Uploaded From CV. Swandhana Server
This commit is contained in:
51
vendor/defuse/php-encryption/docs/FAQ.md
vendored
Normal file
51
vendor/defuse/php-encryption/docs/FAQ.md
vendored
Normal file
@@ -0,0 +1,51 @@
|
||||
Frequently Asked Questions
|
||||
===========================
|
||||
|
||||
How do I use this library to encrypt passwords?
|
||||
------------------------------------------------
|
||||
|
||||
Passwords should not be encrypted, they should be hashed with a *slow* password
|
||||
hashing function that's designed to slow down password guessing attacks. See
|
||||
[How to Safely Store Your Users' Passwords in
|
||||
2016](https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016).
|
||||
|
||||
How do I give it the same key every time instead of a new random key?
|
||||
----------------------------------------------------------------------
|
||||
|
||||
A `Key` object can be saved to a string by calling its `saveToAsciiSafeString()`
|
||||
method. You will have to save that string somewhere safe, and then load it back
|
||||
into a `Key` object using `Key`'s `loadFromAsciiSafeString` static method.
|
||||
|
||||
Where you store the string depends on your application. For example if you are
|
||||
using `KeyProtectedByPassword` to encrypt files with a user's login password,
|
||||
then you should not store the `Key` at all. If you are protecting sensitive data
|
||||
on a server that may be compromised, then you should store it in a hardware
|
||||
security module. When in doubt, consult a security expert.
|
||||
|
||||
Why is an EnvironmentIsBrokenException getting thrown?
|
||||
-------------------------------------------------------
|
||||
|
||||
Either you've encountered a bug in this library, or your system doesn't support
|
||||
the use of this library. For example, if your system does not have a secure
|
||||
random number generator, this library will refuse to run, by throwing that
|
||||
exception, instead of falling back to an insecure random number generator.
|
||||
|
||||
Why am I getting a BadFormatException when loading a Key from a string?
|
||||
------------------------------------------------------------------------
|
||||
|
||||
If you're getting this exception, then the string you're giving to
|
||||
`loadFromAsciiSafeString()` is *not* the same as the string you got from
|
||||
`saveToAsciiSafeString()`. Perhaps your database column isn't wide enough and
|
||||
it's truncating the string as you insert it?
|
||||
|
||||
Does encrypting hide the length of the plaintext?
|
||||
--------------------------------------------------
|
||||
|
||||
Encryption does not, and is not intended to, hide the length of the data being
|
||||
encrypted. For example, it is not safe to encrypt a field in which only a small
|
||||
number of different-length values are possible (e.g. "male" or "female") since
|
||||
it would be possible to tell what the plaintext is by looking at the length of
|
||||
the ciphertext. In order to do this safely, it is your responsibility to, before
|
||||
encrypting, pad the data out to the length of the longest string that will ever
|
||||
be encrypted. This way, all plaintexts are the same length, and no information
|
||||
about the plaintext can be gleaned from the length of the ciphertext.
|
||||
Reference in New Issue
Block a user