Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This compliant solution uses a char array to store the password after it is retrieved from an external file existing in a secured secure directory. The password is immediately cleared out after use. This limits the exposure time.

...