Skip to content

Commit

Permalink
zeroize 1.8.0 (#1065)
Browse files Browse the repository at this point in the history
  • Loading branch information
tarcieri committed Apr 24, 2024
1 parent c0eab7f commit 9bbfb49
Show file tree
Hide file tree
Showing 5 changed files with 42 additions and 11 deletions.
14 changes: 7 additions & 7 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

17 changes: 17 additions & 0 deletions zeroize/CHANGELOG.md
Expand Up @@ -4,6 +4,23 @@ All notable changes to this project will be documented in this file.
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## 1.8.0 (2024-04-24)
### Added
- Unsafe `zeroize_flat_type` function ([#1045])
- `Zeroize` impls for `__m512` types on `x86`/`x86_64` targets ([#1052])

### Changed
- Bump MSRV to 1.72 ([#1052])
- Always enable AArch64 support ([#1064])

### Fixed
- Nightly warnings ([#1055])

[#1045]: https://github.com/RustCrypto/utils/pull/1045
[#1052]: https://github.com/RustCrypto/utils/pull/1052
[#1055]: https://github.com/RustCrypto/utils/pull/1055
[#1064]: https://github.com/RustCrypto/utils/pull/1064

## 1.7.0 (2023-11-16)
### Changed
- Bump MSRV to 1.60 ([#900])
Expand Down
2 changes: 1 addition & 1 deletion zeroize/Cargo.toml
@@ -1,6 +1,6 @@
[package]
name = "zeroize"
version = "1.7.0"
version = "1.8.0"
description = """
Securely clear secrets from memory with a simple trait built on
stable Rust primitives which guarantee memory is zeroed using an
Expand Down
18 changes: 16 additions & 2 deletions zeroize/README.md
Expand Up @@ -36,7 +36,7 @@ thereof, implemented in pure Rust with no usage of FFI or assembly.

## Minimum Supported Rust Version

Rust **1.60** or newer.
Rust **1.72** or newer.

In the future, we reserve the right to change MSRV (i.e. MSRV is out-of-scope
for this crate's SemVer guarantees), however when we do it will be accompanied by
Expand All @@ -60,21 +60,35 @@ dual licensed as above, without any additional terms or conditions.
[//]: # (badges)

[crate-image]: https://img.shields.io/crates/v/zeroize.svg

[crate-link]: https://crates.io/crates/zeroize

[docs-image]: https://docs.rs/zeroize/badge.svg

[docs-link]: https://docs.rs/zeroize/

[license-image]: https://img.shields.io/badge/license-Apache2.0/MIT-blue.svg
[rustc-image]: https://img.shields.io/badge/rustc-1.60+-blue.svg

[rustc-image]: https://img.shields.io/badge/rustc-1.72+-blue.svg

[build-image]: https://github.com/RustCrypto/utils/actions/workflows/zeroize.yml/badge.svg

[build-link]: https://github.com/RustCrypto/utils/actions/workflows/zeroize.yml

[//]: # (general links)

[RustCrypto]: https://github.com/RustCrypto

[zeroize]: https://en.wikipedia.org/wiki/Zeroisation

[`Zeroize` trait]: https://docs.rs/zeroize/latest/zeroize/trait.Zeroize.html

[Documentation]: https://docs.rs/zeroize/

[Zeroing memory securely is hard]: http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html

[core::ptr::write_volatile]: https://doc.rust-lang.org/core/ptr/fn.write_volatile.html

[core::sync::atomic]: https://doc.rust-lang.org/stable/core/sync/atomic/index.html

[good cryptographic hygiene]: https://github.com/veorq/cryptocoding#clean-memory-of-secret-data
2 changes: 1 addition & 1 deletion zeroize/src/lib.rs
Expand Up @@ -30,7 +30,7 @@
//!
//! ## Minimum Supported Rust Version
//!
//! Requires Rust **1.60** or newer.
//! Requires Rust **1.72** or newer.
//!
//! In the future, we reserve the right to change MSRV (i.e. MSRV is out-of-scope
//! for this crate's SemVer guarantees), however when we do it will be accompanied
Expand Down

0 comments on commit 9bbfb49

Please sign in to comment.