diff options
| author | Jakub Kicinski <[email protected]> | 2019-06-28 23:11:39 +0000 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2019-07-02 02:22:36 +0000 |
| commit | acd3e96d53a24d219f720ed4012b62723ae05da1 (patch) | |
| tree | 72f95626e91ff78f4530d1d2cc7425932b9e95fe /net/tls/tls_main.c | |
| parent | net/tls: reject offload of TLS 1.3 (diff) | |
| download | kernel-acd3e96d53a24d219f720ed4012b62723ae05da1.tar.gz kernel-acd3e96d53a24d219f720ed4012b62723ae05da1.zip | |
net/tls: make sure offload also gets the keys wiped
Commit 86029d10af18 ("tls: zero the crypto information from tls_context
before freeing") added memzero_explicit() calls to clear the key material
before freeing struct tls_context, but it missed tls_device.c has its
own way of freeing this structure. Replace the missing free.
Fixes: 86029d10af18 ("tls: zero the crypto information from tls_context before freeing")
Signed-off-by: Jakub Kicinski <[email protected]>
Reviewed-by: Dirk van der Merwe <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'net/tls/tls_main.c')
| -rw-r--r-- | net/tls/tls_main.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/net/tls/tls_main.c b/net/tls/tls_main.c index e2b69e805d46..4674e57e66b0 100644 --- a/net/tls/tls_main.c +++ b/net/tls/tls_main.c @@ -251,7 +251,7 @@ static void tls_write_space(struct sock *sk) ctx->sk_write_space(sk); } -static void tls_ctx_free(struct tls_context *ctx) +void tls_ctx_free(struct tls_context *ctx) { if (!ctx) return; @@ -643,7 +643,7 @@ static void tls_hw_sk_destruct(struct sock *sk) ctx->sk_destruct(sk); /* Free ctx */ - kfree(ctx); + tls_ctx_free(ctx); icsk->icsk_ulp_data = NULL; } |
