-
Notifications
You must be signed in to change notification settings - Fork 0
v0.2.0 MVP tracker #3
Copy link
Copy link
Open
Milestone
Description
Features to be implemented:
- add
eqlBufferor similar helper API to secret types- like existing
.eqlbut for comparing with buffer, wrapsstd.crypto.timing_safe.compare, encourages timing safe crypto usage, discouragemem.eqlusage.
- like existing
- any use for a
move-esque helper method? e.g.toOwnedSliceinstd.ArrayList? - incorporate
std.crypto.timing_safe.classifyand.declassifyso users can use Valgrind to check for potential side-channel vulnerabilities of any operations using the secret data.- Will require rethinking how we internally store the secret since
.timing_safe.markSecretexpects a fixed size array for a secret. - Modify internal storage paradigm of
zecrecy? Create custommarkSecretthat supports slices? Research needed.
- Will require rethinking how we internally store the secret since
- investigate custom
secureZeroimplementation that includes (compiler-only) atomics - investigate updating
std.crypto.timing_safe.eqlto support slices- Current workaround:
.timing_safe.comparesupports slices and.eqlordering.
- Current workaround:
- investigate potential for incorporating any memguard ideas into library.
- add readWith/mutateWith-type callback functions back as alternative API options
- investigate need/effort for supporting
mLock/VirtualLockto prevent secrets leaking during a disk swap/core dump.
Reactions are currently unavailable