On 4/26/2016 1:20 PM, Salz, Rich wrote:
Look. If Doug noticed this, programmers less intimate with this API are much
more likely to get stung by it. The protection against such a misunderstanding
is cheap.


Is it?  And what is that protection?  Without introducing memory leaks.

In RSA_set0_key:
After any type of NULL test:

  if (e != rsa->e) {
        BN_free(rsa->e);
        rsa->e = e;
  }




--

 Douglas E. Engert  <deeng...@gmail.com>

--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to