bascule (Tony Arcieri)
- Login: bascule
- Email: bascule@gmail.com
- Registered on: 02/26/2009
- Last sign in: 06/08/2018
Issues
| open | closed | Total | |
|---|---|---|---|
| Assigned issues | 0 | 0 | 0 |
| Reported issues | 2 | 2 | 4 |
Activity
06/06/2018
-
10:30 PM Ruby Feature #13821: Allow fibers to be resumed across threads
- Eregon (Benoit Daloze) wrote:
> It's also problematic for locks and other resources which are per-thread (some of them native so they cannot be tricked to use the initial Thread of the Fiber):
> ...
There's a simple solution to this: t...
10/29/2016
-
06:58 PM Ruby Feature #12802: Add BLAKE2 support to Digest
- Nice @ SHA-3 branch. I think it makes sense to add both.
The reason to add BLAKE2 in addition to SHA-3 is that BLAKE2 is, in some cases, over 3X faster than SHA-3 at an equivalent security level:
https://blake2.net/sandy.png
BLA...
10/26/2016
-
04:47 PM Ruby Feature #12802: Add BLAKE2 support to Digest
- BLAKE2b will work on 32-bit CPUs but is optimized for 64-bit CPUs
10/01/2016
-
05:49 PM Ruby Feature #12802 (Open): Add BLAKE2 support to Digest
- BLAKE2 is a fast, modern hash function, based on improvements to the BLAKE function, which was a SHA3 finalist. BLAKE2 performs about twice as fast in software as SHA3 winner Keccak:
https://blake2.net/
BLAKE2 has received an infor...
06/16/2016
-
04:10 PM Ruby Bug #9569: SecureRandom should try /dev/urandom first
- Note that libsodium's randombytes module just provides a cross-platform wrapper for OS RNGs, so really these two are the same:
* Use OS-provided random device (OP's choice)
* Use libsodium (Tony's choice)
05/29/2016
-
12:19 AM Ruby Bug #9569: SecureRandom should try /dev/urandom first
- I've created a new gem which packages the libsodium's "randombytes_sysrandom" as a self-contained RubyGem. It's called "sysrandom":
https://github.com/cryptosphere/sysrandom
Ideally I'd like to see SecureRandom adopt this same sort...
05/11/2016
-
05:55 AM Ruby Bug #9569: SecureRandom should try /dev/urandom first
- George Koehler: you're missing the point: the OS RNG should be used instead of OpenSSL's. That isn't necessarily /dev/urandom on every platform. Clearly /dev/urandom is a poor candidate for Windows (CryptGenRandom or RtlGenRandom should ...
05/06/2016
-
02:55 AM Ruby Bug #9569: SecureRandom should try /dev/urandom first
- In the meantime until upstream changes are made to SecureRandom, if anyone has come across this thread and is looking for a RubyGem that provides a /dev/urandom-based RNG (and a Windows equivalent), RbNaCl's RandomBytes module wraps libs...
04/13/2016
-
03:47 PM Ruby Bug #9569: SecureRandom should try /dev/urandom first
- I would just like to +1 that the text on the random(4) page is incorrect. Regarding fixing it, this bug has been open on the Linux kernel bug tracker for 2 years:
https://bugzilla.kernel.org/show_bug.cgi?id=71211
I would look to so...
01/19/2016
-
10:54 PM Ruby Feature #12008 (Open): Immutable object graphs (a.k.a. deep freeze)
- Hi there. I know some sort of "#deep_freeze" construct has been proposed many times before. I proposed it in this blog post in 2012: https://tonyarcieri.com/2012-the-year-rubyists-learned-to-stop-worrying-and-love-the-threads
I have a...