When using PKCS7_decrypt with the following parameters:
BIO *bio = BIO_new(BIOS_s_mem());
PKCS7 pointer, EVP_PKEY pointer, X509 pointer, bio, 0.
I am getting a memory leak of 568 bytes.
I am developing on a linux OS with OpenSSL version 1.0.1e
Let me know if I can provide any additional
Just an update:
I updated to the latest library available 1.0.1j and still got the same memory
leak.
Thanks,
Luis Enrique
From: Luis Garcia
Sent: Monday, December 22, 2014 2:51 PM
To: r...@openssl.org
Subject: Bug report: PKCS7_decrypt memory leak
When using
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
OpenSSL 1.0.0 End Of Life Announcement
==
The OpenSSL Project is today making the following announcement:
Support for version 1.0.0 will cease on 31st December 2015.
No further releases of 1.0.0 will be made
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You will have noticed that the OpenSSL 1.0.0 End Of Life Announcement
contained a link to the recently published OpenSSL Release Strategy that
is available here:
https://www.openssl.org/about/releasestrat.html
I have put up a blog post on the
Hey Matt,
For some reason, this email is getting flagged as a bad signature by
Enigmail. All of your previous emails checked out fine, but this one
checked in with a big purple banner on it.
Dom
Sent from OS X. If you wish to communicate more securely my PGP Public
Key is 0x872524db9d74326c.
hi everyone:
i am working on verification signature of ECDMA-WITH-SHA256, i use
openssl command tools of SMIME command can verify successfully(ver:1.0.1g),
but my code got verified failure, and my code base is 1.0.1i, by tracking i
found api of *lh_OBJ_NAME_retrieve* return NULL to lead to