-
Star
(110)
You must be signed in to star a gist -
Fork
(26)
You must be signed in to fork a gist
-
-
Save dopey/c69559607800d2f2f90b1b1ed4e550fb to your computer and use it in GitHub Desktop.
| package main | |
| import ( | |
| "crypto/rand" | |
| "encoding/base64" | |
| "fmt" | |
| "io" | |
| "math/big" | |
| ) | |
| // Adapted from https://elithrar.github.io/article/generating-secure-random-numbers-crypto-rand/ | |
| func init() { | |
| assertAvailablePRNG() | |
| } | |
| func assertAvailablePRNG() { | |
| // Assert that a cryptographically secure PRNG is available. | |
| // Panic otherwise. | |
| buf := make([]byte, 1) | |
| _, err := io.ReadFull(rand.Reader, buf) | |
| if err != nil { | |
| panic(fmt.Sprintf("crypto/rand is unavailable: Read() failed with %#v", err)) | |
| } | |
| } | |
| // GenerateRandomBytes returns securely generated random bytes. | |
| // It will return an error if the system's secure random | |
| // number generator fails to function correctly, in which | |
| // case the caller should not continue. | |
| func GenerateRandomBytes(n int) ([]byte, error) { | |
| b := make([]byte, n) | |
| _, err := rand.Read(b) | |
| // Note that err == nil only if we read len(b) bytes. | |
| if err != nil { | |
| return nil, err | |
| } | |
| return b, nil | |
| } | |
| // GenerateRandomString returns a securely generated random string. | |
| // It will return an error if the system's secure random | |
| // number generator fails to function correctly, in which | |
| // case the caller should not continue. | |
| func GenerateRandomString(n int) (string, error) { | |
| const letters = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-" | |
| ret := make([]byte, n) | |
| for i := 0; i < n; i++ { | |
| num, err := rand.Int(rand.Reader, big.NewInt(int64(len(letters)))) | |
| if err != nil { | |
| return "", err | |
| } | |
| ret[i] = letters[num.Int64()] | |
| } | |
| return string(ret), nil | |
| } | |
| // GenerateRandomStringURLSafe returns a URL-safe, base64 encoded | |
| // securely generated random string. | |
| // It will return an error if the system's secure random | |
| // number generator fails to function correctly, in which | |
| // case the caller should not continue. | |
| func GenerateRandomStringURLSafe(n int) (string, error) { | |
| b, err := GenerateRandomBytes(n) | |
| return base64.URLEncoding.EncodeToString(b), err | |
| } | |
| func main() { | |
| // Example: this will give us a 44 byte, base64 encoded output | |
| token, err := GenerateRandomStringURLSafe(32) | |
| if err != nil { | |
| // Serve an appropriately vague error to the | |
| // user, but log the details internally. | |
| panic(err) | |
| } | |
| fmt.Println(token) | |
| // Example: this will give us a 32 byte output | |
| token, err = GenerateRandomString(32) | |
| if err != nil { | |
| // Serve an appropriately vague error to the | |
| // user, but log the details internally. | |
| panic(err) | |
| } | |
| fmt.Println(token) | |
| } |
One thing to note is that it looks like this code suffers from modulo bias. On line 53, the following code is used:
bytes[i] = letters[b%byte(len(letters))]b is a random byte between 0 and 255 inclusive, while the letters array is 63 characters. 255 % 63 is 3, which means the characters 0, 1, and 2, will have a slightly higher chance of showing up in your generated string. It could get even worse with other values for the letters constant`
A better way of implementing this to avoid statistical bias would probably be via Golang's crypto.Int function. That way, you can generate a random number between 0 and len(letters) - 1 with statistical uniformity. Something along the lines of:
func GenerateRandomString(n int) (string, error) {
const letters = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-"
ret := make([]byte, n)
for i := 0; i < n; i++ {
num, err := rand.Int(rand.Reader, big.NewInt(int64(len(letters))))
if err != nil {
return "", err
}
ret = append(ret, letters[num.Int64()])
}
return string(ret), nil
}EDIT
Actually, it appears this exact same criticism was given for the code this was forked from: https://gist.github.com/denisbrodbeck/635a644089868a51eccd6ae22b2eb800#gistcomment-2227109
One thing to note is that it looks like this code suffers from modulo bias. On line 53, the following code is used:
bytes[i] = letters[b%byte(len(letters))]
bis a random byte between 0 and 255 inclusive, while thelettersarray is 63 characters.255 % 63is 3, which means the characters0,1, and2, will have a slightly higher chance of showing up in your generated string. It could get even worse with other values for thelettersconstant`A better way of implementing this to avoid statistical bias would probably be via Golang's
crypto.Intfunction. That way, you can generate a random number between0andlen(letters) - 1with statistical uniformity. Something along the lines of:func GenerateRandomString(n int) (string, error) { const letters = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-" ret := make([]byte, n) for i := 0; i < n; i++ { num, err := rand.Int(rand.Reader, big.NewInt(int64(len(letters)))) if err != nil { return "", err } ret = append(ret, letters[num.Int64()]) } return string(ret), nil }EDIT
Actually, it appears this exact same criticism was given for the code this was forked from: https://gist.github.com/denisbrodbeck/635a644089868a51eccd6ae22b2eb800#gistcomment-2227109
ret := make([]byte,n) // len(ret) = n
...
ret = append(ret, letters[num.Int64()]) // len(ret) = 2n
@kaigedong You're right, that's my bad. I constantly forget when I pre-allocate my slices :)
Here's the fixed version
func GenerateRandomString(n int) (string, error) {
const letters = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz-"
ret := make([]byte, n)
for i := 0; i < n; i++ {
num, err := rand.Int(rand.Reader, big.NewInt(int64(len(letters))))
if err != nil {
return "", err
}
ret[i] = letters[num.Int64()]
}
return string(ret), nil
}thanks
Thanks folks. Gist updated.
With regards to licensing, I'm not sure. As already stated, I forked from @denisbrodbeck. Not sure what licensing (if any) was intended.
Thanks @denisbrodbeck. Cheers!
Thanks for the useful snippets!
For me, the supposedly URLsafe string generated with GenerateRandomStringURLSafe() unfortunately contained "=".
I now use base64.RawURLEncoding instead of base64.URLEncoding , so the strings are really URLsafe ;)
Cheers
@stonymahony is that something I should update the gist with?
Had to add "math/big" to imports to get this code to work FYI
@kyle-aoki added. thanks!
Maybe give this a shot and improve it for others to use as well ? I had similar usecase sometime ago https://pkg.go.dev/github.com/imusmanmalik/randomizer
thanks
Can't you just do rand.read and get random bytes, then encode it to base64?
I would like to know licensing of this as well