Hello Openssl team, I have a query on the memory hold with openssl handshake.
When performed openssl handshake, we are always observing memory hold increase. This hold eventually increases and at last we end up with device having no memory at all. Following is the memory hold tracebacks. First Hold : SSL_SESSION_new(0x3794200)+0x16 ssl_get_new_session(0x3793d88)+0x1e ssl3_get_client_hello(0x378bdf8)+0x1b4 ssl3_accept(0x3789590)+0x32c SSL_accept(0x3791a1c)+0x27 ssl23_get_client_hello(0x3780c12)+0x7f ssl23_accept(0x3780980)+0xe3 ssl23_read(0x3780730)+0x36 SSL_read(0x3791940)+0x3c Second Hold : sk_insert(0x375ffac)+0x52 sk_push(0x376007c)+0x17 ssl_bytes_to_cipher_list(0x3790f42)+0x102 ssl3_get_client_hello(0x378bdf8)+0x270 ssl3_accept(0x3789590)+0x32c SSL_accept(0x3791a1c)+0x27 ssl23_get_client_hello(0x3780c12)+0x7f ssl23_accept(0x3780980)+0xe3 ssl23_read(0x3780730)+0x36 SSL_read(0x3791940)+0x3c Third place : lh_insert(0x3755b3a)+0x83 SSL_CTX_add_session(0x3793914)+0x6c ssl_update_cache(0x379037e)+0x5e ssl3_accept(0x3789590)+0x1c1 ssl3_read_bytes(0x3787798)+0xb7 ssl3_read_internal(0x3786730)+0x65 ssl3_read(0x378689c)+0x1c SSL_read(0x3791940)+0x3c Fourth function : sk_new(). Please let us know whether these memory holds are for session resumption? or someother purpose. Is there any way we can free these memory addresses during SSL_free()? Thanks, Rajeswari.