diff options
author | Hailey Mothershead <hailmo@amazon.com> | 2024-04-15 22:19:15 +0000 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2024-04-26 17:26:09 +0800 |
commit | 554253f2da3750d96563c641dec0cea09231878a (patch) | |
tree | 0e5ce54196c23b6b3a739a6e7f64e04d0b2bb336 /crypto/cipher.c | |
parent | 4311998718c9270ded76c982c31156a311e461cf (diff) | |
download | linux-crypto-554253f2da3750d96563c641dec0cea09231878a.tar.gz linux-crypto-554253f2da3750d96563c641dec0cea09231878a.zip |
crypto: aead,cipher - zeroize key buffer after use
I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding
cryptographic information should be zeroized once they are no longer
needed. Accomplish this by using kfree_sensitive for buffers that
previously held the private key.
Signed-off-by: Hailey Mothershead <hailmo@amazon.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/cipher.c')
-rw-r--r-- | crypto/cipher.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/crypto/cipher.c b/crypto/cipher.c index 47c77a3e..40cae908 100644 --- a/crypto/cipher.c +++ b/crypto/cipher.c @@ -34,8 +34,7 @@ static int setkey_unaligned(struct crypto_cipher *tfm, const u8 *key, alignbuffer = (u8 *)ALIGN((unsigned long)buffer, alignmask + 1); memcpy(alignbuffer, key, keylen); ret = cia->cia_setkey(crypto_cipher_tfm(tfm), alignbuffer, keylen); - memset(alignbuffer, 0, keylen); - kfree(buffer); + kfree_sensitive(buffer); return ret; } |