Hello, I'm encountering problems freeing an SSL context. When I look the ctx structure I see the following: p *ctx->cert $1 = {key = 0x82baba0, valid = 0, mask = 0, export_mask = 0, rsa_tmp = 0x0, rsa_tmp_cb = 0, dh_tmp = 0x0, dh_tmp_cb = 0, pkeys = {{x509 = 0x82bf7a0, privatekey = 0x82bfea0}, {x509 = 0x0, privatekey = 0x0}, { x509 = 0x38bd1156, privatekey = 0x0}, {x509 = 0x0, privatekey = 0x2}, { x509 = 0x2, privatekey = 0x0}}, references = 1} The third set of pkeys points to an invalid address which causes SSL_free to generate a SIGSEGV. We also see corruption (less often) in method_mod_n : p *r $7 = {pad = 0, version = 0, meth = 0x81014ec, n = 0x82bf3a0, e = 0x82bf3c0, d = 0x82bf3e0, p = 0x82bf420, q = 0x82bf440, dmp1 = 0x82bf460, dmq1 = 0x82bf4a0, iqmp = 0x82bf4c0, ex_data = {sk = 0x0, dummy = 951920904}, references = -1, flags = 0, _method_mod_n = 0x1, _method_mod_p = 0x1, _method_mod_q = 0x0, bignum_data = 0x0, blinding = 0x0} BN_MONT_CTX *_method_mod_n; Is this familiar? Thanks in advance. --- Donn Holtzman IPivot - Intel Commerce Equipment Operations [EMAIL PROTECTED] (858) 391-1832 ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]