diff options
| author | Werner Koch <[email protected]> | 2013-02-21 19:35:10 +0000 |
|---|---|---|
| committer | Werner Koch <[email protected]> | 2013-02-22 08:30:07 +0000 |
| commit | 161674118d568025896026ede5e03d26bdfdfa68 (patch) | |
| tree | af96a7837bb76df14549d4d4b1e37fcdb27d5a6f /agent/command-ssh.c | |
| parent | gpg: Handle the agent's NEW_PASSPHRASE inquiry. (diff) | |
| download | gnupg-161674118d568025896026ede5e03d26bdfdfa68.tar.gz gnupg-161674118d568025896026ede5e03d26bdfdfa68.zip | |
gpg: Fix a memory leak in batch key generation
* g10/keygen.c (append_to_parameter): New.
(proc_parameter_file): Use new func to extend the parameter list.
* g10/passphrase.c (passphrase_to_dek_ext): Print a diagnostic of
gcry_kdf_derive failed.
* g10/keygen.c (proc_parameter_file): Print a diagnostic if
passphrase_to_dek failed.
--
Due to an improper way of using the linked list head, all memory for
items allocated in proc_parameter_file was never released. If batched
key generation with a passphrase and more than ~200 keys was used this
exhausted the secure memory.
Diffstat (limited to 'agent/command-ssh.c')
0 files changed, 0 insertions, 0 deletions
