Home GnuPG
Diffusion GnuPG 161674118d56

gpg: Fix a memory leak in batch key generation
161674118d56Unpublished

Unpublished Commit · Learn More

Not On Permanent Ref: This commit is not an ancestor of any permanent ref.

Description

gpg: Fix a memory leak in batch key generation

* g10/keygen.c (append_to_parameter): New.
(proc_parameter_file): Use new func to extend the parameter list.
* g10/passphrase.c (passphrase_to_dek_ext): Print a diagnostic of
gcry_kdf_derive failed.
* g10/keygen.c (proc_parameter_file): Print a diagnostic if
passphrase_to_dek failed.

Due to an improper way of using the linked list head, all memory for
items allocated in proc_parameter_file was never released. If batched
key generation with a passphrase and more than ~200 keys was used this
exhausted the secure memory.

Details

Provenance
wernerAuthored on Feb 21 2013, 8:35 PM
Parents
rGbaee681d2406: gpg: Handle the agent's NEW_PASSPHRASE inquiry.
Branches
Unknown
Tags
Unknown

Event Timeline

Werner Koch <wk@gnupg.org> committed rG161674118d56: gpg: Fix a memory leak in batch key generation (authored by Werner Koch <wk@gnupg.org>).Feb 22 2013, 9:30 AM