bob bob added the comment:

loewis:
This is correct stack:
0021ee80 10036d19 0176d259 00000000 00000013 msvcr90!memset+0x3d
0021ee9c 10022a22 0021ef1c 0176d218 1001bf62 _ssl!SHA1_Final+0x49
0021eea8 1001bf62 0021ef0c 0021ef1c 00000146 _ssl!OPENSSL_cleanse+0x92
0021eebc 10010319 0021ef0c 0021ef1c 00000000 _ssl!EVP_DigestFinal_ex+0x32
0021ef30 100035f3 0021ef74 00000004 00000000 _ssl!RAND_SSLeay+0x2a9
0021ef44 10085da0 0021ef74 00000004 00000000 _ssl!RAND_add+0x63
0021ef74 10073920 0176a158 0177ba18 00952a78 _ssl!ssl3_accept+0x40
0021ef84 10001714 0176a158 0147b350 00000000 _ssl!SSL_do_handshake+0x50
0021ef8c 0147b350 00000000 00952a78 ffffffff _ssl!PySSL_SSLdo_handshake+0x74 
[c:\users\martin\27\python\modules\_ssl.c @ 478]
0021ef90 00000000 00952a78 ffffffff 100d3038 0x147b350

dump file attached.
Packets from 5 to 8 received after client process has been terminated. 
Thereafter, the CPU freed.

----------
Added file: http://bugs.python.org/file34514/server_side.pcap

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue20924>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to