Title: RE: memory leaks in openssl - urgent.......

hello
just a suggestion......
i have found that even if i call the
  ctx = SSL_CTX_new (meth);
followed by no other calls to openssl & then clean up the stuff....
i still get this memory leak....
meenakshi

-----Original Message-----
From: Richard Levitte - VMS Whacker [mailto:[EMAIL PROTECTED]]
Sent: Thursday, June 29, 2000 2:11 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: memory leaks in openssl - urgent.......


From: Arora Meenakshi <[EMAIL PROTECTED]>

marora> please see that in the attached .bce file it shows a memory
marora> leak of 20 bytes in openssl stuff

20 bytes?  Sounds like a STACK structure...

marora> i am running my openssl code in bounds checker & i am getting
marora> the memory leaks in*CRYPTO_malloc(int num, const char *file,
marora> int line).

Well of course, since that one in turn calls malloc().  The question
is what called CRYPTO_malloc().  If you do `CRYPTO_malloc_debug_init();'
at the start of your program and `CRYPTO_mem_leaks_fp(stderr);' at the
end, you will get a report of memory leaks as discovered by OpenSSL,
and that will tell you who called CRYPTO_melloc().

I'm gonna take a look at that boundchecker file tomorrow if I can...

--
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Chairman@Stacken   \ S-168 35  BROMMA  \ T: +46-8-26 52 47
Redakteur@Stacken   \      SWEDEN       \ or +46-709-50 36 10
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, Celo Communications: http://www.celocom.com/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.

Reply via email to