On 7/20/06, Rafael J. Wysocki <[EMAIL PROTECTED]> wrote:
> On Thursday 20 July 2006 18:58, Luca wrote:
> > (btw, rsa_data_set was leacked):
>
> Yes, it was intentional.  If you free the key created out of a data set, you
> can't free the data set itself, apparently, or you get a double free
> (libgcrypt "feature", I would guess ;-) ).

I admin that I haven't tested it, but I was looking at the code of gcypt ;)
gcry_ac_key_init() actually copies the dataset. But the internal
S-Expression is created using the old data, so it's a bit hard to
track where the pointers go...
Oh well, kernel will cleanup the mess :P

Luca

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys -- and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Suspend-devel mailing list
Suspend-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/suspend-devel

Reply via email to