diff options
author | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-06-28 00:59:57 +0200 |
---|---|---|
committer | Mounir IDRASSI <mounir.idrassi@idrix.fr> | 2020-06-28 01:06:39 +0200 |
commit | 885cc1d01d569b9a7b702aa81a2308c88a4e309c (patch) | |
tree | d9fbf25a97060ee6c96bdb7591feb6fc8eaec581 /src/Core | |
parent | fded83d25cf8f8b4bbd80a1250c4777063ddc221 (diff) | |
download | VeraCrypt-885cc1d01d569b9a7b702aa81a2308c88a4e309c.tar.gz VeraCrypt-885cc1d01d569b9a7b702aa81a2308c88a4e309c.zip |
Linux/MacOSX: Erase sensitive memory explicitly instead of relying on the compiler not optimizing calls to method Memory::Erase
Diffstat (limited to 'src/Core')
-rw-r--r-- | src/Core/Unix/CoreService.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/Core/Unix/CoreService.cpp b/src/Core/Unix/CoreService.cpp index b129eff0..44389612 100644 --- a/src/Core/Unix/CoreService.cpp +++ b/src/Core/Unix/CoreService.cpp @@ -460,7 +460,7 @@ namespace VeraCrypt if (write (inPipe->GetWriteFD(), &adminPassword.front(), adminPassword.size())) { } // Errors ignored - Memory::Erase (&adminPassword.front(), adminPassword.size()); + burn (&adminPassword.front(), adminPassword.size()); throw_sys_if (fcntl (outPipe->GetReadFD(), F_SETFL, O_NONBLOCK) == -1); throw_sys_if (fcntl (errPipe.GetReadFD(), F_SETFL, O_NONBLOCK) == -1); |