Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Zeroize sensitive memory in barrier_aes_gcm context #39

Merged
merged 4 commits into from
Feb 5, 2024

Conversation

InfoHunter
Copy link
Member

As per: #38, this commit addresses that issue.

This is only one fix, more fixes in other context (for instance, the shamir) are coming up later...

@InfoHunter InfoHunter linked an issue Dec 29, 2023 that may be closed by this pull request
@InfoHunter InfoHunter requested a review from wa5i January 2, 2024 09:26
@InfoHunter InfoHunter changed the title [WIP]Zeroize sensitive memory in barrier_aes_gcm context Zeroize sensitive memory in barrier_aes_gcm context Jan 2, 2024
@InfoHunter
Copy link
Member Author

CI failure is not related.

Besides, I found crate secrecy is also suitable to use in this context. May switch to that in another PR in the future.

@wa5i wa5i merged commit 0a9ed97 into Tongsuo-Project:main Feb 5, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Make sure all sensitive data in Barrier is zeroized
2 participants