Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(dht): zeroize AEAD keys on drop #4843

Merged

Conversation

AaronFeickert
Copy link
Collaborator

Description

Zeroizes authenticated encryption keys (via the AuthenticatedCipherKey struct) on drop. Fixes issue 4842.

Motivation and Context

Authenticated encryption (AEAD) keys are intended to be zeroized on drop, but the relevant macros are not applied. This work adds the macros.

How Has This Been Tested?

Manually tested that Zeroize was not supported previously, and is supported now.

@AaronFeickert AaronFeickert changed the title Zeroize AEAD keys on drop fix[dht]: zeroize AEAD keys on drop Oct 21, 2022
@CjS77 CjS77 added P-acks_required Process - Requires more ACKs or utACKs P-reviews_required Process - Requires a review from a lead maintainer to be merged labels Oct 21, 2022
@AaronFeickert AaronFeickert changed the title fix[dht]: zeroize AEAD keys on drop fix(dht): zeroize AEAD keys on drop Oct 21, 2022
Copy link
Collaborator

@SWvheerden SWvheerden left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

utACK

@CjS77 CjS77 removed the P-reviews_required Process - Requires a review from a lead maintainer to be merged label Oct 24, 2022
@stringhandler stringhandler merged commit 9957222 into tari-project:development Oct 24, 2022
@AaronFeickert AaronFeickert deleted the zeroize-chachapoly-key branch October 24, 2022 13:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
P-acks_required Process - Requires more ACKs or utACKs
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Authenticated encryption keys are not zeroized on drop
4 participants