https://www.mediawiki.org/wiki/Special:Code/MediaWiki/114355
Revision: 114355
Author: tstarling
Date: 2012-03-21 10:43:05 +0000 (Wed, 21 Mar 2012)
Log Message:
-----------
MFT r114354: MWCryptRand $method parameter removal
Modified Paths:
--------------
branches/REL1_19/phase3/includes/CryptRand.php
branches/REL1_19/phase3/includes/GlobalFunctions.php
branches/REL1_19/phase3/includes/User.php
branches/REL1_19/phase3/includes/specials/SpecialUserlogin.php
Property Changed:
----------------
branches/REL1_19/phase3/includes/GlobalFunctions.php
Modified: branches/REL1_19/phase3/includes/CryptRand.php
===================================================================
--- branches/REL1_19/phase3/includes/CryptRand.php 2012-03-21 10:27:34 UTC
(rev 114354)
+++ branches/REL1_19/phase3/includes/CryptRand.php 2012-03-21 10:43:05 UTC
(rev 114355)
@@ -256,17 +256,10 @@
/**
* @see self::generate()
*/
- public function realGenerate( $bytes, $forceStrong = false, $method =
null ) {
+ public function realGenerate( $bytes, $forceStrong = false ) {
wfProfileIn( __METHOD__ );
- if ( is_string( $forceStrong ) && is_null( $method ) ) {
- // If $forceStrong is a string then it's really $method
- $method = $forceStrong;
- $forceStrong = false;
- }
- if ( !is_null( $method ) ) {
- wfDebug( __METHOD__ . ": Generating cryptographic
random bytes for $method\n" );
- }
+ wfDebug( __METHOD__ . ": Generating cryptographic random bytes
for " . wfGetAllCallers( 5 ) . "\n" );
$bytes = floor( $bytes );
static $buffer = '';
@@ -285,7 +278,6 @@
if ( function_exists( 'mcrypt_create_iv' ) ) {
wfProfileIn( __METHOD__ . '-mcrypt' );
$rem = $bytes - strlen( $buffer );
- wfDebug( __METHOD__ . ": Trying to generate
$rem bytes of randomness using mcrypt_create_iv.\n" );
$iv = mcrypt_create_iv( $rem,
MCRYPT_DEV_URANDOM );
if ( $iv === false ) {
wfDebug( __METHOD__ . ":
mcrypt_create_iv returned false.\n" );
@@ -306,7 +298,6 @@
) {
wfProfileIn( __METHOD__ . '-openssl' );
$rem = $bytes - strlen( $buffer );
- wfDebug( __METHOD__ . ": Trying to generate
$rem bytes of randomness using openssl_random_pseudo_bytes.\n" );
$openssl_bytes = openssl_random_pseudo_bytes(
$rem, $openssl_strong );
if ( $openssl_bytes === false ) {
wfDebug( __METHOD__ . ":
openssl_random_pseudo_bytes returned false.\n" );
@@ -327,7 +318,6 @@
if ( strlen( $buffer ) < $bytes && ( function_exists(
'stream_set_read_buffer' ) || $forceStrong ) ) {
wfProfileIn( __METHOD__ . '-fopen-urandom' );
$rem = $bytes - strlen( $buffer );
- wfDebug( __METHOD__ . ": Trying to generate $rem bytes
of randomness using /dev/urandom.\n" );
if ( !function_exists( 'stream_set_read_buffer' ) &&
$forceStrong ) {
wfDebug( __METHOD__ . ": Was forced to read
from /dev/urandom without control over the buffer size.\n" );
}
@@ -351,7 +341,6 @@
stream_set_read_buffer( $urandom, $rem
);
$chunk_size = $rem;
}
- wfDebug( __METHOD__ . ": Reading from
/dev/urandom with a buffer size of $chunk_size.\n" );
$random_bytes = fread( $urandom, max(
$chunk_size, $rem ) );
$buffer .= $random_bytes;
fclose( $urandom );
@@ -399,13 +388,13 @@
/**
* @see self::generateHex()
*/
- public function realGenerateHex( $chars, $forceStrong = false, $method
= null ) {
+ public function realGenerateHex( $chars, $forceStrong = false ) {
// hex strings are 2x the length of raw binary so we divide the
length in half
// odd numbers will result in a .5 that leads the generate()
being 1 character
// short, so we use ceil() to ensure that we always have enough
bytes
$bytes = ceil( $chars / 2 );
// Generate the data and then convert it to a hex string
- $hex = bin2hex( $this->generate( $bytes, $forceStrong, $method
) );
+ $hex = bin2hex( $this->generate( $bytes, $forceStrong ) );
// A bit of paranoia here, the caller asked for a specific
length of string
// here, and it's possible (eg when given an odd number) that
we may actually
// have at least 1 char more than they asked for. Just in case
they made this
@@ -449,11 +438,10 @@
* @param $forceStrong bool Pass true if you want generate to prefer
cryptographically
* strong sources of entropy even if reading
from them may steal
* more entropy from the system than optimal.
- * @param $method The calling method, for debug info. May be the second
argument if you are not using forceStrong
* @return String Raw binary random data
*/
- public static function generate( $bytes, $forceStrong = false, $method
= null ) {
- return self::singleton()->realGenerate( $bytes, $forceStrong,
$method );
+ public static function generate( $bytes, $forceStrong = false ) {
+ return self::singleton()->realGenerate( $bytes, $forceStrong );
}
/**
@@ -466,11 +454,10 @@
* @param $forceStrong bool Pass true if you want generate to prefer
cryptographically
* strong sources of entropy even if reading
from them may steal
* more entropy from the system than optimal.
- * @param $method The calling method, for debug info. May be the second
argument if you are not using forceStrong
* @return String Hexadecimal random data
*/
- public static function generateHex( $chars, $forceStrong = false,
$method = null ) {
- return self::singleton()->realGenerateHex( $chars,
$forceStrong, $method );
+ public static function generateHex( $chars, $forceStrong = false ) {
+ return self::singleton()->realGenerateHex( $chars, $forceStrong
);
}
}
Modified: branches/REL1_19/phase3/includes/GlobalFunctions.php
===================================================================
--- branches/REL1_19/phase3/includes/GlobalFunctions.php 2012-03-21
10:27:34 UTC (rev 114354)
+++ branches/REL1_19/phase3/includes/GlobalFunctions.php 2012-03-21
10:43:05 UTC (rev 114355)
@@ -3314,7 +3314,7 @@
// If built-in entropy is not enabled or not sufficient override php's
built in session id generation code
if ( !$entropyEnabled ) {
wfDebug( __METHOD__ . ": PHP's built in entropy is disabled or
not sufficient, overriding session id generation using our cryptrand source.\n"
);
- session_id( MWCryptRand::generateHex( 32, __METHOD__ ) );
+ session_id( MWCryptRand::generateHex( 32 ) );
}
}
Property changes on: branches/REL1_19/phase3/includes/GlobalFunctions.php
___________________________________________________________________
Modified: svn:mergeinfo
- /branches/FileBackend/phase3/includes/GlobalFunctions.php:99972-106750
/branches/JSTesting/includes/GlobalFunctions.php:100352-107913
/branches/REL1_15/phase3/includes/GlobalFunctions.php:51646
/branches/new-installer/phase3/includes/GlobalFunctions.php:43664-66004
/branches/resourceloader/phase3/includes/GlobalFunctions.php:71750
/branches/sqlite/includes/GlobalFunctions.php:58211-58321
/branches/wmf/1.17wmf1/includes/GlobalFunctions.php:81718
/branches/wmf-deployment/includes/GlobalFunctions.php:53381
/trunk/phase3/includes/GlobalFunctions.php:112326-112327,112352
+ /branches/FileBackend/phase3/includes/GlobalFunctions.php:99972-106750
/branches/JSTesting/includes/GlobalFunctions.php:100352-107913
/branches/REL1_15/phase3/includes/GlobalFunctions.php:51646
/branches/new-installer/phase3/includes/GlobalFunctions.php:43664-66004
/branches/resourceloader/phase3/includes/GlobalFunctions.php:71750
/branches/sqlite/includes/GlobalFunctions.php:58211-58321
/branches/wmf/1.17wmf1/includes/GlobalFunctions.php:81718
/branches/wmf-deployment/includes/GlobalFunctions.php:53381
/trunk/phase3/includes/GlobalFunctions.php:112326-112327,112352,114354
Modified: branches/REL1_19/phase3/includes/User.php
===================================================================
--- branches/REL1_19/phase3/includes/User.php 2012-03-21 10:27:34 UTC (rev
114354)
+++ branches/REL1_19/phase3/includes/User.php 2012-03-21 10:43:05 UTC (rev
114355)
@@ -842,7 +842,7 @@
// Multiply by 1.25 to get the number of hex characters we need
$length = $length * 1.25;
// Generate random hex chars
- $hex = MWCryptRand::generateHex( $length, __METHOD__ );
+ $hex = MWCryptRand::generateHex( $length );
// Convert from base 16 to base 32 to get a proper password
like string
return wfBaseConvert( $hex, 16, 32 );
}
@@ -2039,7 +2039,7 @@
global $wgSecretKey, $wgProxyKey;
$this->load();
if ( !$token ) {
- $this->mToken = MWCryptRand::generateHex(
USER_TOKEN_LENGTH, __METHOD__ );
+ $this->mToken = MWCryptRand::generateHex(
USER_TOKEN_LENGTH );
} else {
$this->mToken = $token;
}
@@ -3192,7 +3192,7 @@
} else {
$token = $request->getSessionData( 'wsEditToken' );
if ( $token === null ) {
- $token = MWCryptRand::generateHex( 32,
__METHOD__ );
+ $token = MWCryptRand::generateHex( 32 );
$request->setSessionData( 'wsEditToken', $token
);
}
if( is_array( $salt ) ) {
@@ -3209,7 +3209,7 @@
* @return String The new random token
*/
public static function generateToken( $salt = '' ) {
- return MWCryptRand::generateHex( 32, __METHOD__ );
+ return MWCryptRand::generateHex( 32 );
}
/**
@@ -3316,7 +3316,7 @@
$now = time();
$expires = $now + $wgUserEmailConfirmationTokenExpiry;
$this->load();
- $token = MWCryptRand::generateHex( 32, __METHOD__ );
+ $token = MWCryptRand::generateHex( 32 );
$hash = md5( $token );
$this->mEmailToken = $hash;
$this->mEmailTokenExpires = wfTimestamp( TS_MW, $expires );
@@ -3868,7 +3868,7 @@
if( $wgPasswordSalt ) {
if ( $salt === false ) {
- $salt = MWCryptRand::generateHex( 8, __METHOD__
);
+ $salt = MWCryptRand::generateHex( 8 );
}
return ':B:' . $salt . ':' . md5( $salt . '-' . md5(
$password ) );
} else {
Modified: branches/REL1_19/phase3/includes/specials/SpecialUserlogin.php
===================================================================
--- branches/REL1_19/phase3/includes/specials/SpecialUserlogin.php
2012-03-21 10:27:34 UTC (rev 114354)
+++ branches/REL1_19/phase3/includes/specials/SpecialUserlogin.php
2012-03-21 10:43:05 UTC (rev 114355)
@@ -1138,7 +1138,7 @@
global $wgRequest;
// Generate a token directly instead of using $user->editToken()
// because the latter reuses $_SESSION['wsEditToken']
- $wgRequest->setSessionData( 'wsLoginToken',
MWCryptRand::generateHex( 32, __METHOD__ ) );
+ $wgRequest->setSessionData( 'wsLoginToken',
MWCryptRand::generateHex( 32 ) );
}
/**
@@ -1162,7 +1162,7 @@
*/
public static function setCreateaccountToken() {
global $wgRequest;
- $wgRequest->setSessionData( 'wsCreateaccountToken',
MWCryptRand::generateHex( 32, __METHOD__ ) );
+ $wgRequest->setSessionData( 'wsCreateaccountToken',
MWCryptRand::generateHex( 32 ) );
}
/**
_______________________________________________
MediaWiki-CVS mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/mediawiki-cvs