bob bob added the comment: loewis: This is correct stack: 0021ee80 10036d19 0176d259 00000000 00000013 msvcr90!memset+0x3d 0021ee9c 10022a22 0021ef1c 0176d218 1001bf62 _ssl!SHA1_Final+0x49 0021eea8 1001bf62 0021ef0c 0021ef1c 00000146 _ssl!OPENSSL_cleanse+0x92 0021eebc 10010319 0021ef0c 0021ef1c 00000000 _ssl!EVP_DigestFinal_ex+0x32 0021ef30 100035f3 0021ef74 00000004 00000000 _ssl!RAND_SSLeay+0x2a9 0021ef44 10085da0 0021ef74 00000004 00000000 _ssl!RAND_add+0x63 0021ef74 10073920 0176a158 0177ba18 00952a78 _ssl!ssl3_accept+0x40 0021ef84 10001714 0176a158 0147b350 00000000 _ssl!SSL_do_handshake+0x50 0021ef8c 0147b350 00000000 00952a78 ffffffff _ssl!PySSL_SSLdo_handshake+0x74 [c:\users\martin\27\python\modules\_ssl.c @ 478] 0021ef90 00000000 00952a78 ffffffff 100d3038 0x147b350
dump file attached. Packets from 5 to 8 received after client process has been terminated. Thereafter, the CPU freed. ---------- Added file: http://bugs.python.org/file34514/server_side.pcap _______________________________________ Python tracker <rep...@bugs.python.org> <http://bugs.python.org/issue20924> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com