mirror of
git://git.gnupg.org/gnupg.git
synced 2024-12-22 10:19:57 +01:00
Fix explanation of commit e175152ef7515921635bf1e00383e812668d13fc.
--
This commit is contained in:
parent
8ddc9268f6
commit
f518196ca6
@ -485,10 +485,12 @@ agent_store_cache_hit (const char *key)
|
||||
*
|
||||
* Background: xtrystrdup uses gcry_strdup which may use the secure
|
||||
* memory allocator of Libgcrypt. That allocator takes locks and
|
||||
* since version 1.14 libgpg-error is nPth aware and thus talking a
|
||||
* since version 1.14 libgpg-error is nPth aware and thus taking a
|
||||
* lock may now lead to thread switch. Note that this only happens
|
||||
* when secure memory is allocated, the standard allocator uses
|
||||
* malloc which is not nPth aware.
|
||||
* when secure memory is _allocated_ (the standard allocator uses
|
||||
* malloc which is not nPth aware) but not when calling _xfree_
|
||||
* because gcry_free needs to check whether the pointer is in secure
|
||||
* memory and thus needs to take a lock.
|
||||
*/
|
||||
new = key ? xtrystrdup (key) : NULL;
|
||||
|
||||
|
@ -1227,7 +1227,7 @@ is_ip_address (const char *name)
|
||||
if (*s == '.')
|
||||
{
|
||||
if (s[1] == '.')
|
||||
return 0; /* No: Douple dot. */
|
||||
return 0; /* No: Double dot. */
|
||||
if (atoi (s+1) > 255)
|
||||
return 0; /* No: Ipv4 byte value too large. */
|
||||
ndots++;
|
||||
|
Loading…
x
Reference in New Issue
Block a user