Home GnuPG
Diffusion GnuPG 273bb38cd7b5

gpg: Fix a memory leak in batch key generation
273bb38cd7b5Unpublished

Unpublished Commit · Learn More

Not On Permanent Ref: This commit is not an ancestor of any permanent ref.

Description

gpg: Fix a memory leak in batch key generation

* g10/keygen.c (append_to_parameter): New.
(proc_parameter_file): Use new func to extend the parameter list.
* g10/passphrase.c (passphrase_to_dek_ext): Print a diagnostic of
gcry_kdf_derive failed.
* g10/keygen.c (proc_parameter_file): Print a diagnostic if
passphrase_to_dek failed.

Due to an improper way of using the linked list head, all memory for
items allocated in proc_parameter_file was never released. If batched
key generation with a passphrase and more than ~200 keys was used this
exhausted the secure memory.

Details

Provenance
wernerAuthored on Feb 21 2013, 8:35 PM
Parents
rG18a261b65fd7: gpg: Handle the agent's NEW_PASSPHRASE inquiry.
Branches
Unknown
Tags
Unknown

Event Timeline

Werner Koch <wk@gnupg.org> committed rG273bb38cd7b5: gpg: Fix a memory leak in batch key generation (authored by Werner Koch <wk@gnupg.org>).Feb 21 2013, 8:35 PM