Where communities thrive


  • Join over 1.5M+ people
  • Join over 100K+ communities
  • Free without limits
  • Create your own community
People
Activity
    str4d
    @str4d
    I suggested the paper mostly because it wasn't paywalled
    Tony Arcieri
    @tarcieri
    yeah that’s doable for the AEAD cases but not given the current UniversalHash API
    str4d
    @str4d
    (and they had code, which they obtained directly from Goll-Gueron)

    Original:

        st->k = AND256(PERM32(k, SET32(3,7,2,6,1,5,0,4)), SET32(0,-1,0,-1,0,-1,0,-1));

    Mine:

    impl AdditionKey {
        pub(super) unsafe fn from_key(secret_key: __m256i) -> Self {
            // The addition key is the second half of the secret key; mask out the lower bits.
            let upper_bits = _mm256_and_si256(secret_key, _mm256_set_epi32(-1, -1, -1, -1, 0, 0, 0, 0));
    
            // Shuffle the 32-bit words so they can be read as 64-bit words:
            //     [k_3, k_2, k_1, k_0, 0, 0, 0, 0] -> [0, k_3, 0, k_2, 0, k_1, 0, k_0]
            let k = _mm256_permutevar8x32_epi32(upper_bits, _mm256_set_epi32(3, 7, 2, 6, 1, 5, 0, 4));
    
            AdditionKey(k)
        }
    }
    Tony Arcieri
    @tarcieri
    it is also true the AEAD case has… different requirements from the stream-cipher or universal-hash API
    for the latter, it’s kind of captured in update_padded
    which can be optimized for those wider-than-block-sized cases
    Caleb Maclennan
    @alerque
    Nice Trogdor nod there in the logo ;-)
    Tony Arcieri
    @tarcieri
    haha, thanks
    mmacedo
    @mmacedoeu
    hi, is there any example for signal handling in abscissa core ?
    Tony Arcieri
    @tarcieri
    unfortunately not. at some point I’ve been meaning to put together a GitBook that covers all of the existing features...
    Zaki Manian
    @zmanian
    We have signal handling in the KMS
    Might be a good example
    Tony Arcieri
    @tarcieri
    well, we did, until that was implicated in several deadlocks and I ripped it out...
    Zaki Manian
    @zmanian
    Oh
    (Charles_K)
    @charleschege
    @tarcieri I am building an authentication system and I want to save time as TAI64 since I don't care about leap seconds or the time being human readable. Chrono is really big time library and I want something small so Tai64 crate seems like a good candidate. However, when I try to use it with Secrecy::Secret, it errors out with zeroize not implemented for Tai64N, I don't want time to be accessible from the console via debug, so is implementing Zeroize for Tai64 a good idea? Can the feature be added to the Tai64 crate?
    Tony Arcieri
    @tarcieri
    sure, and yes
    just add a zeroize feature to tai64
    i.e. add zeroize as an optional dependency
    (Charles_K)
    @charleschege
    @tarcieri I have implemented the zeroize feature, all checks have passed except the code coverage one, I am unable to solve that and would like some help
    (Charles_K)
    @charleschege
    @tarcieri I have a project that requires a value to be hashed into a hashmap, but the value is of secrecy::Secret<T>. Would there be a security problem if I implement Hash for Secret<T>?
    Tony Arcieri
    @tarcieri
    that’s a tricky question, as used incorrectly it could leak information about the secret. Ditto for Ord
    something like DebugSecret that marks the underlying impl does constant-time comparisons or hashing could work
    Santiago Torres
    @SantiagoTorres
    hey, I've been trying zero-out the emmc on an usbarmory by following the instructions in here https://github.com/iqlusioninc/usbarmory.rs/tree/develop/firmware/usbarmory#setting-up-an-emmc-boot
    for some reason minicom doesn't seem to be working (on this line minicom -b 115200 -D /dev/ttyUSB2), I don't get any echo back. I wonder what'd be a good place to start debugging my situation
    Zaki Manian
    @zmanian
    Hi!
    Santiago Torres
    @SantiagoTorres
    zmanian: hey! :D
    Zaki Manian
    @zmanian
    So one thing is the the basic examples with the USB runner will work without zeroing the eMMC if it’s a fresh from box device
    Santiago Torres
    @SantiagoTorres
    I'm still rather worried that I may not have been setting the debugger dongle properly :(
    Santiago Torres
    @SantiagoTorres
    I'm starting to think that my u-boot build is proabbly what's bork
    Zaki Manian
    @zmanian
    So one thing we’ve found with the debugger board is on cold boot it take 500ms to warm up
    So I spent a very frustrating weekend debugging not getting debugger board output
    One thing to try is just doing the rust blink example
    We are right in the middle of this big Game of Zones project
    Will have more time to help you mid week
    Santiago Torres
    @SantiagoTorres
    okido, thanks! I'll try to do blinky then
    Santiago Torres
    @SantiagoTorres
    woot, blinky works :)
    yeah, I assume that the hello, world! should be read from the UART, but I can't see anything :/
    Tony Arcieri
    @tarcieri
    yeah, we had some odd problems with it on MacOS
    you're on Linux?
    Santiago Torres
    @SantiagoTorres
    yup, arch on 5.6.8
    I've been trying to sniff on usbmon to see if there's traffic and there's defo sth going on
    Santiago Torres
    @SantiagoTorres
    I kinda wonder if it's one of those "cheap microusb cable is adding noise and breaking things" situations
    Zaki Manian
    @zmanian
    @SantiagoTorres if you drop a delay into hello world it should work
    Santiago Torres
    @SantiagoTorres
    zmanian: oh, let me try that one out
    Zaki Manian
    @zmanian
    this is just the warmup period on the debug board
    Santiago Torres
    @SantiagoTorres
    ah, I thought that was what COLD_BOOT=1 was doing no?