3
e              	   @   s  U d dl Z d dlZd dlZd dlZd dlZd dlZd dlZejr@dZ	dZ
edd ejjejjgD Zeje e
ddfejeef ejeef eeje ejejeejf  edddZe
ddfejeef ejeef eeje ejejeejf  edd	d
ZeeedddZeedddZeeeejeef dddZdeeeedddZeeedddZeeeje dddZ dS )     NZ>abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789i c             c   s"   | ]}|d k	r|dkr|V  qd S )N/ ).0sepr   r   5/tmp/pip-build-3irwxpxt/Werkzeug/werkzeug/security.py	<genexpr>   s    r   )datasalt
iterationskeylenhashfuncreturnc             C   s$   t jdtdd t| ||||j S )a  Like :func:`pbkdf2_bin`, but returns a hex-encoded string.

    :param data: the data to derive.
    :param salt: the salt for the derivation.
    :param iterations: the number of iterations.
    :param keylen: the length of the resulting key.  If not provided,
                   the digest size will be used.
    :param hashfunc: the hash function to use.  This can either be the
                     string name of a known hash function, or a function
                     from the hashlib module.  Defaults to sha256.

    .. deprecated:: 2.0
        Will be removed in Werkzeug 2.1. Use :func:`hashlib.pbkdf2_hmac`
        instead.

    .. versionadded:: 0.9
    zj'pbkdf2_hex' is deprecated and will be removed in Werkzeug 2.1. Use 'hashlib.pbkdf2_hmac().hex()' instead.   )
stacklevel)warningswarnDeprecationWarning
pbkdf2_binhex)r   r	   r
   r   r   r   r   r   
pbkdf2_hex   s
    r   c             C   sj   t jdtdd t| tr$| jd} t|tr8|jd}|sBd}nt|rT| j}n|}tj	|| |||S )ae  Returns a binary digest for the PBKDF2 hash algorithm of `data`
    with the given `salt`. It iterates `iterations` times and produces a
    key of `keylen` bytes. By default, SHA-256 is used as hash function;
    a different hashlib `hashfunc` can be provided.

    :param data: the data to derive.
    :param salt: the salt for the derivation.
    :param iterations: the number of iterations.
    :param keylen: the length of the resulting key.  If not provided
                   the digest size will be used.
    :param hashfunc: the hash function to use.  This can either be the
                     string name of a known hash function or a function
                     from the hashlib module.  Defaults to sha256.

    .. deprecated:: 2.0
        Will be removed in Werkzeug 2.1. Use :func:`hashlib.pbkdf2_hmac`
        instead.

    .. versionadded:: 0.9
    zd'pbkdf2_bin' is deprecated and will be removed in Werkzeug 2.1. Use 'hashlib.pbkdf2_hmac()' instead.r   )r   utf8sha256)
r   r   r   
isinstancestrencodecallablenamehashlibpbkdf2_hmac)r   r	   r
   r   r   	hash_namer   r   r   r   5   s    




r   )abr   c             C   sD   t jdtdd t| tr$| jd} t|tr8|jd}tj| |S )ai  This function compares strings in somewhat constant time.  This
    requires that the length of at least one string is known in advance.

    Returns `True` if the two strings are equal, or `False` if they are not.

    .. deprecated:: 2.0
        Will be removed in Werkzeug 2.1. Use
        :func:`hmac.compare_digest` instead.

    .. versionadded:: 0.7
    zd'safe_str_cmp' is deprecated and will be removed in Werkzeug 2.1. Use 'hmac.compare_digest' instead.r   )r   zutf-8)r   r   r   r   r   r   hmaccompare_digest)r    r!   r   r   r   safe_str_cmpg   s    



r$   )lengthr   c             C   s(   | dkrt ddjdd t| D S )zAGenerate a random string of SALT_CHARS with specified ``length``.r   zSalt length must be positive c             s   s   | ]}t jtV  qd S )N)secretschoice
SALT_CHARS)r   _r   r   r   r      s    zgen_salt.<locals>.<genexpr>)
ValueErrorjoinrange)r%   r   r   r   gen_salt   s    r.   )methodr	   passwordr   c             C   s   | dkr|| fS |j d}|j d}| jdr|s:td| dd jd}t|dkr`td
|jd} |r~t|d pzdnt}tj	| |||j
 d|  d| fS |rtj||| j | fS tj| |j | fS )zInternal password hash helper.  Supports plaintext without salt,
    unsalted and salted passwords.  In case salted passwords are used
    hmac is used.
    plainzutf-8zpbkdf2:zSalt is required for PBKDF2   N:   r   z&Invalid number of arguments for PBKDF2r   )r4   r   )r   
startswithr+   splitlenpopintDEFAULT_PBKDF2_ITERATIONSr   r   r   r"   new	hexdigest)r/   r	   r0   argsr
   r   r   r   _hash_internal   s"    



r>   pbkdf2:sha256   )r0   r/   salt_lengthr   c             C   s8   |dkrt |nd}t||| \}}| d| d| S )a  Hash a password with the given method and salt with a string of
    the given length. The format of the string returned includes the method
    that was used so that :func:`check_password_hash` can check the hash.

    The format for the hashed string looks like this::

        method$salt$hash

    This method can **not** generate unsalted passwords but it is possible
    to set param method='plain' in order to enforce plaintext passwords.
    If a salt is used, hmac is used internally to salt the password.

    If PBKDF2 is wanted it can be enabled by setting the method to
    ``pbkdf2:method:iterations`` where iterations is optional::

        pbkdf2:sha256:80000$salt$hash
        pbkdf2:sha256$salt$hash

    :param password: the password to hash.
    :param method: the hash method to use (one that hashlib supports). Can
                   optionally be in the format ``pbkdf2:method:iterations``
                   to enable PBKDF2.
    :param salt_length: the length of the salt in letters.
    r1   r&   $)r.   r>   )r0   r/   rA   r	   hZactual_methodr   r   r   generate_password_hash   s    rD   )pwhashr0   r   c             C   s<   | j ddk rdS | jdd\}}}tjt|||d |S )a  Check a password against a given salted and hashed password value.
    In order to support unsalted legacy passwords this method supports
    plain text passwords, md5 and sha1 hashes (both salted and unsalted).

    Returns `True` if the password matched, `False` otherwise.

    :param pwhash: a hashed string like returned by
                   :func:`generate_password_hash`.
    :param password: the plaintext password to compare against the hash.
    rB   r   Fr   )countr6   r"   r#   r>   )rE   r0   r/   r	   Zhashvalr   r   r   check_password_hash   s    rG   )	directory	pathnamesr   c                sr   | g}x`|D ]X  dkr"t j  t fddtD sVtjj sV dksV jdrZdS |j  qW t j	| S )a2  Safely join zero or more untrusted path components to a base
    directory to avoid escaping the base directory.

    :param directory: The trusted base directory.
    :param pathnames: The untrusted path components relative to the
        base directory.
    :return: A safe path, otherwise ``None``.
    r&   c             3   s   | ]}| kV  qd S )Nr   )r   r   )filenamer   r   r      s    zsafe_join.<locals>.<genexpr>z..z../N)
	posixpathnormpathany_os_alt_sepsospathisabsr5   appendr,   )rH   rI   partsr   )rJ   r   	safe_join   s    	


rT   )r?   r@   )!r   r"   rO   rK   r'   typingtr   ZTYPE_CHECKINGr)   r:   listrP   r   altseprN   Listr   Unionbytesr9   OptionalCallabler   r   boolr$   r.   Tupler>   rD   rG   rT   r   r   r   r   <module>   s6    &::,"