Hi,
I noticed there is no merging/update activities on the gitlab website:
https://git.lysator.liu.se/nettle/nettle/merge_requests?scope=all&state=all
I wonder if it's used.
The reason for asking is that I'm willing to integrate a ppc64le-specific implementation using SIMD registers for the SHA-2 algorithm so I would create an Issue to discuss it and then submitting the code as a Merge Request. But only if that's the way for upstreaming code on nettle. If not, please advise if this list can be used.
Sorry for using the "nettle-bugs" mailing list, which is not a discussion mailing list.
Cheers,
Gustavo Serra Scalet
Hi,
One of the items that have been on my todo-list after discussing with
application writers of multi-threaded applications (mainly servers),
is addressing the issue of synchronization for the random generator.
Currently gnutls provides a "central" random generator based on yarrow
(for keys) and salsa20 (for nonces) primitives, and it is thread safe
by utilizing mutexes over it. An application that has more than
100-200 threads is most likely to spend more time in synchronization
rather than the random generator itself. A solution to that would be
to provide a thread-local random generator which will work lock-free,
at the cost of additional memory per-thread -around 600-700 bytes for
the current generator-.
I have an experimental patch set, implementing this idea at:
https://gitlab.com/gnutls/gnutls/merge_requests/259
On the patch above, the additional cost per thread will only be for
threads actually utilizing gnutls, and in particular the random
generator, as the required memory will be allocated after the first
call to gnutls_rnd() by the thread.
Are there any objections on such an enhancement to gnutls, or
suggestions on how such a lock-free random generator could be improved
(in terms of memory utilization for example)?
regards,
Nikos
Hi,
There is a sha1 collision detection library at:
https://github.com/cr-marcstevens/sha1collisiondetection
Given that algorithms like sha1 are notoriously hard to phase out,
does it make sense for nettle to add support for collision detection,
in effect giving applications the option to switch to a mode where a
known to be insecure hash is enabled, but with such collision detection
mitigations in place.
Does something like the above library make sense to be added to nettle?
regards,
Nikos