On Friday, 3 April 2015 at 20:41:26 UTC, Martin Nowak wrote:
On 04/02/2015 02:10 PM, Kagamin wrote:

The vulnerability presentation suggests perl solution (random hash seed) is good enough, it doesn't slow down anything. The seed can be left zero and initialized by an application as needed. One can also use a longer key and add more its bits every, say, 10 bytes of hashed data, not sure
if it will make any difference.

A global random hash seed would work, but it needs to be accessible for
reproducing test cases (druntime DRT option or in core.runtime).

At least for a library hashmap, you could provide a hash seed at compile time, or as some static value and maybe lie about purity.

Reply via email to