Fix psa_key_management_operations

At these locations, psa_key_attribute variables are used without
initialisation. The function getting it (psa_get_key_attributes),
is freeing attributes->domain_parameters, which can contain random
address from the stack.

Signed-off-by: Gabor Abonyi <gabor.abonyi@arm.com>
pull/12392/head
Gabor Abonyi 2020-02-03 13:47:42 +01:00
parent d847f9f164
commit c94b3e41ee
1 changed files with 2 additions and 2 deletions

View File

@ -1822,7 +1822,7 @@ static void psa_key_management_operation(void)
switch (psa_key_mng.func) {
case PSA_GET_KEY_ATTRIBUTES: {
psa_key_attributes_t attributes;
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
psa_client_key_attributes_t client;
if (!psa_crypto_access_control_is_handle_permitted(psa_key_mng.handle,
@ -1882,7 +1882,7 @@ static void psa_key_management_operation(void)
case PSA_IMPORT_KEY: {
size_t attributes_length = msg.in_size[1];
psa_key_attributes_t attributes;
psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
size_t data_length = msg.in_size[2];
uint8_t *data = NULL;
psa_key_handle_t handle;