Hi,

I used to do openssl memory leaks checking using following code under
openssl-0.9.6x:

int main(int argc, char* argv[])
{
        CRYPTO_malloc_debug_init();
        CRYPTO_dbg_set_options(V_CRYPTO_MDEBUG_ALL);
        CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
        OpenSSL_add_all_algorithms();

        bio_stdout = BIO_new_fp(stdout, BIO_NOCLOSE);

        if(bio_stdout)
                BIO_free(bio_stdout);

        printf("\n");

        OBJ_cleanup();
        EVP_cleanup(); 
        ERR_clear_error();
        ERR_free_strings();
        ERR_remove_state(0);

        CRYPTO_mem_leaks_fp(stderr);
        printf("\n");

        return 0;
}

Above code looks like it worked fine, I mean it detected if I miss any free
call.

But the same code is giving me following leaks under openssl-0.9.7 and its
betas:

[12:55:41]   351 file=.\crypto\stack\stack.c, line=124, thread=892,
number=20, a
ddress=008D3390
[12:55:41]   350 file=.\crypto\ex_data.c, line=308, thread=892, number=12,
addre
ss=008D3460
[12:55:41]   348 file=.\crypto\lhash\lhash.c, line=119, thread=892,
number=96, a
ddress=008D3630
[12:55:41]   349 file=.\crypto\lhash\lhash.c, line=121, thread=892,
number=64, a
ddress=008D3530
[12:55:41]   353 file=.\crypto\lhash\lhash.c, line=193, thread=892,
number=12, a
ddress=008D31F0
[12:55:41]   352 file=.\crypto\stack\stack.c, line=126, thread=892,
number=16, a
ddress=008D32C0
220 bytes leaked in 6 chunks

What I should do to resolve these? Are there any leaks or no leaks ??

Thanks
Aslam

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to