WPA auth: Clear temporary MSK storage from stack explicitly
authorJouni Malinen <jouni@qca.qualcomm.com>
Thu, 29 Jan 2015 20:24:27 +0000 (22:24 +0200)
committerJouni Malinen <j@w1.fi>
Thu, 29 Jan 2015 20:24:27 +0000 (22:24 +0200)
This reduces the duration of time a key may remain unnecessarily in
memory.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
src/ap/wpa_auth.c

index 1905dc9..f13f141 100644 (file)
@@ -1882,6 +1882,7 @@ SM_STATE(WPA_PTK, INITPMK)
                wpa_printf(MSG_DEBUG, "WPA: Could not get PMK, get_msk: %p",
                           sm->wpa_auth->cb.get_msk);
        }
+       os_memset(msk, 0, sizeof(msk));
 
        sm->req_replay_counter_used = 0;
        /* IEEE 802.11i does not set keyRun to FALSE, but not doing this