On Tue, Apr 11, 2000 at 05:10:12PM +0530, Amit Chopra wrote:

>    I found that when my application terminates the temporary keys
> generated leak.

Directly after SSL_[CTX_]_set_tmp_{rsa,dh}, you may call {RSA,DH}_free
for the key given in the parameter.  This is because the reference
account is increased for RSA keys, and DH parameters are copied.

>    So to clean it up I am storing some information like the temp DH key
> generated during the handshake in the SSL ex_data structure [...]

Doing this is unnecessarily complicated, see above.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to