plain hashes are deprecated and will not be supported in Werkzeug 3.0.
    r4   r&   Fr   )r'   r   hmaccompare_digestr1   )r8   r   r   r   Zhashvalr   r   r   check_password_hashm   s
    r;   z
str | None)	directory	pathnamesr   c                   s   | sd} | g}|D ]d  dkr(t   t fddtD sftj sf dsf dksf drl dS |  qt j	| S )	a2  Safely join zero or more untrusted path components to a base
    directory to avoid escaping the base directory.

    :param directory: The trusted base directory.
    :param pathnames: The untrusted path components relative to the
        base directory.
    :return: A safe path, otherwise ``None``.
    .r   c                 3  s   | ]}| kV  qd S r   r   r   filenamer   r   r	      s     zsafe_join.<locals>.<genexpr>r   z..z../N)
	posixpathnormpathanyr
   ospathisabs
startswithappendr   )r<   r=   partsr   r?   r   	safe_join   s&    	

rJ   )r   r2   )
__future__r   r*   r9   rD   rA   r   r   r-   listr   rE   altsepr
   __annotations__r   r1   r6   r;   rJ   r   r   r   r   <module>   s$    1   $