diff options
author | Stephan Mueller <smueller@chronox.de> | 2014-12-23 09:34:03 +0100 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2014-12-26 08:33:36 +1100 |
commit | ad202c8c1563da4dda9416ca0ea1e0b94430f759 (patch) | |
tree | ab17431c3504be289dfef862162740eed9218d86 | |
parent | 90ac41bd40ad0571a10826eb26d53c84bd791f29 (diff) | |
download | linux-ad202c8c1563da4dda9416ca0ea1e0b94430f759.tar.gz linux-ad202c8c1563da4dda9416ca0ea1e0b94430f759.tar.bz2 linux-ad202c8c1563da4dda9416ca0ea1e0b94430f759.zip |
crypto: af_alg - zeroize key data
alg_setkey should zeroize the sensitive data after use.
Signed-off-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r-- | crypto/af_alg.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/af_alg.c b/crypto/af_alg.c index a8ff3c44e13c..76d739d08211 100644 --- a/crypto/af_alg.c +++ b/crypto/af_alg.c @@ -188,7 +188,7 @@ static int alg_setkey(struct sock *sk, char __user *ukey, err = type->setkey(ask->private, key, keylen); out: - sock_kfree_s(sk, key, keylen); + sock_kzfree_s(sk, key, keylen); return err; } |