Memory leak in DSA_free() call in dsa_lib.c
Version :
openssl-0.9.6c. But the same exists in openssl-0.9.7b
Description :
method_mont_p member of DSA struct is not freed.
The call stack shows
dsa_do_sign-DSA_sign_setup-dsa_sign_setup-BN_MONT_CTX_new-CRYPTO_malloc-malloc
- 72 bytes
On Friday 15 August 2003 09:13, Leenex Gomes via RT wrote:
Memory leak in DSA_free() call in dsa_lib.c
Version :
openssl-0.9.6c. But the same exists in openssl-0.9.7b
Description :
method_mont_p member of DSA struct is not freed.
That's strange as this should be done by
David == Ahrens, David (David) [EMAIL PROTECTED] writes:
David Can you resend the attachment. I didn't receive it. I'm very
David interested in a smaller openssl library. Do you have any
David memory profiles, statistics on the amount of size reduction
David you were able to achieve?
The
I didn't get any reaction on this patch. Isn't 32-bit MSDOS targets considered
good enough any longer?
The original message and patch is here:
http://marc.theaimsgroup.com/?l=openssl-devm=105943488203763w=2
--gv
__
OpenSSL
In message [EMAIL PROTECTED] on Fri, 15 Aug 2003 15:31:20 +0200, Gisle Vanem
[EMAIL PROTECTED] said:
giva I didn't get any reaction on this patch. Isn't 32-bit MSDOS
giva targets considered good enough any longer?
Nope, I think it's just summer, and people don't work quite as much
then. I've
Thanks! Got it.
Regards,
David Ahrens
-Original Message-
From: Bill Pringlemeir [mailto:[EMAIL PROTECTED]
Sent: Thursday, August 14, 2003 11:37 AM
To: [EMAIL PROTECTED]; Ahrens, David (David)
Subject: Re: [openssl.org #676] Small OpenSSL
David == Ahrens, David (David) [EMAIL