diff options
author | Mark Felder <feld@feld.me> | 2024-02-14 17:54:56 -0500 |
---|---|---|
committer | Mark Felder <feld@feld.me> | 2024-02-14 17:54:56 -0500 |
commit | 86e6d395d931f532b18fccdeb65c300b22fbce8a (patch) | |
tree | 767834226af71d1f73c02a24392d6a7ef2cedefe | |
parent | 79d69ce72a4a922d1be8f3aae36d5fff3089fd1c (diff) | |
download | pleroma-86e6d395d931f532b18fccdeb65c300b22fbce8a.tar.gz pleroma-86e6d395d931f532b18fccdeb65c300b22fbce8a.zip |
Fix atom leak in password digest functionality
The value here gets passesd to :crypto.pbkdf2_hmac and it expects one of these atoms: :sha | :sha224 | :sha256 | :sha384 | :sha512 so it will always exist
-rw-r--r-- | lib/pleroma/password/pbkdf2.ex | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/pleroma/password/pbkdf2.ex b/lib/pleroma/password/pbkdf2.ex index 92e9e1952..9c6d2e381 100644 --- a/lib/pleroma/password/pbkdf2.ex +++ b/lib/pleroma/password/pbkdf2.ex @@ -28,7 +28,7 @@ defmodule Pleroma.Password.Pbkdf2 do iterations = String.to_integer(iterations) - digest = String.to_atom(digest) + digest = String.to_existing_atom(digest) binary_hash = KeyGenerator.generate(password, salt, digest: digest, iterations: iterations, length: 64) |