Hi David,

The answer is the second number, 100kb. So the leak grows per each session
created and destroyed by ~10k.

Thank you in advance for any pointers or ideas on the above.

-AA


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David Schwartz
Sent: Thursday, October 07, 2004 12:15 AM
To: [EMAIL PROTECTED]
Subject: RE: SSL session allocation/freeing memory leak issue


        If you create ten sessions, do you leak 10Kb or 100Kb? If only 10Kb,
then
it's not a leak.

        DS

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Areg Alimian
Sent: Wednesday, October 06, 2004 9:07 PM
To: [EMAIL PROTECTED]
Subject: SSL session allocation/freeing memory leak issue


Hi all,

I have an issue with SSL session structure memory allocation and freeing.
Upon initialization, I perform the following:

Allocate memory for SSL_CTX by SSL_CTX_new()
Initialize the context with a cert.
Allocate memory for input and output buffers via BIO_new()
Allocate and initialize a new SSL session structure with SSL_new(SSL_CTX*)
Set BIO/Set Connect state.

Now when I'm done using the SSL session above, I call SSL_free().  The
problem is that I'm getting roughly 10k memory leak before the session is
allocated and after it is destroyed.

Please help!

Thank you,
-Areg


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to