srp-conflux

Crates.iosrp-conflux
lib.rssrp-conflux
version0.7.2
created_at2025-10-02 17:37:51.945587+00
updated_at2025-10-04 11:04:56.227211+00
descriptionSecure Remote Password (SRP) protocol implementation
homepage
repositoryhttps://github.com/thatnewyorker/PAKEs-Conflux
max_upload_size
id1864728
size62,429
Gerard (thatnewyorker)

documentation

https://docs.rs/srp-conflux

README

RustCrypto: SRP

crate Docs Apache2/MIT licensed Rust Version Project Chat Build Status

Pure Rust implementation of the Secure Remote Password password-authenticated key-exchange algorithm. Maintained as part of the PAKEs-Conflux workspace.

Documentation

About

This implementation is generic over hash functions using the Digest trait, so you will need to choose a hash function, e.g. Sha256 from sha2 crate.

Additionally this crate allows to use a specialized password hashing algorithm for private key computation instead of method described in the SRP literature.

Compatibility with other implementations has not yet been tested.

SecretKey usage (session key handling)

SRP verifier types hold the derived session key as secret_utils::wrappers::SecretKey. Where available, prefer using accessor methods that return &SecretKey (e.g., SrpClientVerifier::key_secret()), then borrow bytes with as_ref().

This wrapper:

  • Zeroizes its contents on drop (ZeroizeOnDrop)
  • Redacts Debug output to avoid accidental leaks
  • Is not Clone, reducing accidental copies
  • Allows borrowing bytes via as_ref() or deref to &[u8]

Examples:

  • Compare two session keys (equality)
use secret_utils::wrappers::SecretKey;

fn equal_keys(k1: &SecretKey, k2: &SecretKey) -> bool {
    // Standard equality; do not rely on constant-time properties here.
    k1 == k2
}
  • Hex encode a session key (only when necessary)
use secret_utils::wrappers::SecretKey;

// Requires the `hex` crate when you actually use this pattern.
fn key_as_hex(key: &SecretKey) -> String {
    // Borrow without copying the underlying bytes
    let bytes: &[u8] = key.as_ref();
    hex::encode(bytes)
}

// Even though Debug is redacted, avoid logging secrets altogether.
  • Drop semantics (automatic zeroization when leaving scope)
use secret_utils::wrappers::SecretKey;

fn ephemeral_use() {
    {
        // SRP verifier types hold `SecretKey`; constructed here for demo.
        let key = SecretKey::from(vec![0u8; 32]);
        // use `key.as_ref()` to access bytes
        let _first_byte = key.as_ref().get(0).copied();
    } // key is zeroized here on drop
}

Notes:

  • Prefer borrowing (&[u8]) instead of taking ownership.
  • Do not print or log keys; use authenticated encryption if you must serialize.

⚠️ Security Warning

This crate has never received an independent third party audit for security and correctness.

USE AT YOUR OWN RISK!

Minimum Supported Rust Version

Rust 1.61 or higher.

Minimum supported Rust version can be changed in the future, but it will be done with a minor version bump.

License

Licensed under either of:

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Commit count: 0

cargo fmt