diff options
author | akr <akr@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2017-10-21 15:21:26 +0000 |
---|---|---|
committer | akr <akr@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2017-10-21 15:21:26 +0000 |
commit | a9c0bc05daf03a157148d5767508bc4bbb958caf (patch) | |
tree | 041ca5d0e77d08e53cd8a6c965f8ce3277fff65e /NEWS | |
parent | e01f10674ab8e614b6a711fc92370347b7131a9a (diff) | |
download | ruby-a9c0bc05daf03a157148d5767508bc4bbb958caf.tar.gz |
SecureRandom.alphanumeric implemented.
[ruby-core:68098] [Feature #10849] proposed by Andrew Butterfield.
SecureRandom.choose and SecureRandom.graph is not included.
(The implementation has SecureRandom.choose but it is private.)
I feel the method name, SecureRandom.choose, doesn't represent
the behavior well.
The actual use cases of SecureRandom.graph is not obvious.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@60297 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 4 |
1 files changed, 4 insertions, 0 deletions
@@ -191,6 +191,10 @@ with all sufficient information, see the ChangeLog file or Redmine * http://blog.rubygems.org/2017/08/27/2.6.13-released.html * http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html +* SecureRandom + * New methods: + * SecureRandom.alphanumeric + * Set * Add Set#to_s as alias to #inspect [Feature #13676] * Add Set#=== as alias to #include? [Feature #13801] |