WPA auth: Clear temporary MSK storage from stack explicitly

This reduces the duration of time a key may remain unnecessarily in
memory.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
Jouni Malinen 2015-01-29 22:24:27 +02:00 committed by Jouni Malinen
parent 01b481aff3
commit 40aaa64f9f

View file

@ -1882,6 +1882,7 @@ SM_STATE(WPA_PTK, INITPMK)
wpa_printf(MSG_DEBUG, "WPA: Could not get PMK, get_msk: %p", wpa_printf(MSG_DEBUG, "WPA: Could not get PMK, get_msk: %p",
sm->wpa_auth->cb.get_msk); sm->wpa_auth->cb.get_msk);
} }
os_memset(msk, 0, sizeof(msk));
sm->req_replay_counter_used = 0; sm->req_replay_counter_used = 0;
/* IEEE 802.11i does not set keyRun to FALSE, but not doing this /* IEEE 802.11i does not set keyRun to FALSE, but not doing this