[svn] GnuPG - r4993 - in branches/STABLE-BRANCH-1-4: . g10

svn author wk cvs at cvs.gnupg.org
Wed May 6 11:31:16 CEST 2009


Author: wk
Date: 2009-05-06 11:31:15 +0200 (Wed, 06 May 2009)
New Revision: 4993

Modified:
   branches/STABLE-BRANCH-1-4/NEWS
   branches/STABLE-BRANCH-1-4/g10/ChangeLog
   branches/STABLE-BRANCH-1-4/g10/getkey.c
   branches/STABLE-BRANCH-1-4/g10/keyring.c
Log:
Fix for bug#1034.


Modified: branches/STABLE-BRANCH-1-4/g10/ChangeLog
===================================================================
--- branches/STABLE-BRANCH-1-4/g10/ChangeLog	2009-05-05 15:32:16 UTC (rev 4992)
+++ branches/STABLE-BRANCH-1-4/g10/ChangeLog	2009-05-06 09:31:15 UTC (rev 4993)
@@ -1,3 +1,10 @@
+2009-05-06  Werner Koch  <wk at g10code.com>
+
+	* keyring.c (keyring_get_keyblock): Fix memory leak due to
+	ring_trust packets.  Fixes bug#1034.
+
+	* getkey.c (finish_lookup): Remove dead code.
+
 2009-05-05  Werner Koch  <wk at g10code.com>
 
 	* keygen.c (read_parameter_file): Add keyword "Creation-Date".

Modified: branches/STABLE-BRANCH-1-4/NEWS
===================================================================
--- branches/STABLE-BRANCH-1-4/NEWS	2009-05-05 15:32:16 UTC (rev 4992)
+++ branches/STABLE-BRANCH-1-4/NEWS	2009-05-06 09:31:15 UTC (rev 4993)
@@ -6,7 +6,9 @@
 
     * Improved file locking.  Implemented it for W32.
 
+    * Fixed a memory leak which made imports of many keys very slow.
 
+
 Noteworthy changes in version 1.4.9 (2008-03-26)
 ------------------------------------------------
 

Modified: branches/STABLE-BRANCH-1-4/g10/getkey.c
===================================================================
--- branches/STABLE-BRANCH-1-4/g10/getkey.c	2009-05-05 15:32:16 UTC (rev 4992)
+++ branches/STABLE-BRANCH-1-4/g10/getkey.c	2009-05-06 09:31:15 UTC (rev 4993)
@@ -2541,17 +2541,7 @@
         latest_key = foundk? foundk:keyblock;
         goto found;
     }
-    
-    if (!req_usage) {
-        PKT_public_key *pk = foundk->pkt->pkt.public_key;
-        if (pk->user_id)
-            free_user_id (pk->user_id);
-        pk->user_id = scopy_user_id (foundu);
-        ctx->found_key = foundk;
-        cache_user_id( keyblock );
-        return 1; /* found */
-    }
-    
+
     latest_date = 0;
     latest_key  = NULL;
     /* do not look at subkeys if a certification key is requested */

Modified: branches/STABLE-BRANCH-1-4/g10/keyring.c
===================================================================
--- branches/STABLE-BRANCH-1-4/g10/keyring.c	2009-05-05 15:32:16 UTC (rev 4992)
+++ branches/STABLE-BRANCH-1-4/g10/keyring.c	2009-05-06 09:31:15 UTC (rev 4993)
@@ -419,38 +419,43 @@
             if ( lastnode 
                  && lastnode->pkt->pkttype == PKT_SIGNATURE
                  && (pkt->pkt.ring_trust->sigcache & 1) ) {
-                /* this is a ring trust packet with a checked signature 
+                /* This is a ring trust packet with a checked signature 
                  * status cache following directly a signature paket.
-                 * Set the cache status into that signature packet */
+                 * Set the cache status into that signature packet.  */
                 PKT_signature *sig = lastnode->pkt->pkt.signature;
                 
                 sig->flags.checked = 1;
                 sig->flags.valid = !!(pkt->pkt.ring_trust->sigcache & 2);
             }
-            /* reset lastnode, so that we set the cache status only from
-             * the ring trust packet immediately folling a signature */
+            /* Reset LASTNODE, so that we set the cache status only
+             * from the ring trust packets immediately following
+             * signature packets.  */
             lastnode = NULL;
+	    free_packet(pkt);
+	    init_packet(pkt);
+            continue;
         }
-        else {
-            node = lastnode = new_kbnode (pkt);
-            if (!keyblock)
-                keyblock = node;
-            else
-                add_kbnode (keyblock, node);
 
-            if ( pkt->pkttype == PKT_PUBLIC_KEY
-                 || pkt->pkttype == PKT_PUBLIC_SUBKEY
-                 || pkt->pkttype == PKT_SECRET_KEY
-                 || pkt->pkttype == PKT_SECRET_SUBKEY) {
-                if (++pk_no == hd->found.pk_no)
-                    node->flag |= 1;
-            }
-            else if ( pkt->pkttype == PKT_USER_ID) {
-                if (++uid_no == hd->found.uid_no)
-                    node->flag |= 2;
-            }
-        }
-
+        node = lastnode = new_kbnode (pkt);
+        if (!keyblock)
+          keyblock = node;
+        else
+          add_kbnode (keyblock, node);
+        
+        if ( pkt->pkttype == PKT_PUBLIC_KEY
+             || pkt->pkttype == PKT_PUBLIC_SUBKEY
+             || pkt->pkttype == PKT_SECRET_KEY
+             || pkt->pkttype == PKT_SECRET_SUBKEY) 
+          {
+            if (++pk_no == hd->found.pk_no)
+              node->flag |= 1;
+          }
+        else if ( pkt->pkttype == PKT_USER_ID) 
+          {
+            if (++uid_no == hd->found.uid_no)
+              node->flag |= 2;
+          }
+        
         pkt = xmalloc (sizeof *pkt);
         init_packet(pkt);
     }




More information about the Gnupg-commits mailing list