If Open-SSL does not already do this, they should add code for memory pools.

On Wed, May 26, 2004 at 03:15:36PM -0400, [EMAIL PROTECTED] wrote:
> How do you read the debug output of CRYPTO_MDEBUG?
>  
> Why is there so many "87389 bytes leaked in 1881 chunks"?
>  
> After making three connections all of which completed successfully
> I got 4 "nnnnn bytes leaked in nnnn chunks"
>  
> Mike
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to