argon2id 0.9.0 → 0.10.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d4a600a6e10a83d05296ef55962148bd5d1ca114e345c8a88e720b59edeaa2e7
4
- data.tar.gz: 6e4edc5518a6726eb1d6478f9114d0ac5c3a6d7d495bb3066e5d49bc91334ec0
3
+ metadata.gz: e0c1f14a040ebdc7471675955d1e5c724cbed8cba788fd6114531dc72a27a326
4
+ data.tar.gz: 7d11467702a3302cc0f52f9788ab09067e7e06887d11626d06d373356b0f2854
5
5
  SHA512:
6
- metadata.gz: c6c61266aff2bc205e0ab743e25240c03d51ef3aa29205a0d16a1ce23aec500c1edd9c8f336520454baedcf8ea5855d2f3d03996953e3c32cd4a2491a46ea7ea
7
- data.tar.gz: 8fc306431023691458c24e9ca98d957f4d1cf6ad3a1cba551e03457795705cb1908b44a2afca3ae31d73b7edabfd9be29950eef245e482c7f3c097c825d212ba
6
+ metadata.gz: 185378fff2e71104dcd6b6a338286bb6e3636164c1acf7f273e7cfc03128e148d138d4a610dc6ae22c25ccf90e848e0801be229846e86367097eabce07def840
7
+ data.tar.gz: 0cf1f354e2194e27c781aadc9d3cb9903ed0dd86062af51e8b85778305b0a569e976e6589fcdb17783c32c88cd345f474ddc86e5c165004aadf889d51a5f4f4b
data/CHANGELOG.md CHANGED
@@ -5,6 +5,19 @@ All notable changes to this project will be documented in this file.
5
5
  The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
6
6
  and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
7
 
8
+ ## [0.10.0] - 2026-04-06
9
+
10
+ ### Changed
11
+
12
+ - Hashing and verifying passwords no longer holds the Ruby Global VM Lock
13
+ during the intentionally expensive computation of the Argon2id hash, allowing
14
+ other threads to do work at the same time.
15
+ - Argon2id::Password objects, their encoded password hash, salt, and hash
16
+ output strings are now all frozen to prevent mutation. Inputs are also now
17
+ frozen ASAP during hashing and verification to prevent mutation before
18
+ passing to the internal C/Java implementation of Argon2.
19
+ - The extension is now flagged as safe to use with Ractors.
20
+
8
21
  ## [0.9.0] - 2025-12-30
9
22
 
10
23
  ### Added
@@ -151,6 +164,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
151
164
  reference C implementation of Argon2, the password-hashing function that won
152
165
  the Password Hashing Competition.
153
166
 
167
+ [0.10.0]: https://github.com/mudge/argon2id/releases/tag/v0.10.0
154
168
  [0.9.0]: https://github.com/mudge/argon2id/releases/tag/v0.9.0
155
169
  [0.8.0]: https://github.com/mudge/argon2id/releases/tag/v0.8.0
156
170
  [0.8.0.rc1]: https://github.com/mudge/argon2id/releases/tag/v0.8.0.rc1
data/README.md CHANGED
@@ -5,7 +5,7 @@ Ruby bindings to [Argon2][], the password-hashing function that won the 2015
5
5
 
6
6
  [![Build Status](https://github.com/mudge/argon2id/actions/workflows/tests.yml/badge.svg?branch=main)](https://github.com/mudge/argon2id/actions)
7
7
 
8
- **Current version:** 0.9.0
8
+ **Current version:** 0.10.0
9
9
  **Bundled Argon2 version:** libargon2.1 (20190702)
10
10
 
11
11
  ```ruby
@@ -1,4 +1,5 @@
1
1
  #include <ruby.h>
2
+ #include <ruby/thread.h>
2
3
  #include <stdint.h>
3
4
 
4
5
  #include "argon2.h"
@@ -8,64 +9,176 @@
8
9
  VALUE mArgon2id, cArgon2idError, cArgon2idPassword;
9
10
  ID id_encoded;
10
11
 
12
+ struct hash_encoded_args {
13
+ uint32_t t_cost;
14
+ uint32_t m_cost;
15
+ uint32_t parallelism;
16
+ const char *pwd;
17
+ size_t pwdlen;
18
+ const char *salt;
19
+ size_t saltlen;
20
+ uint32_t outlen;
21
+ char *encoded;
22
+ size_t encodedlen;
23
+ int result;
24
+ };
25
+
26
+ static void *
27
+ nogvl_hash_encoded(void *data)
28
+ {
29
+ struct hash_encoded_args *args = data;
30
+ args->result = argon2id_hash_encoded(args->t_cost, args->m_cost,
31
+ args->parallelism, args->pwd, args->pwdlen, args->salt, args->saltlen,
32
+ args->outlen, args->encoded, args->encodedlen);
33
+
34
+ return NULL;
35
+ }
36
+
37
+ struct verify_args {
38
+ const char *encoded;
39
+ const char *pwd;
40
+ size_t pwdlen;
41
+ int result;
42
+ };
43
+
44
+ static void *
45
+ nogvl_verify(void *data)
46
+ {
47
+ struct verify_args *args = data;
48
+ args->result = argon2id_verify(args->encoded, args->pwd, args->pwdlen);
49
+
50
+ return NULL;
51
+ }
52
+
53
+ struct hash_encoded_data {
54
+ char *encoded;
55
+ VALUE pwd;
56
+ VALUE salt;
57
+ struct hash_encoded_args args;
58
+ };
59
+
60
+ static VALUE
61
+ hash_encoded_body(VALUE arg)
62
+ {
63
+ struct hash_encoded_data *data = (struct hash_encoded_data *)arg;
64
+
65
+ rb_thread_call_without_gvl(nogvl_hash_encoded, &data->args, NULL, NULL);
66
+
67
+ if (data->args.result != ARGON2_OK) {
68
+ rb_raise(cArgon2idError, "%s", argon2_error_message(data->args.result));
69
+ }
70
+
71
+ return rb_str_new_cstr(data->encoded);
72
+ }
73
+
74
+ static VALUE
75
+ hash_encoded_finalize(VALUE arg)
76
+ {
77
+ struct hash_encoded_data *data = (struct hash_encoded_data *)arg;
78
+
79
+ RB_GC_GUARD(data->pwd);
80
+ RB_GC_GUARD(data->salt);
81
+ free(data->encoded);
82
+
83
+ return Qnil;
84
+ }
85
+
11
86
  static VALUE
12
87
  rb_argon2id_hash_encoded(VALUE klass, VALUE iterations, VALUE memory, VALUE threads, VALUE pwd, VALUE salt, VALUE hashlen)
13
88
  {
14
- uint32_t t_cost, m_cost, parallelism;
15
- size_t encodedlen, outlen;
16
- char * encoded;
17
- int result;
18
- VALUE hash;
89
+ uint32_t t_cost, m_cost, parallelism, outlen;
90
+ size_t encodedlen;
91
+ long saltlen;
92
+ struct hash_encoded_data data;
19
93
 
20
94
  UNUSED(klass);
21
95
 
22
- t_cost = FIX2INT(iterations);
23
- m_cost = FIX2INT(memory);
24
- parallelism = FIX2INT(threads);
25
- outlen = FIX2INT(hashlen);
96
+ /* Coerce pwd and salt to strings, then freeze to protect against mutation. */
97
+ StringValue(pwd);
98
+ pwd = rb_str_new_frozen(pwd);
99
+ StringValue(salt);
100
+ salt = rb_str_new_frozen(salt);
26
101
 
27
- encodedlen = argon2_encodedlen(t_cost, m_cost, parallelism, (uint32_t)RSTRING_LEN(salt), (uint32_t)outlen, Argon2_id);
28
- encoded = malloc(encodedlen);
29
- if (!encoded) {
30
- rb_raise(rb_eNoMemError, "not enough memory to allocate for encoded password");
31
- }
102
+ t_cost = NUM2UINT(iterations);
103
+ m_cost = NUM2UINT(memory);
104
+ parallelism = NUM2UINT(threads);
105
+ outlen = NUM2UINT(hashlen);
32
106
 
33
- result = argon2id_hash_encoded(t_cost, m_cost, parallelism, StringValuePtr(pwd), RSTRING_LEN(pwd), StringValuePtr(salt), RSTRING_LEN(salt), outlen, encoded, encodedlen);
107
+ if (RSTRING_LEN(pwd) > UINT32_MAX) {
108
+ rb_raise(rb_eRangeError, "password too long");
109
+ }
34
110
 
35
- if (result != ARGON2_OK) {
36
- free(encoded);
37
- rb_raise(cArgon2idError, "%s", argon2_error_message(result));
111
+ saltlen = RSTRING_LEN(salt);
112
+ if (saltlen > UINT32_MAX) {
113
+ rb_raise(rb_eRangeError, "salt too long");
38
114
  }
39
115
 
40
- hash = rb_str_new_cstr(encoded);
41
- free(encoded);
116
+ encodedlen = argon2_encodedlen(t_cost, m_cost, parallelism, (uint32_t)saltlen, outlen, Argon2_id);
117
+ data.encoded = malloc(encodedlen);
118
+ if (!data.encoded) {
119
+ rb_raise(rb_eNoMemError, "not enough memory to allocate for encoded password");
120
+ }
42
121
 
43
- return hash;
122
+ data.pwd = pwd;
123
+ data.salt = salt;
124
+ data.args.result = ARGON2_MISSING_ARGS;
125
+ data.args.t_cost = t_cost;
126
+ data.args.m_cost = m_cost;
127
+ data.args.parallelism = parallelism;
128
+ data.args.pwd = RSTRING_PTR(pwd);
129
+ data.args.pwdlen = RSTRING_LEN(pwd);
130
+ data.args.salt = RSTRING_PTR(salt);
131
+ data.args.saltlen = RSTRING_LEN(salt);
132
+ data.args.outlen = outlen;
133
+ data.args.encoded = data.encoded;
134
+ data.args.encodedlen = encodedlen;
135
+
136
+ return rb_ensure(hash_encoded_body, (VALUE)&data, hash_encoded_finalize, (VALUE)&data);
44
137
  }
45
138
 
46
139
  static VALUE
47
140
  rb_argon2id_verify(VALUE self, VALUE pwd) {
48
- int result;
49
141
  VALUE encoded;
142
+ struct verify_args args;
50
143
 
51
144
  encoded = rb_ivar_get(self, id_encoded);
52
- result = argon2id_verify(StringValueCStr(encoded), StringValuePtr(pwd), RSTRING_LEN(pwd));
53
- if (result == ARGON2_OK) {
145
+
146
+ /* Coerce encoded and freeze it before doing the same to pwd. The order here
147
+ * is important to prevent pwd#to_str mutating encoded.
148
+ */
149
+ StringValueCStr(encoded);
150
+ encoded = rb_str_new_frozen(encoded);
151
+ StringValue(pwd);
152
+ pwd = rb_str_new_frozen(pwd);
153
+
154
+ args.result = ARGON2_MISSING_ARGS;
155
+ args.encoded = RSTRING_PTR(encoded);
156
+ args.pwd = RSTRING_PTR(pwd);
157
+ args.pwdlen = RSTRING_LEN(pwd);
158
+
159
+ rb_thread_call_without_gvl(nogvl_verify, &args, NULL, NULL);
160
+
161
+ RB_GC_GUARD(encoded);
162
+ RB_GC_GUARD(pwd);
163
+
164
+ if (args.result == ARGON2_OK) {
54
165
  return Qtrue;
55
166
  }
56
- if (result == ARGON2_VERIFY_MISMATCH) {
167
+ if (args.result == ARGON2_VERIFY_MISMATCH) {
57
168
  return Qfalse;
58
169
  }
59
- if (result == ARGON2_DECODING_FAIL || result == ARGON2_DECODING_LENGTH_FAIL) {
60
- rb_raise(rb_eArgError, "%s", argon2_error_message(result));
170
+ if (args.result == ARGON2_DECODING_FAIL || args.result == ARGON2_DECODING_LENGTH_FAIL) {
171
+ rb_raise(rb_eArgError, "%s", argon2_error_message(args.result));
61
172
  }
62
173
 
63
- rb_raise(cArgon2idError, "%s", argon2_error_message(result));
174
+ rb_raise(cArgon2idError, "%s", argon2_error_message(args.result));
64
175
  }
65
176
 
66
177
  void
67
178
  Init_argon2id(void)
68
179
  {
180
+ rb_ext_ractor_safe(true);
181
+
69
182
  id_encoded = rb_intern("@encoded");
70
183
 
71
184
  mArgon2id = rb_define_module("Argon2id");
@@ -115,13 +115,14 @@ module Argon2id
115
115
  def initialize(encoded)
116
116
  raise ArgumentError, "invalid hash" unless PATTERN =~ String(encoded)
117
117
 
118
- @encoded = $&
118
+ @encoded = $&.freeze
119
119
  @version = Integer($1 || 0x10)
120
120
  @m_cost = Integer($2)
121
121
  @t_cost = Integer($3)
122
122
  @parallelism = Integer($4)
123
- @salt = $5.unpack1("m")
124
- @output = $6.unpack1("m")
123
+ @salt = $5.unpack1("m").freeze
124
+ @output = $6.unpack1("m").freeze
125
+ freeze
125
126
  end
126
127
 
127
128
  # Return the encoded password hash.
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Argon2id
4
- VERSION = "0.9.0"
4
+ VERSION = "0.10.0"
5
5
  end
@@ -188,6 +188,42 @@ class TestPassword < Minitest::Test
188
188
  assert password == "password"
189
189
  end
190
190
 
191
+ def test_new_password_is_frozen
192
+ password = Argon2id::Password.new(
193
+ "$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ" \
194
+ "$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4"
195
+ )
196
+
197
+ assert password.frozen?
198
+ end
199
+
200
+ def test_encoded_is_frozen
201
+ password = Argon2id::Password.new(
202
+ "$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ" \
203
+ "$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4"
204
+ )
205
+
206
+ assert password.encoded.frozen?
207
+ end
208
+
209
+ def test_salt_is_frozen
210
+ password = Argon2id::Password.new(
211
+ "$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ" \
212
+ "$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4"
213
+ )
214
+
215
+ assert password.salt.frozen?
216
+ end
217
+
218
+ def test_output_is_frozen
219
+ password = Argon2id::Password.new(
220
+ "$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ" \
221
+ "$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4"
222
+ )
223
+
224
+ assert password.output.frozen?
225
+ end
226
+
191
227
  def test_encoded_returns_the_full_encoded_hash
192
228
  password = Argon2id::Password.new(
193
229
  "$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ" \
@@ -526,6 +562,12 @@ class TestPassword < Minitest::Test
526
562
  Argon2id.output_len = Argon2id::DEFAULT_OUTPUT_LEN
527
563
  end
528
564
 
565
+ def test_create_password_is_frozen
566
+ password = Argon2id::Password.create("password")
567
+
568
+ assert password.frozen?
569
+ end
570
+
529
571
  def test_create_password_equals_correct_password
530
572
  password = Argon2id::Password.create("password")
531
573
 
@@ -538,6 +580,31 @@ class TestPassword < Minitest::Test
538
580
  refute password == "differentpassword"
539
581
  end
540
582
 
583
+ def test_create_is_thread_safe
584
+ threads = 10.times.map do |i|
585
+ Thread.new(i) do |n|
586
+ password = Argon2id::Password.create("password-#{n}", t_cost: 2, m_cost: 256, parallelism: 1)
587
+ assert password == "password-#{n}"
588
+ end
589
+ end
590
+
591
+ threads.each(&:value)
592
+ end
593
+
594
+ def test_verify_is_thread_safe
595
+ hash = Argon2id::Password.create("password", t_cost: 2, m_cost: 256, parallelism: 1).to_s
596
+
597
+ threads = 10.times.map do |i|
598
+ Thread.new do
599
+ password = Argon2id::Password.new(hash)
600
+ assert password == "password"
601
+ refute password == "wrong"
602
+ end
603
+ end
604
+
605
+ threads.each(&:value)
606
+ end
607
+
541
608
  def test_hashing_password_verifies_correct_password
542
609
  hash = Argon2id::Password.create("password").to_s
543
610
  password = Argon2id::Password.new(hash)
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: argon2id
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.9.0
4
+ version: 0.10.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Paul Mucur
@@ -113,7 +113,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
113
113
  - !ruby/object:Gem::Version
114
114
  version: '0'
115
115
  requirements: []
116
- rubygems_version: 4.0.3
116
+ rubygems_version: 4.0.6
117
117
  specification_version: 4
118
118
  summary: Ruby bindings to Argon2
119
119
  test_files: []