Merge pull request #3969 from frestr/bugfix/psa_close_key_leak
PSA Crypto: Don't skip key data removal when SE driver is not in use
This commit is contained in:
commit
73d783244f
2 changed files with 5 additions and 1 deletions
3
ChangeLog.d/psa_close_key_memory_leak_fix.txt
Normal file
3
ChangeLog.d/psa_close_key_memory_leak_fix.txt
Normal file
|
@ -0,0 +1,3 @@
|
|||
Bugfix
|
||||
* Fix memory leak that occured when calling psa_close_key() on a
|
||||
wrapped key with MBEDTLS_PSA_CRYPTO_SE_C defined.
|
|
@ -1316,7 +1316,8 @@ static psa_status_t psa_get_and_lock_transparent_key_slot_with_policy(
|
|||
static psa_status_t psa_remove_key_data_from_memory( psa_key_slot_t *slot )
|
||||
{
|
||||
#if defined(MBEDTLS_PSA_CRYPTO_SE_C)
|
||||
if( psa_key_slot_is_external( slot ) )
|
||||
if( psa_get_se_driver( slot->attr.lifetime, NULL, NULL ) &&
|
||||
psa_key_slot_is_external( slot ) )
|
||||
{
|
||||
/* No key material to clean. */
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue