DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=32502>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=32502

           Summary: Memory leak in Digest Authentication
           Product: Tomcat 5
           Version: 5.0.29
          Platform: Macintosh
        OS/Version: Mac OS X 10.3
            Status: NEW
          Severity: critical
          Priority: P2
         Component: Catalina
        AssignedTo: [EMAIL PROTECTED]
        ReportedBy: [EMAIL PROTECTED]


The DigestAuthenticator class contains a small but significant leak. In the 
generateNOnce method, the 
nOnceValue is inserted into a Hashtable with an expire time. This feature does 
not appear to be fully 
implemented and as a result the Hashtable "nOnceTokens" will continue to grow 
un-bounded.

The short term solution to this problem is to remove the Hashtable insert since 
it isn't apparently being 
used.

Longer term, the host-expireTime-otherState tuple could be encoded in 
client-opaque nOnceValue and 
used across multiple TC5 instances.

-- 
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to