I don't understand why this patch would fix the bug.  It looks like it
just means that we always call next() with exactly 128*1024, whereas
before this patch, we might call it with anything from 32*1024 to
128*1024.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1091269

Title:
  Data corruption when resuming with --no-encryption option

To manage notifications about this bug go to:
https://bugs.launchpad.net/duplicity/+bug/1091269/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to