crosvm/win_util/Cargo.toml
Noah Gold 46f3f081bf win_util: securely zero buffers used by DPAPI.
The buffers used by DPAPI calls will often contain cryptographic key
material. This CL securely zeroes them on drop.

Note: Windows does provide a platform intrinsic to securely zero memory
(SecureZeroMemory), but it is provided as a macro, which is exceedingly
painful to use from Rust. Zeroize used to call SecureZeroMemory under
the hood in versions of the crate, but it no longer does. Likely
because it's a pain.

BUG=b:286345300
TEST=unit tests

Change-Id: Ifabeecb47563828616f278ff1c28266f4014e753
Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/5333894
Commit-Queue: Noah Gold <nkgold@google.com>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
Reviewed-by: Judson Powers <judsonp@google.com>
Reviewed-by: Dennis Kempin <denniskempin@google.com>
2024-03-04 18:31:37 +00:00

42 lines
942 B
TOML

[package]
name = "win_util"
version = "0.1.0"
authors = ["The ChromiumOS Authors"]
edition = "2021"
[dependencies]
anyhow = "*"
enumn = "0.1.0"
libc = "*"
once_cell = "1.7"
serde = { version = "1", features = [ "derive" ] }
zeroize = "1.5.7"
[target.'cfg(windows)'.dependencies]
winapi = { version = "*", features = ["everything", "std", "impl-default"] }
[dependencies.windows]
version = "0.39.0"
features = [
"Win32_Foundation",
"Win32_Globalization",
"Win32_Graphics_Gdi",
"Win32_UI_Input_Ime",
"Win32_UI_Input_KeyboardAndMouse",
"Win32_UI_TextServices",
"Win32_UI_WindowsAndMessaging",
"Win32_System_Com",
]
[build-dependencies.windows]
version = "0.39.0"
features = [
"Win32_Foundation",
"Win32_Globalization",
"Win32_Graphics_Gdi",
"Win32_UI_Input_Ime",
"Win32_UI_Input_KeyboardAndMouse",
"Win32_UI_TextServices",
"Win32_UI_WindowsAndMessaging",
"Win32_System_Com",
]