Re: [openssl.org #1070] PATCH: fix for memory leaks in smime verification
On Mon, May 16, 2005 at 06:30:26PM +0200, Riaz Rahaman via RT wrote: I don't see any patch attached? The message came to the openssl-dev mailing list via the OpenSSL RT2 request tracker. Attachments are not forwarded on this path, but can be viewed on the web -- in this case: https://www.aet.tu-cottbus.de/rt2/Ticket/Display.html?id=1070 (Log in with name guest and password guest.) __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
[openssl.org #1070] PATCH: fix for memory leaks in smime verification
Thanks, this should be fixed in the next snapshots. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
[openssl.org #1070] PATCH: fix for memory leaks in smime verification
Hello! I use openssl-0.9.8 dev. There is a memory leak on verification of signed messages. This leak exist in snapshots 20050404 and 20050511. I've tested it using Debian Linux. I sign a file in default format with export OPENSSL_DEBUG_MEMORY=on LD_LIBRARY_PATH=. apps/openssl smime -sign -inkey key.pem -signer cert.pem -out file.sm -in file then I verify with LD_LIBRARY_PATH=. apps/openssl smime -verify -in file.sm -noverify I get a report about some memory leaks. Attached patch fix this leaks. Thank you. -- SY, Dmitry Belyavsky (ICQ UIN 6575) __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]