/
Cargo.toml
101 lines (86 loc) · 3.16 KB
/
Cargo.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
[package]
name = "root-keys"
version = "0.1.0"
authors = ["bunnie <bunnie@kosagi.com>"]
edition = "2018"
description = "Xous root keys server"
# Dependency versions enforced by Cargo.lock.
[dependencies]
xous = "0.9.60"
log-server = { package = "xous-api-log", version = "0.1.56" }
ticktimer-server = { package = "xous-api-ticktimer", version = "0.9.56" }
xous-names = { package = "xous-api-names", version = "0.9.58" }
log = "0.4.14"
susres = { package = "xous-api-susres", version = "0.9.56" }
trng = { path = "../trng" }
spinor = { path = "../spinor" }
llio = { path = "../llio" }
com = { path = "../com" }
xous-semver = "0.1.2"
utralib = { version = "0.1.24", optional = true, default-features = false }
xous-ipc = "0.9.60"
num-derive = { version = "0.4.1", default-features = false }
num-traits = { version = "0.2.14", default-features = false }
rkyv = { version = "0.4.3", default-features = false, features = [
"const_generics",
] }
zeroize = { version = "1.7.0", features = ["zeroize_derive"] }
rand_core = "0.6.4"
aes-kw = { version = "0.2.1", features = ["alloc"] }
# bcrypt
cipher = "0.4.3"
blowfish = { version = "0.9.1", features = ["bcrypt"] }
# password modals - keep them in this crate to minimize plaintext password manipulations
gam = { path = "../gam" }
locales = { path = "../../locales" }
# non-password modals are outsourced to a common crate
modals = { path = "../modals" }
# to access font maps for signing verification
graphics-server = { path = "../graphics-server" }
# for reboots and fuse operations
jtag = { path = "../jtag" }
# for text to speech support
tts-frontend = { path = "../tts" }
# backups
aes-gcm-siv = { version = "0.11.1", default-features = false, features = [
"alloc",
"aes",
] }
#aes-gcm-siv = {git="https://github.com/RustCrypto/AEADs.git", branch="master"}
subtle = { version = "2.4.1", default-features = false }
usb-device-xous = { path = "../usb-device-xous" }
keyboard = { path = "../keyboard" }
# private keys
#sha2 = {version = "0.9.5", default-features = false, features = []}
sha2 = { version = "0.10.8" }
digest = "0.10.7"
aes = { path = "../aes" }
# engine-25519 = { path = "../engine-25519" }
byteorder = "1.4.3" # used by keywrap
# hardware acceleration adaptations are inserted into a fork of the main branch.
hex = { version = "0.4.3", default-features = false, features = [] }
[dependencies.curve25519-dalek]
version = "=4.1.2" # note this is patched to our fork in ./Cargo.toml
default-features = false
features = ["auto-release", "warn-fallback"]
[dependencies.ed25519-dalek]
version = "2.1.0"
#path = "../../../ed25519-dalek"
default-features = false
features = ["rand_core", "digest"]
[features]
precursor = ["utralib/precursor", "sha2/precursor"]
hosted = ["utralib/hosted", "sha2/hosted"]
renode = ["utralib/renode", "sha2/renode"]
policy-menu = [
] # provisions for users to set their password retention policies (on the block for deprecation) (note: to re-enable you need to add "rootkeys menu" to the tokens.rs in the GAM)
hazardous-debug = [
] # this feature enables the printing of secret materials for debug purposes
tts = []
efuse = []
default = []
[lib]
test = true
[[bin]]
name = "root-keys"
test = false