diff options
author | Dan Carpenter <dan.carpenter@oracle.com> | 2016-01-30 17:38:28 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2016-02-01 22:27:05 +0800 |
commit | cce1a0d88445a62a2a92126af47cb81b377f656f (patch) | |
tree | bfcb7ad449bb456624ddaa823d0b5d7cbfb7cc60 /crypto/rng.c | |
parent | 0a3eb652fbcb75d3d1977f94831426b0c52456a8 (diff) | |
download | linux-crypto-cce1a0d88445a62a2a92126af47cb81b377f656f.tar.gz linux-crypto-cce1a0d88445a62a2a92126af47cb81b377f656f.zip |
crypto: keywrap - memzero the correct memory
We're clearing the wrong memory. The memory corruption is likely
harmless because we weren't going to use that stack memory again but not
zeroing is a potential information leak.
Fixes: 30d50a867e98 ('crypto: keywrap - add key wrapping block chaining mode')
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Acked-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/rng.c')
0 files changed, 0 insertions, 0 deletions