On Tue, Apr 11, 2000 at 05:10:12PM +0530, Amit Chopra wrote:
> I found that when my application terminates the temporary keys
> generated leak.
Directly after SSL_[CTX_]_set_tmp_{rsa,dh}, you may call {RSA,DH}_free
for the key given in the parameter. This is because the reference
account is increased for RSA keys, and DH parameters are copied.
> So to clean it up I am storing some information like the temp DH key
> generated during the handshake in the SSL ex_data structure [...]
Doing this is unnecessarily complicated, see above.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]