I believe this PR fixes the issue for RSA, DSA and DH (they all share the same concept).
https://github.com/openssl/openssl/pull/994 Cheers, Richard In message <[email protected]> on Mon, 25 Apr 2016 13:39:09 +0000, Richard Levitte via RT <[email protected]> said: rt> In message <[email protected]> on Mon, 25 Apr 2016 13:19:38 +0000, "Salz, Rich via RT" <[email protected]> said: rt> rt> rt> No, he means setting the same value twice. For example, making this change: rt> rt> If (r=->n != n) BN_free(r->n); rt> rt> If(r->e != e) BN_free(r->e); rt> rt> If (r->d != d) BN_free(r->d); rt> rt> rt> rt> I agree it shouldn't happen, but do we want to protect against that? I could be convinced either way. rt> rt> Ah ok... sorry, I misread the intention. rt> rt> Agreed that we could make sure not to free the pointers in that case. rt> rt> Cheers, rt> Richard rt> rt> -- rt> Richard Levitte [email protected] rt> OpenSSL Project http://www.openssl.org/~levitte/ rt> rt> rt> -- rt> Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4518 rt> Please log in as guest with password guest if prompted rt> rt> -- rt> openssl-dev mailing list rt> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev rt> -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4518 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
