summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorStephan Mueller <smueller@chronox.de>2014-11-11 05:37:57 +0100
committerHerbert Xu <herbert@gondor.apana.org.au>2014-11-12 15:14:31 +0100
commite1bd95bf7c25530a99ce371e0a26e4932efc021d (patch)
treed398358707325a4677c8ba46d06f5335c9e5b1d1
parentcrypto: algif - zeroize message digest buffer (diff)
downloadlinux-e1bd95bf7c25530a99ce371e0a26e4932efc021d.tar.xz
linux-e1bd95bf7c25530a99ce371e0a26e4932efc021d.zip
crypto: algif - zeroize IV buffer
Zeroize the buffer holding the IV used for the completed cipher operation before the buffer is released by the skcipher AF_ALG interface handler. Signed-off-by: Stephan Mueller <smueller@chronox.de> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
-rw-r--r--crypto/algif_skcipher.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c
index 83187f497c7c..85e3bdbe214c 100644
--- a/crypto/algif_skcipher.c
+++ b/crypto/algif_skcipher.c
@@ -566,6 +566,7 @@ static void skcipher_sock_destruct(struct sock *sk)
struct crypto_ablkcipher *tfm = crypto_ablkcipher_reqtfm(&ctx->req);
skcipher_free_sgl(sk);
+ memzero_explicit(ctx->iv, crypto_ablkcipher_ivsize(tfm));
sock_kfree_s(sk, ctx->iv, crypto_ablkcipher_ivsize(tfm));
sock_kfree_s(sk, ctx, ctx->len);
af_alg_release_parent(sk);