openssl/crypto/dh
Benjamin Kaduk 8abeefeccc Fix memory leak in DH_get_nid()
If q is non-NULL but p is indeed a safe prime, a modified copy
of p could be leaked.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4525)
2017-10-12 12:21:28 -05:00
..
build.info DH named parameter support 2017-10-12 02:40:30 +01:00
dh192.pem
dh512.pem
dh1024.pem
dh2048.pem
dh4096.pem
dh_ameth.c Support constant BN for DH parameters 2017-10-12 02:40:30 +01:00
dh_asn1.c ASN.1: adapt our use of INTxx et al by making them explicitely embedded 2017-04-13 10:23:31 +02:00
dh_check.c Change to check last return value of BN_CTX_get 2017-06-26 15:40:16 +02:00
dh_depr.c
dh_err.c make update 2017-10-12 02:41:27 +01:00
dh_gen.c Change to check last return value of BN_CTX_get 2017-06-26 15:40:16 +02:00
dh_kdf.c Use "" not <> on e_os.h include 2017-08-22 11:07:56 -04:00
dh_key.c Since return is inconsistent, I removed unnecessary parentheses and 2017-10-09 13:17:09 +01:00
dh_lib.c Allow DH_set0_key with only private key. 2017-09-26 14:48:51 +02:00
dh_locl.h
dh_meth.c
dh_pmeth.c Add pad support 2017-10-12 02:40:30 +01:00
dh_prn.c
dh_rfc5114.c
dh_rfc7919.c Fix memory leak in DH_get_nid() 2017-10-12 12:21:28 -05:00