Hi,
Thanks . I would do what you have suggested if I cannot find a way out.
But your suggestion doesnt actually solve my problem.
I want to use the SSL_CTX_set_tmp_rsa/dh_cb(.,cb) so that i can decide on
what length key to use depending
on the cipher used.
So firstly i pre-generate 2 pairs of
Hi,
I found that when my application terminates the temporary keys
generated leak.
So to clean it up I am storing some information like the temp DH key
generated during the handshake in the SSL ex_data structure using
SSL_set_ex_data(pSSL,0,reinterpret_cast (pDH));
and after the connectio