niluxv
niluxv
Instead of this implementation (`self.get[_mut](index).unwrap()`) we could also use ```rust self.deref().index[_mut](index) ``` Maybe that gives better error messages in some situations? I don't know...
No problem. I changed the implementation as described above because it indeed gives much better error messages on out of bounds errors, and added some tests.
So I changed the trait bounds as you suggested and just now added implementations to `ArrayString` analogous to those for `ArrayVec`. I also removed the documentation I initially added to...
> you can already index arrayvec because it derefs to slice Ah, didn't think of that. I created a PR which implements `Index` and `IndexMut` (also through).
Feels like you want `core::arch::asm!`: ```rust pub fn CONSTANT_TIME_value_barrier_w(mut x: CryptoWord) -> CryptoWord { unsafe { core::arch::asm!( "/* {0} */", inout(reg) x, options(nostack,preserves_flags,nomem,pure), ); } x } ``` ([playground](https://play.rust-lang.org/?version=stable&mode=release&edition=2021&gist=fbb3ab8e8945ebcd0cbad218774b3470)) Stable...
In Rust-Crypto the associated data should be passed to the `crypto::some_module::SomeAeadEncryptorAlgo::new()` function, and not the `some_aead_encryptor_instance.encrypt()`.
You are right. The seed has to be 32 bytes long. Added the assert to [Rust-crypto-maintained](https://github.com/niluxv/rust-crypto). Thanks.
I invoke prusti from the commandline as `cargo-prusti`. It was a small library project, but I now minimised it down to a `lib.rs` ```rust pub unsafe fn volatile_write_zero(ptr: *mut u8)...
The main thing to worry about is probably secret memory being swapped out (to potentially unencrypted swap). The only *proper* solution is that the user configures ephemerally encrypted swap. (Although...
`linked-hash-map` triggers UB (detected by miri). See the issue you linked and [this issue at `rustbreak`](https://github.com/TheNeikos/rustbreak/issues/87)(which has `linked-hash-map` only as a transitive dependency through this crate and `serde_yaml` and already...