1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-12-22 10:19:57 +01:00

Fix explanation of commit e175152ef7515921635bf1e00383e812668d13fc.

--
This commit is contained in:
Werner Koch 2017-02-01 08:18:44 +01:00
parent 8ddc9268f6
commit f518196ca6
No known key found for this signature in database
GPG Key ID: E3FDFF218E45B72B
2 changed files with 6 additions and 4 deletions

View File

@ -485,10 +485,12 @@ agent_store_cache_hit (const char *key)
*
* Background: xtrystrdup uses gcry_strdup which may use the secure
* memory allocator of Libgcrypt. That allocator takes locks and
* since version 1.14 libgpg-error is nPth aware and thus talking a
* since version 1.14 libgpg-error is nPth aware and thus taking a
* lock may now lead to thread switch. Note that this only happens
* when secure memory is allocated, the standard allocator uses
* malloc which is not nPth aware.
* when secure memory is _allocated_ (the standard allocator uses
* malloc which is not nPth aware) but not when calling _xfree_
* because gcry_free needs to check whether the pointer is in secure
* memory and thus needs to take a lock.
*/
new = key ? xtrystrdup (key) : NULL;

View File

@ -1227,7 +1227,7 @@ is_ip_address (const char *name)
if (*s == '.')
{
if (s[1] == '.')
return 0; /* No: Douple dot. */
return 0; /* No: Double dot. */
if (atoi (s+1) > 255)
return 0; /* No: Ipv4 byte value too large. */
ndots++;