#private-key #memory #constant-time #security #passwords #comparison #sensitive

secstr

A data type suitable for storing sensitive information such as passwords and private keys in memory, featuring constant time equality, mlock and zeroing out

9 unstable releases

0.5.1 Oct 2, 2022
0.5.0 Mar 13, 2022
0.4.0 Feb 8, 2020
0.3.2 May 23, 2019
0.1.0 Sep 9, 2015

#437 in Authentication

Download history 4757/week @ 2023-11-18 4474/week @ 2023-11-25 3622/week @ 2023-12-02 5149/week @ 2023-12-09 5505/week @ 2023-12-16 2719/week @ 2023-12-23 2236/week @ 2023-12-30 5512/week @ 2024-01-06 6960/week @ 2024-01-13 4446/week @ 2024-01-20 5078/week @ 2024-01-27 3792/week @ 2024-02-03 4887/week @ 2024-02-10 4432/week @ 2024-02-17 4223/week @ 2024-02-24 4234/week @ 2024-03-02

18,431 downloads per month
Used in 34 crates (19 directly)

Unlicense

47KB
959 lines

crates.io API Docs Build Status unlicense

secstr

A Rust library that implements a data type (wrapper around Vec<u8>) suitable for storing sensitive information such as passwords and private keys in memory. Inspired by Haskell securemem and .NET SecureString.

Featuring:

  • constant time comparison (does not short circuit on the first different character; but terminates instantly if strings have different length)
  • automatically zeroing out in the destructor
  • mlock and madvise protection if possible
  • formatting as ***SECRET*** to prevent leaking into logs
  • (optionally) using libsodium (through sodiumoxide's libsodium-sys) for zeroing, comparison, and hashing (std::hash::Hash)
  • (optionally) de/serializable into anything Serde supports as a byte string
  • (optionally) compile-time checked preconditions for the public unsafe API

Usage

extern crate secstr;
use secstr::*;

let pw = SecStr::from("correct horse battery staple");

// Compared in constant time:
// (Obviously, you should store hashes in real apps, not plaintext passwords)
let are_pws_equal = pw == SecStr::from("correct horse battery staple".to_string()); // true

// Formatting, printing without leaking secrets into logs
let text_to_print = format!("{}", SecStr::from("hello")); // "***SECRET***"

// Clearing memory
// THIS IS DONE AUTOMATICALLY IN THE DESTRUCTOR
// (but you can force it)
let mut my_sec = SecStr::from("hello");
my_sec.zero_out();
// (It also sets the length to 0)
assert_eq!(my_sec.unsecure(), b"");

Be careful with SecStr::from: if you have a borrowed string, it will be copied.
Use SecStr::new if you have a Vec<u8>.

Contributing

Please feel free to submit pull requests!

By participating in this project you agree to follow the Contributor Code of Conduct and to release your contributions under the Unlicense.

The list of contributors is available on GitHub.

License

This is free and unencumbered software released into the public domain.
For more information, please refer to the UNLICENSE file or unlicense.org.

Dependencies

~0–4MB
~21K SLoC