Hello,

I'm encountering problems freeing an SSL context. 

When I look the ctx structure I see the following:

p *ctx->cert
$1 = {key = 0x82baba0, valid = 0, mask = 0, export_mask = 0, rsa_tmp = 0x0,
  rsa_tmp_cb = 0, dh_tmp = 0x0, dh_tmp_cb = 0, pkeys = {{x509 = 0x82bf7a0,
      privatekey = 0x82bfea0}, {x509 = 0x0, privatekey = 0x0}, {
      x509 = 0x38bd1156, privatekey = 0x0}, {x509 = 0x0, privatekey = 0x2},
{
      x509 = 0x2, privatekey = 0x0}}, references = 1}

The third set of pkeys points to an invalid address which causes SSL_free to
generate a SIGSEGV. We also see corruption (less often) in method_mod_n :

p *r
$7 = {pad = 0, version = 0, meth = 0x81014ec,
  n = 0x82bf3a0, e = 0x82bf3c0, d = 0x82bf3e0,
  p = 0x82bf420, q = 0x82bf440, dmp1 = 0x82bf460,
  dmq1 = 0x82bf4a0, iqmp = 0x82bf4c0, ex_data = {sk = 0x0,
    dummy = 951920904}, references = -1, flags = 0,
  _method_mod_n = 0x1, _method_mod_p = 0x1,
  _method_mod_q = 0x0, bignum_data = 0x0, blinding = 0x0}
BN_MONT_CTX *_method_mod_n;

Is this familiar?

Thanks in advance.

---
Donn Holtzman
IPivot - Intel Commerce Equipment Operations
[EMAIL PROTECTED]
(858) 391-1832


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to