mirror of
https://we.phorge.it/source/phorge.git
synced 2024-12-20 20:40:56 +01:00
Replace callsites to sha1() that use it to asciify entropy with
Filesystem::readRandomCharacters() Summary: See T547. To improve auditability of use of crypto-sensitive hash functions, use Filesystem::readRandomCharacters() in place of sha1(Filesystem::readRandomBytes()) when we're just generating random ASCII strings. Test Plan: - Generated a new PHID. - Logged out and logged back in (to test sessions). - Regenerated Conduit certificate. - Created a new task, verified mail key generated sensibly. - Created a new revision, verified mail key generated sensibly. - Ran "arc list", got blocked, installed new certificate, ran "arc list" again. Reviewers: jungejason, nh, tuomaspelkonen, aran, benmathews Reviewed By: jungejason CC: aran, epriestley, jungejason Differential Revision: 1000
This commit is contained in:
parent
abb39d06a2
commit
661f077bf7
6 changed files with 7 additions and 14 deletions
|
@ -40,7 +40,7 @@ class PhabricatorConduitTokenController extends PhabricatorConduitController {
|
|||
|
||||
$token = id(new PhabricatorConduitCertificateToken())
|
||||
->setUserPHID($user->getPHID())
|
||||
->setToken(sha1(Filesystem::readRandomBytes(128)))
|
||||
->setToken(Filesystem::readRandomCharacters(40))
|
||||
->save();
|
||||
|
||||
$panel = new AphrontPanelView();
|
||||
|
|
|
@ -117,7 +117,7 @@ class DifferentialRevision extends DifferentialDAO {
|
|||
|
||||
public function save() {
|
||||
if (!$this->getMailKey()) {
|
||||
$this->mailKey = sha1(Filesystem::readRandomBytes(20));
|
||||
$this->mailKey = Filesystem::readRandomCharacters(40);
|
||||
}
|
||||
return parent::save();
|
||||
}
|
||||
|
|
|
@ -47,7 +47,7 @@ final class PhabricatorS3FileStorageEngine
|
|||
public function writeFile($data, array $params) {
|
||||
$s3 = $this->newS3API();
|
||||
|
||||
$name = 'phabricator/'.sha1(Filesystem::readRandomBytes(20));
|
||||
$name = 'phabricator/'.Filesystem::readRandomCharacters(20);
|
||||
|
||||
AphrontWriteGuard::willWrite();
|
||||
$s3->putObject(
|
||||
|
|
|
@ -123,7 +123,7 @@ class ManiphestTask extends ManiphestDAO {
|
|||
|
||||
public function save() {
|
||||
if (!$this->mailKey) {
|
||||
$this->mailKey = sha1(Filesystem::readRandomBytes(20));
|
||||
$this->mailKey = Filesystem::readRandomCharacters(20);
|
||||
}
|
||||
|
||||
$result = parent::save();
|
||||
|
|
|
@ -97,10 +97,7 @@ class PhabricatorUser extends PhabricatorUserDAO {
|
|||
}
|
||||
|
||||
private function generateConduitCertificate() {
|
||||
$entropy = Filesystem::readRandomBytes(256);
|
||||
$entropy = base64_encode($entropy);
|
||||
$entropy = substr($entropy, 0, 255);
|
||||
return $entropy;
|
||||
return Filesystem::readRandomCharacters(255);
|
||||
}
|
||||
|
||||
public function comparePassword($password) {
|
||||
|
@ -259,8 +256,7 @@ class PhabricatorUser extends PhabricatorUserDAO {
|
|||
|
||||
// Consume entropy to generate a new session key, forestalling the eventual
|
||||
// heat death of the universe.
|
||||
$entropy = Filesystem::readRandomBytes(20);
|
||||
$session_key = sha1($entropy);
|
||||
$session_key = Filesystem::readRandomCharacters(40);
|
||||
|
||||
// UNGUARDED WRITES: Logging-in users don't have CSRF stuff yet.
|
||||
$unguarded = AphrontWriteGuard::beginScopedUnguardedWrites();
|
||||
|
|
|
@ -31,10 +31,7 @@ class PhabricatorPHID extends PhabricatorPHIDDAO {
|
|||
throw new Exception("Can not generate PHID with no type.");
|
||||
}
|
||||
|
||||
$entropy = Filesystem::readRandomBytes(20);
|
||||
|
||||
$uniq = sha1($entropy);
|
||||
$uniq = substr($uniq, 0, 20);
|
||||
$uniq = Filesystem::readRandomCharacters(20);
|
||||
$phid = 'PHID-'.$type.'-'.$uniq;
|
||||
|
||||
$phid_rec = new PhabricatorPHID();
|
||||
|
|
Loading…
Reference in a new issue