On Wed, 6 Dec 2006 17:12:37 -0600
Michael Halcrow <[email protected]> wrote:
> Public key support code. This reads and writes packets in the header
> that contain public key encrypted file keys. It calls the messaging
> code in the previous patch to send and receive encryption and
> decryption request packets from the userspace daemon.
>
> ...
>
> + memset(auth_tok_list_item, 0,
> + sizeof(struct ecryptfs_auth_tok_list_item));
> + kmem_cache_free(ecryptfs_auth_tok_list_item_cache,
> + auth_tok_list_item);
>
> ...
>
> + memset(auth_tok_list_item, 0,
> + sizeof(struct ecryptfs_auth_tok_list_item));
> + kmem_cache_free(ecryptfs_auth_tok_list_item_cache,
> + auth_tok_list_item);
That's a bit wasteful of cycles. Or is this done to minimise the exposure
of sensitive data? If so, a comment would be in order.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]