Re: Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-18 Thread Dr. Stephen Henson
On Tue, Feb 18, 2014, Varma Dantuluri wrote: > Thanks Steve for the response. Given the current way it is done in > OpenSSL-1.0.1f, what is the right thing for the application to do? Should > the application be using a static EC_KEY for each of the curves that are > supported? > For 1.0.1f the c

Re: Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-18 Thread Varma Dantuluri
Thanks Steve for the response. Given the current way it is done in OpenSSL-1.0.1f, what is the right thing for the application to do? Should the application be using a static EC_KEY for each of the curves that are supported? Thanks Varma On Sat, Feb 15, 2014 at 6:36 AM, Dr. Stephen Henson wrote:

Re: Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-15 Thread Dr. Stephen Henson
On Thu, Feb 13, 2014, Varma Dantuluri wrote: > In OpenSSL-1.0.1f, in 'ssl3_send_server_key_exchange' function, when all > the below conditions are true, there is a potential memory leak. > > 1) 'type & SSL_kEECDH' is true, (ie the key exchange is ephemeral ecdh) > 2) 'ecdhp == NULL' && 's->cert->

Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-13 Thread Varma Dantuluri
In OpenSSL-1.0.1f, in 'ssl3_send_server_key_exchange' function, when all the below conditions are true, there is a potential memory leak. 1) 'type & SSL_kEECDH' is true, (ie the key exchange is ephemeral ecdh) 2) 'ecdhp == NULL' && 's->cert->ecdh_tmp_cb != NULL' 3) 's->cert->ecdh_tmp_cb' mallocs a