3 L]@sddlmZddlmZddlZddlZddlmZddlm Z ej j Z ej j Zej jZej jZej jZe dZej jZej jZej jZej jZej jZej j Z!ej j"Z#ej j$Z%ej j&Z'ej j(Z)de#Z*de%Z+e'e)ej,j-fdd Z.e#e%fd d Z/d d Z0dS))absolute_import)divisionN) exceptions)ensurec Csdtt|tkdtt|ftjdtjj||\}}}|d} |jtjj ||d|||| |dS)a Derive a ``size`` bytes long key from a caller-supplied ``password`` and ``salt`` pair using the scryptsalsa208sha256 memory-hard construct. the enclosing module provides the constants - :py:const:`.OPSLIMIT_INTERACTIVE` - :py:const:`.MEMLIMIT_INTERACTIVE` - :py:const:`.OPSLIMIT_SENSITIVE` - :py:const:`.MEMLIMIT_SENSITIVE` - :py:const:`.OPSLIMIT_MODERATE` - :py:const:`.MEMLIMIT_MODERATE` as a guidance for correct settings respectively for the interactive login and the long term key protecting sensitive data use cases. :param size: derived key size, must be between :py:const:`.BYTES_MIN` and :py:const:`.BYTES_MAX` :type size: int :param password: password used to seed the key derivation procedure; it length must be between :py:const:`.PASSWD_MIN` and :py:const:`.PASSWD_MAX` :type password: bytes :param salt: **RANDOM** salt used in the key derivation procedure; its length must be exactly :py:const:`.SALTBYTES` :type salt: bytes :param opslimit: the time component (operation count) of the key derivation procedure's computational cost; it must be between :py:const:`.OPSLIMIT_MIN` and :py:const:`.OPSLIMIT_MAX` :type opslimit: int :param memlimit: the memory occupation component of the key derivation procedure's computational cost; it must be between :py:const:`.MEMLIMIT_MIN` and :py:const:`.MEMLIMIT_MAX` :type memlimit: int :rtype: bytes .. versionadded:: 1.2 z.The salt must be exactly %s, not %s bytes long)raising)maxmemZdkleni) rlen SALTBYTESexc ValueErrornaclbindingsZ nacl_bindings_pick_scrypt_paramsencodeZ%crypto_pwhash_scryptsalsa208sha256_ll) sizepasswordZsaltopslimitmemlimitencoderZn_log2rpr r6/tmp/pip-install-wfra5znf/pynacl/nacl/pwhash/scrypt.pykdf6s3    rcCstjj|||S)a Hashes a password with a random salt, using the memory-hard scryptsalsa208sha256 construct and returning an ascii string that has all the needed info to check against a future password The default settings for opslimit and memlimit are those deemed correct for the interactive user login case. :param bytes password: :param int opslimit: :param int memlimit: :rtype: bytes .. versionadded:: 1.2 )rrZ&crypto_pwhash_scryptsalsa208sha256_str)rrrrrrstr|srcCs.tt|tkdtjjtjdtjj||S)z Takes the output of scryptsalsa208sha256 and compares it against a user provided password to see if they are the same :param password_hash: bytes :param password: bytes :rtype: boolean .. versionadded:: 1.2 z/The password hash must be exactly %s bytes long)r) rr PWHASH_SIZErr+crypto_pwhash_scryptsalsa208sha256_STRBYTESrrZ-crypto_pwhash_scryptsalsa208sha256_str_verify)Z password_hashrrrrverifys  r )1 __future__rrZ nacl.bindingsrZ nacl.encodingrrZnacl.exceptionsrrrZ_strbytes_plus_oneZ,crypto_pwhash_scryptsalsa208sha256_STRPREFIXZ STRPREFIXZ,crypto_pwhash_scryptsalsa208sha256_SALTBYTESr Z-crypto_pwhash_scryptsalsa208sha256_PASSWD_MINZ PASSWD_MINZ-crypto_pwhash_scryptsalsa208sha256_PASSWD_MAXZ PASSWD_MAXrZ,crypto_pwhash_scryptsalsa208sha256_BYTES_MINZ BYTES_MINZ,crypto_pwhash_scryptsalsa208sha256_BYTES_MAXZ BYTES_MAXZ/crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MINZ MEMLIMIT_MINZ/crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_MAXZ MEMLIMIT_MAXZ/crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MINZ OPSLIMIT_MINZ/crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_MAXZ OPSLIMIT_MAXZ7crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_INTERACTIVEZOPSLIMIT_INTERACTIVEZ7crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_INTERACTIVEZMEMLIMIT_INTERACTIVEZ5crypto_pwhash_scryptsalsa208sha256_OPSLIMIT_SENSITIVEZOPSLIMIT_SENSITIVEZ5crypto_pwhash_scryptsalsa208sha256_MEMLIMIT_SENSITIVEZMEMLIMIT_SENSITIVEZOPSLIMIT_MODERATEZMEMLIMIT_MODERATEencodingZ RawEncoderrrr rrrrs:    D