Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

secret-sharing: Zeroize sensitive data #5928

Merged
merged 21 commits into from
Nov 7, 2024

Conversation

peternose
Copy link
Contributor

No description provided.

@peternose peternose added the c:key management Category: key management label Nov 5, 2024
Copy link

netlify bot commented Nov 5, 2024

Deploy Preview for oasisprotocol-oasis-core canceled.

Name Link
🔨 Latest commit 0d475b1
🔍 Latest deploy log https://app.netlify.com/sites/oasisprotocol-oasis-core/deploys/672bf7c03ccf1400085fee89

@peternose peternose linked an issue Nov 5, 2024 that may be closed by this pull request
@peternose peternose force-pushed the peternose/trivial/churp-zeroize-secrets branch from d0fabf6 to cf516e0 Compare November 6, 2024 03:23
@peternose peternose force-pushed the peternose/trivial/churp-zeroize-secrets branch from cf516e0 to a3e8637 Compare November 6, 2024 03:52
Copy link

codecov bot commented Nov 6, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 64.62%. Comparing base (7dd0c3e) to head (a3e8637).
Report is 1 commits behind head on master.

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #5928   +/-   ##
=======================================
  Coverage   64.62%   64.62%           
=======================================
  Files         627      627           
  Lines       64292    64292           
=======================================
+ Hits        41546    41550    +4     
+ Misses      17823    17820    -3     
+ Partials     4923     4922    -1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@peternose peternose marked this pull request as ready for review November 6, 2024 04:28
The AddAssign, SubAssign, and MulAssign functions can now be used
only when the prime field supports zeroization. This ensures that
any leftover data from heap reallocation, when the right-hand-side
polynomial has more coefficients than the left-hand-side, is zeroized.

An alternative solution is to remove these functions, but this
could lead to performance drawbacks.
@peternose peternose force-pushed the peternose/trivial/churp-zeroize-secrets branch from a3e8637 to 0d475b1 Compare November 6, 2024 23:11
@peternose peternose merged commit cb170e1 into master Nov 7, 2024
5 checks passed
@peternose peternose deleted the peternose/trivial/churp-zeroize-secrets branch November 7, 2024 00:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:key management Category: key management
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Zeroize sensitive CHURP data
2 participants