hello
just a suggestion......
i have found that even if i call the
ctx = SSL_CTX_new (meth);
followed by no other calls to openssl & then clean up the stuff....
i still get this memory leak....
meenakshi
-----Original Message-----
From: Richard Levitte - VMS Whacker [mailto:[EMAIL PROTECTED]]
Sent: Thursday, June 29, 2000 2:11 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: memory leaks in openssl - urgent.......
From: Arora Meenakshi <[EMAIL PROTECTED]>
marora> please see that in the attached .bce file it shows a memory
marora> leak of 20 bytes in openssl stuff
20 bytes? Sounds like a STACK structure...
marora> i am running my openssl code in bounds checker & i am getting
marora> the memory leaks in*CRYPTO_malloc(int num, const char *file,
marora> int line).
Well of course, since that one in turn calls malloc(). The question
is what called CRYPTO_malloc(). If you do `CRYPTO_malloc_debug_init();'
at the start of your program and `CRYPTO_mem_leaks_fp(stderr);' at the
end, you will get a report of memory leaks as discovered by OpenSSL,
and that will tell you who called CRYPTO_melloc().
I'm gonna take a look at that boundchecker file tomorrow if I can...
--
Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED]
Chairman@Stacken \ S-168 35 BROMMA \ T: +46-8-26 52 47
Redakteur@Stacken \ SWEDEN \ or +46-709-50 36 10
Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, Celo Communications: http://www.celocom.com/
Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.