On 7/20/06, Rafael J. Wysocki <[EMAIL PROTECTED]> wrote: > On Thursday 20 July 2006 18:58, Luca wrote: > > (btw, rsa_data_set was leacked): > > Yes, it was intentional. If you free the key created out of a data set, you > can't free the data set itself, apparently, or you get a double free > (libgcrypt "feature", I would guess ;-) ).
I admin that I haven't tested it, but I was looking at the code of gcypt ;) gcry_ac_key_init() actually copies the dataset. But the internal S-Expression is created using the old data, so it's a bit hard to track where the pointers go... Oh well, kernel will cleanup the mess :P Luca ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT Join SourceForge.net's Techsay panel and you'll get the chance to share your opinions on IT & business topics through brief surveys -- and earn cash http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV _______________________________________________ Suspend-devel mailing list Suspend-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/suspend-devel