This was a known bug in 0.9.6b; I don't know if it is fixed in the current
snapshot. Since the amount of memory leaked is small and fixed, correcting
the bug was deemed to be low priority. As far as I know, there is no way to
free up the memory other than adding your own code to the openssl package.

======================
Greg Stark
[EMAIL PROTECTED]
======================


----- Original Message -----
From: "Ramaprasad K.R" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, October 04, 2001 10:30 AM
Subject: [Fwd: memory allocated by SSL_CTX_new]


> Hi,
>
> Looks like the earlier message that I sent did not reach the list. So I am
> resending again. Could somebody help with this please.
>
> Regards
> Rampi
>
> -------- Original Message --------
> Subject: memory allocated by SSL_CTX_new
> Date: Thu, 27 Sep 2001 19:49:27 +0530
> From: "Ramaprasad K.R" <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
>
> Hello,
>
> When I call SSL_CTX_new, the function CRYPTO_get_ex_new_index() gets
called
> and it seems to be allocating 56 bytes. And this memory does not get freed
> when I do a SSL_CTX_free() ?
>
> Could you please let me know if I need to call some other routine to
> ensure that those 56 bytes are also freed up.
>
> Thanks in advance,
> Rampi
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to