Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

argon2: avoid salt-length related panic (closes #134) #135

Merged
merged 1 commit into from
Feb 12, 2021

Conversation

tarcieri
Copy link
Member

Adds some additional advance checks that Argon2 parameters are within range, and returns errors in the event they are not.

This prevents a panic caused by what was previously an unimplemented! call when converting error types.

The occurrence of the panic in the first place speaks to overall deficiencies in the password-hash crate's error handling strategy.

It's further complicated by the awkwardness of the password_hash::Output::init_with API.

The code in this commit has TODOs for addressing the above, but it'd be good to open issues upstream on the password-hash crate about these problems, and ideally update the TODOs in the code with references to the issues.

cc @izik1

@tarcieri tarcieri force-pushed the argon2/fix-salt-length-panic branch 2 times, most recently from 549a8a5 to 00b4ee0 Compare February 12, 2021 04:19
Adds some additional advance checks that Argon2 parameters are within
range, and returns errors in the event they are not.

This prevents a panic caused by what was previously an `unimplemented!`
call when converting error types.

The occurrence of the panic in the first place speaks to overall
deficienciesin the `password-hash` crate's error handling strategy.

It's further complicated by the awkwardness of the
`password_hash::Output::init_with` API.

The code in this commit has TODOs for addressing the above, but it'd be
good to open issues upstream on the `password-hash` crate about these
problems, and ideally update the TODOs in the code with references to
the issues.
@tarcieri tarcieri merged commit 8d51e7e into master Feb 12, 2021
@tarcieri tarcieri deleted the argon2/fix-salt-length-panic branch February 12, 2021 14:51
@tarcieri
Copy link
Member Author

@izik1 unfortunately this doesn't give a good error for incorrect salt lengths (it's presently HasherError::Crypto), but at least it doesn't panic anymore.

I'll open some issues about improving the error handling story in password-hash v0.2, and in the meantime, cut another release with this fix.

tarcieri added a commit that referenced this pull request May 28, 2021
Now that error handling has been improved in `password-hash` v0.2, these
are no longer needed as the errors will be properly handled in the
`hash_password_into` function.
tarcieri added a commit that referenced this pull request May 28, 2021
Now that error handling has been improved in `password-hash` v0.2, these
are no longer needed as the errors will be properly handled in the
`hash_password_into` function.
tarcieri added a commit that referenced this pull request May 28, 2021
Now that error handling has been improved in `password-hash` v0.2, these
are no longer needed as the errors will be properly handled in the
`hash_password_into` function.
dns2utf8 pushed a commit to dns2utf8/password-hashes that referenced this pull request Jan 24, 2023
universal-hash: split out NewUniversalHash trait
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant