-
Notifications
You must be signed in to change notification settings - Fork 955
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ZeroizeOnDrop
to ed25519 keys
#1956
Conversation
ee8d627
to
496bcce
Compare
DId these keys not already have this behavior? See the tests |
oh @brentstone you're right. I didn't realize we were using a fork of libsecp that cleared these keys on drop. to be honest though, we should switch back to the upstream version of the crate. we can clear the sk in a way similar to what has been implemented in this pr (albeit it involves unsafe code). lmk what you think |
@sug0 yeah you're prob right that we should avoid using the fork if we can accomplish the same thing with your method. I defer to your judgment. |
looking back at this I think we should switch to use https://crates.io/crates/k256 |
k256
as the provider of secp256k1
key signatures
32bcc8d
to
1380deb
Compare
k256
as the provider of secp256k1
key signaturesZeroizeOnDrop
to secp256k1 and ed25519 and Zeroize
to secp
1380deb
to
5788329
Compare
5788329
to
d8ba4f0
Compare
d8ba4f0
to
4a706ad
Compare
ZeroizeOnDrop
to secp256k1 and ed25519 and Zeroize
to secpZeroizeOnDrop
to ed25519 keys
4a706ad
to
b2c4919
Compare
b2c4919
to
5d7c951
Compare
* origin/tiago/zeroize-secret-keys: Changelog for #1956 Implement ZeroizeOnDrop on ed25519 keys
Describe your changes
ed25519
keys withZeroizeOnDrop
, to indicate their bytes are cleared uppon the key being dropped.Switch to- done in base deps: switch from libsecp256k1 to k256 #1958k256
forsecp256k1
keys. It natively implementsZeroize
Indicate on which release or other PRs this topic is based on
#1958 (first commit here 609e70d)
Checklist before merging to
draft