diff options
Diffstat (limited to 'gcr/gcr-memory.c')
-rw-r--r-- | gcr/gcr-memory.c | 92 |
1 files changed, 0 insertions, 92 deletions
diff --git a/gcr/gcr-memory.c b/gcr/gcr-memory.c deleted file mode 100644 index 04d216d9..00000000 --- a/gcr/gcr-memory.c +++ /dev/null @@ -1,92 +0,0 @@ -/* - * gnome-keyring - * - * Copyright (C) 2008 Stefan Walter - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU Lesser General Public License as - * published by the Free Software Foundation; either version 2.1 of - * the License, or (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, but - * WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - * Lesser General Public License for more details. - * - * You should have received a copy of the GNU Lesser General Public - * License along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA - * 02111-1307, USA. - */ - -#include "config.h" - -#include "egg/egg-secure-memory.h" - -#include <glib.h> - -/* ----------------------------------------------------------------------------- - * MEMORY - */ - -static gboolean do_warning = TRUE; -#define WARNING "couldn't allocate secure memory to keep passwords " \ - "and or keys from being written to the disk" - -#define ABORTMSG "The GNOME_KEYRING_PARANOID environment variable was set. " \ - "Exiting..." - -static G_LOCK_DEFINE (memory_lock); - -/* - * These are called from egg-secure-memory.c to provide appropriate - * locking for memory between threads - */ - -void -egg_memory_lock (void) -{ - G_LOCK (memory_lock); -} - -void -egg_memory_unlock (void) -{ - G_UNLOCK (memory_lock); -} - -void* -egg_memory_fallback (void *p, size_t sz) -{ - const gchar *env; - - /* We were asked to free memory */ - if (!sz) { - g_free (p); - return NULL; - } - - /* We were asked to allocate */ - if (!p) { - if (do_warning) { - g_message (WARNING); - do_warning = FALSE; - } - - env = g_getenv ("GNOME_KEYRING_PARANOID"); - if (env && *env) - g_error (ABORTMSG); - - return g_malloc0 (sz); - } - - /* - * Reallocation is a bit of a gray area, as we can be asked - * by external libraries (like libgcrypt) to reallocate a - * non-secure block into secure memory. We cannot satisfy - * this request (as we don't know the size of the original - * block) so we just try our best here. - */ - - return g_realloc (p, sz); -} |