-
Notifications
You must be signed in to change notification settings - Fork 1k
Add ZeroizeOnDrop to ed25519 keys
#1956
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
ee8d627 to
496bcce
Compare
|
DId these keys not already have this behavior? See the tests |
|
oh @brentstone you're right. I didn't realize we were using a fork of libsecp that cleared these keys on drop. to be honest though, we should switch back to the upstream version of the crate. we can clear the sk in a way similar to what has been implemented in this pr (albeit it involves unsafe code). lmk what you think |
|
@sug0 yeah you're prob right that we should avoid using the fork if we can accomplish the same thing with your method. I defer to your judgment. |
|
looking back at this I think we should switch to use https://crates.io/crates/k256 |
k256 as the provider of secp256k1 key signatures
32bcc8d to
1380deb
Compare
k256 as the provider of secp256k1 key signaturesZeroizeOnDrop to secp256k1 and ed25519 and Zeroize to secp
1380deb to
5788329
Compare
5788329 to
d8ba4f0
Compare
d8ba4f0 to
4a706ad
Compare
ZeroizeOnDrop to secp256k1 and ed25519 and Zeroize to secpZeroizeOnDrop to ed25519 keys
4a706ad to
b2c4919
Compare
b2c4919 to
5d7c951
Compare
* origin/tiago/zeroize-secret-keys: Changelog for #1956 Implement ZeroizeOnDrop on ed25519 keys
Describe your changes
ed25519keys withZeroizeOnDrop, to indicate their bytes are cleared uppon the key being dropped.Switch to- done in base deps: switch from libsecp256k1 to k256 #1958k256forsecp256k1keys. It natively implementsZeroizeIndicate on which release or other PRs this topic is based on
#1958 (first commit here 609e70d)
Checklist before merging to
draft