commit | 6f99756dab5ba23e5dc74cd4ad24edd53af39beb | [log] [tgz] |
---|---|---|
author | Eric Biggers <ebiggers@google.com> | Wed Oct 09 16:34:17 2019 -0700 |
committer | Eric Biggers <ebiggers@google.com> | Mon Oct 21 13:22:08 2019 -0700 |
tree | 6a804de11a982e65238d1e3b8271427e31c1d580 | |
parent | 1565bdad59e97f31cfc7b065bc0fc77e9549e62d [diff] |
fscrypt: zeroize fscrypt_info before freeing memset the struct fscrypt_info to zero before freeing. This isn't really needed currently, since there's no secret key directly in the fscrypt_info. But there's a decent chance that someone will add such a field in the future, e.g. in order to use an API that takes a raw key such as siphash(). So it's good to do this as a hardening measure. Signed-off-by: Eric Biggers <ebiggers@google.com>