diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2000-03-22 14:50:23 +0100 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2000-03-22 14:50:23 +0100 |
commit | e77066ea0a1a339a22bd5226eb08f139f67e96fe (patch) | |
tree | d71e9ef514b5cea0512376b563665c2949253b33 /CHANGES | |
parent | more failures (diff) | |
download | openssl-e77066ea0a1a339a22bd5226eb08f139f67e96fe.tar.xz openssl-e77066ea0a1a339a22bd5226eb08f139f67e96fe.zip |
Fix a memory leak in PKCS12_parse.
Don't copy private key to X509 etc public key structures.
Fix for warning.
Diffstat (limited to 'CHANGES')
-rw-r--r-- | CHANGES | 7 |
1 files changed, 7 insertions, 0 deletions
@@ -4,6 +4,13 @@ Changes between 0.9.5 and 0.9.5a [XX XXX 2000] + *) Modernise PKCS12_parse() so it uses STACK_OF(X509) for its ca argument + fix a leak when the ca argument was passed as NULL. Stop X509_PUBKEY_set() + using the passed key: if the passed key was a private key the result + of X509_print(), for example, would be to print out all the private key + components. + [Steve Henson] + *) des_quad_cksum() byte order bug fix. [Ulf Möller, using the problem description in krb4-0.9.7, where the solution is attributed to Derrick J Brashear <shadow@DEMENTIA.ORG>] |