o
    1)h                     @  s   U d dl mZ d dlZd dlZd dlZd dlZd dlZdZdZe	dd ej
ejjfD Zded< d#ddZd$ddZ	d%d&ddZd'ddZd(d!d"ZdS ))    )annotationsNZ>abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789i@B c                 c  s$    | ]}|d ur|dkr|V  qd S )N/ .0sepr   r   PC:\Users\User\Downloads\Proyecto_IoT\venv\Lib\site-packages\werkzeug/security.py	<genexpr>   s    r	   z	list[str]_os_alt_sepslengthintreturnstrc                 C  s(   | dkrt dddd t| D S )zAGenerate a random string of SALT_CHARS with specified ``length``.r   zSalt length must be at least 1. c                 s  s    | ]}t tV  qd S N)secretschoice
SALT_CHARS)r   _r   r   r   r	      s    zgen_salt.<locals>.<genexpr>)
ValueErrorjoinrange)r   r   r   r   gen_salt   s   r   methodsaltpasswordtuple[str, str]c                 C  s8  |  d^} }| }| }| dkrS|sd}d}d}nz
tt|\}}}W n ty2   tdd w d| | | }	tj||||||	d d	| d| d| fS | d
krt|}
|
dkrdd}t	}n|
dkro|d }t	}n|
dkr~|d }t|d }ntdt
|||| d| d| fS td|  d)N:scrypti         z'scrypt' takes 3 arguments.   )r   nrpmaxmemzscrypt:Zpbkdf2r   sha256   z'pbkdf2' takes 2 arguments.zpbkdf2:zInvalid hash method 'z'.)splitencodemapr   r   hashlibr   hexlenDEFAULT_PBKDF2_ITERATIONSpbkdf2_hmac)r   r   r   argsZ
salt_bytesZpassword_bytesr"   r#   r$   r%   Zlen_args	hash_nameZ
iterationsr   r   r   _hash_internal   sN   
r2   r      salt_lengthc                 C  s,   t |}t||| \}}| d| d| S )aD  Securely hash a password for storage. A password can be compared to a stored hash
    using :func:`check_password_hash`.

    The following methods are supported:

    -   ``scrypt``, the default. The parameters are ``n``, ``r``, and ``p``, the default
        is ``scrypt:32768:8:1``. See :func:`hashlib.scrypt`.
    -   ``pbkdf2``, less secure. The parameters are ``hash_method`` and ``iterations``,
        the default is ``pbkdf2:sha256:600000``. See :func:`hashlib.pbkdf2_hmac`.

    Default parameters may be updated to reflect current guidelines, and methods may be
    deprecated and removed if they are no longer considered secure. To migrate old
    hashes, you may generate a new hash when checking an old hash, or you may contact
    users with a link to reset their password.

    :param password: The plaintext password.
    :param method: The key derivation function and parameters.
    :param salt_length: The number of characters to generate for the salt.

    .. versionchanged:: 3.1
        The default iterations for pbkdf2 was increased to 1,000,000.

    .. versionchanged:: 2.3
        Scrypt support was added.

    .. versionchanged:: 2.3
        The default iterations for pbkdf2 was increased to 600,000.

    .. versionchanged:: 2.3
        All plain hashes are deprecated and will not be supported in Werkzeug 3.0.
    $)r   r2   )r   r   r4   r   hZactual_methodr   r   r   generate_password_hashI   s   "r7   pwhashboolc                 C  sD   z|  dd\}}}W n
 ty   Y dS w tt|||d |S )aA  Securely check that the given stored password hash, previously generated using
    :func:`generate_password_hash`, matches the given password.

    Methods may be deprecated and removed if they are no longer considered secure. To
    migrate old hashes, you may generate a new hash when checking an old hash, or you
    may contact users with a link to reset their password.

    :param pwhash: The hashed password.
    :param password: The plaintext password.

    .. versionchanged:: 2.3
        All plain hashes are deprecated and will not be supported in Werkzeug 3.0.
    r5   r'   Fr   )r(   r   hmaccompare_digestr2   )r8   r   r   r   Zhashvalr   r   r   check_password_hashp   s   r<   	directory	pathnames
str | Nonec                   s   | sd} | g}|D ]2  dkrt   t fddtD s3tj s3 ds3 dks3 dr6 dS |  q	t j	| S )	a2  Safely join zero or more untrusted path components to a base
    directory to avoid escaping the base directory.

    :param directory: The trusted base directory.
    :param pathnames: The untrusted path components relative to the
        base directory.
    :return: A safe path, otherwise ``None``.
    .r   c                 3  s    | ]}| v V  qd S r   r   r   filenamer   r   r	      s    zsafe_join.<locals>.<genexpr>r   z..z../N)
	posixpathnormpathanyr
   ospathisabs
startswithappendr   )r=   r>   partsr   rA   r   	safe_join   s$   	


rL   )r   r   r   r   )r   r   r   r   r   r   r   r   )r   r3   )r   r   r   r   r4   r   r   r   )r8   r   r   r   r   r9   )r=   r   r>   r   r   r?   )
__future__r   r+   r:   rF   rC   r   r   r.   listr   rG   altsepr
   __annotations__r   r2   r7   r<   rL   r   r   r   r   <module>   s"    

1
'