memory leak debug options

2021-04-27 Thread Chetan, Sethi (Sasken; LEADER ; ADITJ/SWG)
Hello, Currently we are seeing below 3 patterns of memory leak issue with Openssl 1.1.1i and 1.1.1k version using address santizer option as below: Direct leak of 208 byte(s) in 2 object(s) allocated from: #0 0x9ef57b in __interceptor_malloc (/usr/local/bin/autoai/custom_binary+0x9ef57b

Re: Memory leak

2020-07-20 Thread Emmanuel Deloget
Hello "d", On Mon, Jul 20, 2020 at 6:23 PM d via openssl-users < openssl-users@openssl.org> wrote: > No memory leakage, if I comment out all SSL related constructs from my > code. > Thus, the SSL related code parts seem to be the cause of this leak. > What is the issue here? > Makefile: > SSL_

Memory leak

2020-07-20 Thread d via openssl-users
No memory leakage, if I comment out all SSL related constructs from my code. Thus, the SSL related code parts seem to be the cause of this leak. What is the issue here? Makefile: CC=clang CFLAGS=-g -Wextra -Wall -Werror -pedantic -std=c89 -lssl -fsanitize=address -fno-omit-frame-pointer .PHONY:

Re: Probably memory leak on handshake when KTLS enabled

2020-06-12 Thread Xinzhe Wang
t; When KTLS is enabled, multiple client's handshake will lead to unexpected >> eof while reading and data corrupt(possible memory leak). >> >> Tested OpenSSL version: master, 3.0.0-alpha1 >> Kernel version: 5.4.43-1-MANJARO >> Reproduce step(using docker): >&

Re: Probably memory leak on handshake when KTLS enabled

2020-06-12 Thread Dmitry Belyavsky
Could you please try to re-run the client via Valgrind? On Fri, Jun 12, 2020 at 7:03 AM Xinzhe Wang wrote: > When KTLS is enabled, multiple client's handshake will lead to unexpected > eof while reading and data corrupt(possible memory leak). > > Tested OpenSSL version: mas

Probably memory leak on handshake when KTLS enabled

2020-06-11 Thread Xinzhe Wang
When KTLS is enabled, multiple client's handshake will lead to unexpected eof while reading and data corrupt(possible memory leak). Tested OpenSSL version: master, 3.0.0-alpha1 Kernel version: 5.4.43-1-MANJARO Reproduce step(using docker): sudo modprobe tls git clone https://github.com/op

memory leak observed with openssl 1.0.2l version of openssl

2019-03-14 Thread Grace Priscilla Jero
Hi All, We are using 1.0.2l version of system openssl that causes memory leak during a state of congestion. Is this already a known issue? The same was tested with 1.1.g version of openssl and there was'nt any leaks. Do anyone know the changes or difference between these 2 versions. T

Re: OpenSSL hash memory leak

2019-02-26 Thread Joe Browning
* EVP_DigestFinal_ex(mdctx, hash_data.md_value, &hash_data.md_len)* *Missing reference there for value?* *Joe* On Mon, Feb 25, 2019, 09:31 Jakob Bohm via openssl-users < openssl-users@openssl.org> wrote: > On 25/02/2019 15:05, Hubert Kario wrote: > > On Sunday, 24 February 2019 11:34:18 CET pr

Re: OpenSSL hash memory leak

2019-02-25 Thread Jakob Bohm via openssl-users
On 25/02/2019 15:05, Hubert Kario wrote: On Sunday, 24 February 2019 11:34:18 CET prithiraj das wrote: If it helps, sometimes I do get the following errors for the same and subsequent reboot: Alignment trap: sh (601) PC=0xb6e008f8 Instr=0x4589c0d7 Address=0x00d7 FSR 0x801 Alignment trap: lo

Re: OpenSSL hash memory leak

2019-02-25 Thread Hubert Kario
On Sunday, 24 February 2019 11:34:18 CET prithiraj das wrote: > If it helps, sometimes I do get the following errors for the same and > subsequent reboot: > > Alignment trap: sh (601) PC=0xb6e008f8 Instr=0x4589c0d7 Address=0x00d7 > FSR 0x801 > Alignment trap: login (584) PC=0xb6e6ab00 Instr=0x

Re: OpenSSL hash memory leak

2019-02-24 Thread Georg Höllrigl
lrigl , openssl-users@openssl.org, Jordan Brown Betreff: Re: OpenSSL hash memory leak If it helps, sometimes I do get the following errors for the same and subsequent reboot:Alignment trap: sh (601) PC=0xb6e008f8 Instr=0x4589c0d7 Address=0x00d7 FSR 0x801Alignment trap: login (584) PC=0xb6e

Re: OpenSSL hash memory leak

2019-02-24 Thread prithiraj das
y to resolve this problem, How do I clear the buff/cache? > > On Sun, 24 Feb 2019 at 03:15, Georg Höllrigl > wrote: > >> Hello, >> >> >> >> I guess you’re not seeing a memory leak, but just normal behaviour of >> linux file system cache. >&

Re: OpenSSL hash memory leak

2019-02-24 Thread prithiraj das
here a way to resolve this problem, How do I clear the buff/cache? On Sun, 24 Feb 2019 at 03:15, Georg Höllrigl wrote: > Hello, > > > > I guess you’re not seeing a memory leak, but just normal behaviour of > linux file system cache. > > Buff/cache is keeping files in memor

AW: OpenSSL hash memory leak

2019-02-23 Thread Georg Höllrigl
Hello, I guess you’re not seeing a memory leak, but just normal behaviour of linux file system cache. Buff/cache is keeping files in memory that were least accessed as long as not needed by other stuff. You don’t need to free the buffer/cache, because linux does that automatically, when

Re: OpenSSL hash memory leak

2019-02-23 Thread prithiraj das
e written a code to generate the hash of a file > in an embeddded device having linux OS and low memory capacity and the > files are generally of size 44 MB or more. The first time or even the > second time on some occasions, the hash of any file is successfully > generated. On the

Re: OpenSSL hash memory leak

2019-02-22 Thread Jordan Brown
having linux OS and low memory capacity > and the files are generally of size 44 MB or more. The first time or > even the second time on some occasions, the hash of any file is > successfully generated. On the 3rd or 4th time (possibly due to lack > of memory/memory leak), the system reboots

OpenSSL hash memory leak

2019-02-22 Thread prithiraj das
generated. On the 3rd or 4th time (possibly due to lack of memory/memory leak), the system reboots before the hash can be generated. After restart, the same thing happens when the previous steps are repeated. The stats below shows the memory usage before and after computing the hash. *root

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2018-03-25 Thread Wang
My further investigation showed this is a memory leak in my application code rather than an OpenSSL leak. Thanks, Wang -- Sent from: http://openssl.6102.n7.nabble.com/OpenSSL-User-f3.html -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2018-03-25 Thread Wang
My further investigation showed this is a memory leak in application code, rather than an OpenSSL one. Thanks, Wang -- Sent from: http://openssl.6102.n7.nabble.com/OpenSSL-User-f3.html -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] BIO_do_connect memory leak in Arch Linux

2018-02-04 Thread Salz, Rich via openssl-users
It appears to be a memory leak in the DNS libraries. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] BIO_do_connect memory leak in Arch Linux

2018-02-04 Thread Ryan Beethe
Hi openssl-users, I found a memory leak in my program that arises from the use of the BIO_do_connect() function. It seems to be related to how openssl is interacting with other packages on my system. I observe this behavior on my Arch Linux machine but not on my Debian Stretch machine. I wrote

[openssl-users] Calling CMS_decrypt on the same CMS_ContentInfo instance as CMS_encrypt causes memory leak

2018-01-16 Thread Andrei Hîrgău
Hi, There seems to be an issue with CMS_decrypt. It seems that if we have code like this: CMS_ContentInfo* ci = CMS_encrypt(...); CMS_decrypt(ci, ...); CMS_ContentInfo_free(ci); we leak the X509 certificate's public key. If the call to CMS_decrypt is commented out, then no leak happens, as the k

Re: [openssl-users] Apparent Memory Leak When Executing EVP_PKEY_derive (MS vc14, 32 bit, OpenSSL 1.0.2h/m)

2017-11-22 Thread yahiaelsawiabd1974
Thanks for emailing me! No, I haven’t been hacked :) I signed up for a spam filtering service called BitBounce. To deliver your email to my inbox, please click the link below. Thanks! https://bitbounce.com/pay_bitbounce_fee/1808859525 BitBounce is a product by: Turing Cloud Turing-Cloud.com/b

Re: [openssl-users] Apparent Memory Leak When Executing EVP_PKEY_derive (MS vc14, 32 bit, OpenSSL 1.0.2h/m)

2017-11-22 Thread Seiberlich, Holger via openssl-users
Hi Matt: Thank you very much for your answer! I did what you told me, and there's no longer an indication of a memory leak. Sincerely, Holger -Ursprüngliche Nachricht- Von: Matt Caswell [mailto:m...@openssl.org] Gesendet: Mittwoch, 22. November 2017 11:50 An: Seiberlich, H

Re: [openssl-users] Apparent Memory Leak When Executing EVP_PKEY_derive (MS vc14, 32 bit, OpenSSL 1.0.2h/m)

2017-11-22 Thread Matt Caswell
crypto. I've used > https://wiki.openssl.org/index.php/EVP_Key_Agreement > as a recipe and wrapped memory allocations into unique_ptrs. The code > fulfills its purpose of deriving a shared secret, but memory leak detection > with > _CrtSetDbgFlag( _CRTDBG

Re: [openssl-users] Apparent Memory Leak When Executing EVP_PKEY_derive (MS vc14, 32 bit, OpenSSL 1.0.2h/m)

2017-11-22 Thread yahiaelsawiabd1974
Thanks for emailing me! No, I haven’t been hacked :) I signed up for a spam filtering service called BitBounce. To deliver your email to my inbox, please click the link below. Thanks! https://bitbounce.com/pay_bitbounce_fee/4093641092 BitBounce is a product by: Turing Cloud Turing-Cloud.com/b

[openssl-users] Apparent Memory Leak When Executing EVP_PKEY_derive (MS vc14, 32 bit, OpenSSL 1.0.2h/m)

2017-11-22 Thread Seiberlich, Holger via openssl-users
purpose of deriving a shared secret, but memory leak detection with _CrtSetDbgFlag( _CRTDBG_ALLOC_MEM_DF | _CRTDBG_LEAK_CHECK_DF ); _CrtSetReportMode( _CRT_WARN, _CRTDBG_MODE_FILE ); _CrtSetReportFile( _CRT_WARN, _CRTDBG_FILE_STDOUT ); produces a warning: Detected me

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-09 Thread Wang
This is very important information. Thank you very much, Matt. I will update the code of my product and test if it resolves my issue. If it does, I will post my feedback here. Hence other users can aviod the same issue. My product is complex and I have other things to do, so it may take a few da

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-08 Thread Wang
Thanks again, Rich. >>>There is something strange with the RSA private key or it’s BN_CONT object. >>>Are you sure that you are properly releasing all OpenSSL objecdts in your code? My application is a server. When it is initialized it calls RSA_new() to allocate a RSA object. When the serv

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-08 Thread Matt Caswell
On 08/11/17 09:47, Wang wrote: > Hello Matt, > > Thank you for trying to help. > Is this the "bottom" of the OpenSSL stack? i.e. your application calls RSA_private_decrypt() directly? > Yes, it does. > Do you share a single RSA object across multiple threads? > Yes, my applic

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-08 Thread Wang
Hello Matt, Thank you for trying to help. >>>Is this the "bottom" of the OpenSSL stack? i.e. your application calls >>>RSA_private_decrypt() directly? Yes, it does. >>>Do you share a single RSA object across multiple threads? Yes, my application shares a single RSA object across many concurre

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-07 Thread Salz, Rich via openssl-users
There is something strange with the RSA private key or it’s BN_CONT object. Are you sure that you are properly releasing all OpenSSL objecdts in your code? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-07 Thread Matt Caswell
On 07/11/17 10:01, Wang wrote: > Hello Rich, > > Thank you for trying to help. > > My product is running on Linux. The following leak was detected by Valgrind. > Valgrind only reportes > the leak in threaded mode. I run 'top' on linux to monitor the memory usage > of my product. I can see the

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-07 Thread Wang
Hello Rich, Thank you for trying to help. My product is running on Linux. The following leak was detected by Valgrind. Valgrind only reportes the leak in threaded mode. I run 'top' on linux to monitor the memory usage of my product. I can see the memory usage increases quickly. ==9721== 520 byt

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-06 Thread Salz, Rich via openssl-users
➢ http://openssl.6102.n7.nabble.com/Memory-issues-with-ssl-handshake-td20851.html#a20854. ➢ Don't understand why this issue is not encountered by other users and why it has not been fixed for so many years. The first part answer the second. It is not encountered by others, so

Re: [openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-06 Thread Wang
The product can be build in threaded or non-threaded mode. The memory leak can be detected only in threaded mode. Hence I think I hit the same issue reported by Thomas in 2012. "One thing I noticed is that all goes well if I cause the code to run sequentially (e.g. cause requests to com

[openssl-users] Potential memory leak in RSA_private_decrypt

2017-11-05 Thread Wang
Hello, The memory usage of one of our OpenSSL applications increases quickly.Valgrind detects the only possible leak below. We are using OpenSSL 1.0.2k. ==9721== 520 bytes in 1 blocks are indirectly lost in loss record 1,178 of1,294 ==9721==at 0x4A0817C: malloc (vg_replace_malloc.c:298) ==9721=

[openssl-users] Searching for a memory leak in my OpenSSL usage

2017-09-20 Thread Hiesgen, Raphael
Hello, I got an application that establishes an TLS connection for communication. While the communication works, I run into a memory leak that originates from CRYPTO_malloc. I tried to search for proper OpenSSL shutdown and related issues, but my tries did not affect the leak. Here is the ASAN

Re: [openssl-users] [openss-users] How to correctly shutdown for connection to avoid memory leak

2015-04-27 Thread Jeffrey Walton
> I am using openssl 1.0.2 to do some ssl connection, now I am facing > some memory leak issue. > > ssl = SSL_new(m_ctx); > sbio = BIO_new_socket(server, BIO_NOCLOSE); > SSL_set_bio(ssl,sbio,sbio); > > > SSL_connect() > ... > > //After handle, release resou

Re: [openssl-users] [openss-users] How to correctly shutdown for connection to avoid memory leak

2015-04-27 Thread Salz, Rich
If you used BIO_NOCLOSE then you have to close the BIO. Yes, after shutdown is done, call SSL_free() ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] [openss-users] How to correctly shutdown for connection to avoid memory leak

2015-04-27 Thread Jerry OELoo
Hi. I am using openssl 1.0.2 to do some ssl connection, now I am facing some memory leak issue. ssl = SSL_new(m_ctx); sbio = BIO_new_socket(server, BIO_NOCLOSE); SSL_set_bio(ssl,sbio,sbio); SSL_connect() ... //After handle, release resource if(ssl) SSL_shutdown(ssl); Now I have some

[openssl-users] Memory leak issue

2015-03-26 Thread Rajeswari K
Hello Openssl Users, Currently we are facing a memory leak issue in the following scenario. We are allocating dynamic memory to a appctx and we are setting this appctx to the session using the function SSL_SESSION_set_app_data(). My understanding is that, this appctx will be updated as part of

Re: Memory Leak when Using Openssl

2014-12-03 Thread Matt Caswell
On 03/12/14 10:34, T@Run..! Polisetty wrote: > Hai All, > >We are using Openssl for DTLS Negotiations. When we run the Valgrind > with this setup. We are finding some major loss of memory at one place. > > > ==23871== 4,224 (1,056 direct, 3,168 indirect) bytes in 3 blocks are

Re: Memory Leak when Using Openssl

2014-12-03 Thread Kurt Roeckx
On Wed, Dec 03, 2014 at 04:04:16PM +0530, T@Run..! Polisetty wrote: > Hai All, > >We are using Openssl for DTLS Negotiations. When we run the Valgrind > with this setup. We are finding some major loss of memory at one place. Can you check with a current git version? There have b

RE: Small memory leak on multithreaded server

2014-11-24 Thread Barbe, Charles
| 585.421.5565 From: owner-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] on behalf of Dr. Stephen Henson [st...@openssl.org] Sent: Friday, November 21, 2014 1:40 PM To: openssl-users@openssl.org Subject: Re: Small memory leak on multithreaded

Re: Small memory leak on multithreaded server

2014-11-24 Thread chris . gray
ollect obsolete classes either. > On 21-11-2014 23:23, Viktor Dukhovni wrote: >> On Fri, Nov 21, 2014 at 04:13:58PM -0500, Jeffrey Walton wrote: >>>> A fixed amount of memory that is not deallocated and is independent >>>> of the number of operations performed, is

Re: Small memory leak on multithreaded server

2014-11-23 Thread Viktor Dukhovni
On Sun, Nov 23, 2014 at 10:56:41PM +0100, Jakob Bohm wrote: > >Unloading of shared libraries is generally unsafe. Loading and > >unloading of pure of Java packages may work well enough, but I > >would [not] expect a Java runtime that unloads native libraries to stay > >running for very long. > >

Re: Small memory leak on multithreaded server

2014-11-23 Thread Jakob Bohm
On 21-11-2014 23:23, Viktor Dukhovni wrote: On Fri, Nov 21, 2014 at 04:13:58PM -0500, Jeffrey Walton wrote: A fixed amount of memory that is not deallocated and is independent of the number of operations performed, is NOT a memory leak. Languages like Java and C# can continuously load and

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
g] Sent: Friday, November 21, 2014 1:40 PM To: openssl-users@openssl.org Subject: Re: Small memory leak on multithreaded server On Fri, Nov 21, 2014, Barbe, Charles wrote: > Yes... sorry, forgot to include this part of my shutdown sequence. One thing > I am noticing is that I do not call X40

Re: Small memory leak on multithreaded server

2014-11-21 Thread Viktor Dukhovni
On Fri, Nov 21, 2014 at 04:13:58PM -0500, Jeffrey Walton wrote: > > A fixed amount of memory that is not deallocated and is independent > > of the number of operations performed, is NOT a memory leak. > > Languages like Java and C# can continuously load and unload a library

Re: Small memory leak on multithreaded server

2014-11-21 Thread Jeffrey Walton
> A fixed amount of memory that is not deallocated and is independent > of the number of operations performed, is NOT a memory leak. Languages like Java and C# can continuously load and unload a library. You will see a growth in memory usage because the memory is not reclaimed. > Libr

Re: Small memory leak on multithreaded server

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Barbe, Charles wrote: > Yes... sorry, forgot to include this part of my shutdown sequence. One thing > I am noticing is that I do not call X409_free on my certs. I even have a > comment in my code saying that I am not freeing them because I think they > will be freed when the

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
: Re: Small memory leak on multithreaded server On Fri, Nov 21, 2014, Barbe, Charles wrote: > Thanks for the response... here is the code that runs when my connection > closes: > > void OpensslConnection::cleanup() > { > if(ssl != NULL) > { > if(isConnected

Re: Small memory leak on multithreaded server

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Barbe, Charles wrote: > Thanks for the response... here is the code that runs when my connection > closes: > > void OpensslConnection::cleanup() > { > if(ssl != NULL) > { > if(isConnected) > { > while(SSL_shutdown(ssl) == 0) >

Re: Small memory leak on multithreaded server

2014-11-21 Thread Viktor Dukhovni
On Fri, Nov 21, 2014 at 03:21:47PM +, Barbe, Charles wrote: > What looks suspicious to me is the calls to "x509v3_cache_extensions" > that are in the traces below. This implies to me that openssl is > caching something. How do I ask it to clear that cache? If i need > to augment the library to

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
r-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] on behalf of Dr. Stephen Henson [st...@openssl.org] Sent: Thursday, November 20, 2014 9:50 PM To: openssl-users@openssl.org Subject: Re: Small memory leak on multithreaded server On Thu, Nov 20, 2014, Barbe, Charles wrote: > Hello,

Re: Small memory leak on multithreaded server

2014-11-21 Thread Jakob Bohm
tes). From: owner-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] on behalf of Jeffrey Walton [noloa...@gmail.com] Sent: Thursday, November 20, 2014 6:03 PM To: OpenSSL Users List Subject: Re: Small memory leak on multithreaded server Any help would be apprecia

Re: Small memory leak on multithreaded server

2014-11-21 Thread Viktor Dukhovni
On Fri, Nov 21, 2014 at 02:26:45PM +, Barbe, Charles wrote: > static void > openSslShutdown () > { You could try adding: ENGINE_cleanup(); if that helps. > CONF_modules_free(); > ERR_remove_state(0); > CONF_modules_unload(1); > ERR_free_strings(); > EVP_cl

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
-us...@openssl.org [owner-openssl-us...@openssl.org] on behalf of Jeffrey Walton [noloa...@gmail.com] Sent: Thursday, November 20, 2014 6:03 PM To: OpenSSL Users List Subject: Re: Small memory leak on multithreaded server > Any help would be appreciated. This could be one of two problems. Fir

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
: Re: Small memory leak on multithreaded server On Thu, Nov 20, 2014 at 10:19:32PM +, Barbe, Charles wrote: > I can do any combination of steps 2,3 and 4 above (ie. leave some > of them out) and I always get the same amount of memory left over > after I shut down my application. I bel

Re: Small memory leak on multithreaded server

2014-11-20 Thread Dr. Stephen Henson
On Thu, Nov 20, 2014, Barbe, Charles wrote: > Hello, > > I have noticed a small and consistent memory leak in my multithreaded openssl > server and am wondering if somebody can help me figure out what I need to do > to free it when my application closes. I am on OpenSSL version

Re: Small memory leak on multithreaded server

2014-11-20 Thread Viktor Dukhovni
20 blocks filter > down to 1 of 5 root stack traces. The stack traces are: A fixed amount of memory that is not deallocated and is independent of the number of operations performed, is NOT a memory leak. Librariers to allocate memory for the lifetime of the process during one time initializat

Re: Small memory leak on multithreaded server

2014-11-20 Thread Jeffrey Walton
> Any help would be appreciated. This could be one of two problems. First, it could be an issue with your code and the way you handle cleanup. To help diagnose this, please show us your cleanup code. Second, it could be the memory leak from the compression methods. This is a well known prob

Small memory leak on multithreaded server

2014-11-20 Thread Barbe, Charles
Hello, I have noticed a small and consistent memory leak in my multithreaded openssl server and am wondering if somebody can help me figure out what I need to do to free it when my application closes. I am on OpenSSL version 1.0.1j. Here's how I reproduce the leak: 1) Start up my ser

memory leak in OPENSSL_NO_SSL3 patch

2014-10-23 Thread Vyas Pentakota
I am not a 100% sure but I think s->s3 control structure is not being freed in case of app enabling OPENSSL_NO_SSL3 patch code. Ssl23_get_client_hello will return with s->method==NULL. SSL_free will skip over ssl3_free. 0.9.8zc might be leaking more than just s->s3. ( may be dgst msgs). Please c

RE: openssl memory leak

2014-07-29 Thread dvijayalakshmi
We are testing our application (that uses OpenSSL for FTPS) to check the memory leak over time(continuous FTPS upload is performed for about 12 hours). We observed that the memory consumed by the process is reduced(about 3MB) after 6 mins. Kindly let us know if it is related to the SSL session

RE: openssl memory leak

2014-07-27 Thread dvijayalakshmi
We observed that sometimes SSL_Shudown() is not returning success. If the cache is maintained, will the API fail. -- View this message in context: http://openssl.6102.n7.nabble.com/openssl-memory-leak-tp52311p52361.html Sent from the OpenSSL - User mailing list archive at Nabble.com

RE: openssl memory leak

2014-07-27 Thread dvijayalakshmi
return true; } Kindly let us know if any other additional APIs need to be called to free the SSL session completely. We found that SSL session is maintained in the cache after the first upload. i.e about 1000KB of memory is increased after first SSL Session and the memory is not compl

RE: openssl memory leak

2014-07-25 Thread Porter, Andrew
The openssl source package includes a generic server (s_server) and client (s_client). My first suspect when something has a memory leak with SSL connections only is to check whether SSL contexts returned by SSL_new() always get cleaned up later by calling SSL_free()... Andrew -Original

openssl memory leak

2014-07-25 Thread dvijayalakshmi
We are using Openssl for FTPS connections. We are facing issues with memory leak. Kindly let us know if there is sample code. -- View this message in context: http://openssl.6102.n7.nabble.com/openssl-memory-leak-tp52311.html Sent from the OpenSSL - User mailing list archive at Nabble.com

RE: Memory leak in ssl3_get_server_certificate

2014-04-04 Thread hicham h
I found my memory leak origin. I didn't free an X509 object when I called SSL_get_peer_certificate function (missing X509_free() call). Hope it will be useful for others Cheers!! From: hicham55...@hotmail.com To: openssl-users@openssl.org Subject: RE: Memory leak in ssl3_get_server_certif

RE: Memory leak in ssl3_get_server_certificate

2014-04-03 Thread hicham h
Well, I found out where it's defined. It's a MACRO definition ( IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname ). I'm still investigating the leak Regards From: hicham55...@hotmail.com To: openssl-users@openssl.org Subject: Memory leak in ssl3_get_server_certificate Date: Thu

Memory leak in ssl3_get_server_certificate

2014-04-03 Thread hicham h
Hello all, I found a memory leak when using ssl_connect function. Bellow the valgrind trace: ==12028== 37,600 (1,040 direct, 36,560 indirect) bytes in 10 blocks are definitely lost in loss record 12 of 27 ==12028==at 0x40053C0: malloc (vg_replace_malloc.c:149) ==12028==by 0x4185C8E

Re: Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-18 Thread Dr. Stephen Henson
On Tue, Feb 18, 2014, Varma Dantuluri wrote: > Thanks Steve for the response. Given the current way it is done in > OpenSSL-1.0.1f, what is the right thing for the application to do? Should > the application be using a static EC_KEY for each of the curves that are > supported? > For 1.0.1f the c

Re: Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-18 Thread Varma Dantuluri
: > On Thu, Feb 13, 2014, Varma Dantuluri wrote: > > > In OpenSSL-1.0.1f, in 'ssl3_send_server_key_exchange' function, when all > > the below conditions are true, there is a potential memory leak. > > > > 1) 'type & SSL_kEECDH' is true, (ie the

Re: Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-15 Thread Dr. Stephen Henson
On Thu, Feb 13, 2014, Varma Dantuluri wrote: > In OpenSSL-1.0.1f, in 'ssl3_send_server_key_exchange' function, when all > the below conditions are true, there is a potential memory leak. > > 1) 'type & SSL_kEECDH' is true, (ie the key exchange is ephemeral ec

Possible memory leak when using ECDHE ciphers in OpenSSL-1.0.1f

2014-02-13 Thread Varma Dantuluri
In OpenSSL-1.0.1f, in 'ssl3_send_server_key_exchange' function, when all the below conditions are true, there is a potential memory leak. 1) 'type & SSL_kEECDH' is true, (ie the key exchange is ephemeral ecdh) 2) 'ecdhp == NULL' && 's->cert->e

memory leak in ssl3_get_server_certificate?

2013-09-17 Thread Rajib Karmakar
need to cleanup up all memory used by a single SSL session at session closure. Awaiting your kind help. Rajib NB: I had earlier (19/1/2012) posted a similar problem (http://openssl.6102.n7.nabble.com/Memory-leak-in-openssl-td28304.html) but didn't got any response. -- View this messa

memory leak in compression methods

2012-05-10 Thread JonathonS
Hi all, I am only using SSL for handling TLS/SSL handshakes in libcurl. I am encountering the memory leaks described in this defect: http://rt.openssl.org/Ticket/Display.html?id=2561&user=guest&pass=guest which seem to be caused by not cleaning up the compression methods stuff. Does anyone know

SSL_connect() in 0.9.8h - memory leak, or user error?

2012-03-26 Thread Rogerborg
Ahoy the list. I'm seeing a memory leak using openssl 0.9.8h (0x0090808f 28 May 2008) on Solaris 5.10 from calling SSL_connect() and am trying to nail down the cause. I'm sure it's a PEBKAC error, but can't spot it. The leak was identified by watching the process me

Memory leak in x509_dup?

2012-01-23 Thread Rajib Karmakar
Hi, I am using x509_dup to create a duplicate certificate. Once I am done with my work, I use X509_free to free the duplicate certificate. But when I run my code with valgrind, it reports of some leaks. The following is the valgrind stack trace, ==3845== 408 (72 direct, 336 indirect) bytes

Memory leak in openssl

2012-01-18 Thread Rajib Karmakar
Hi, I am using openssl (v1.0.0.0e) for my application and when I run valgrind, it points to memory leaks at some openssl code. Is this really a leak present in openssl or I need to do something to remove this leak? The following is the valgrind dump, ==15790== 39,013 (1,288 direct, 37,725 i

Re: Memory leak in SSL_CTX_load_verify_locations()

2011-12-21 Thread Jeffrey Walton
On Wed, Dec 21, 2011 at 1:26 PM, nandan shantharaj wrote: > Hi All, > SSL_CTX_load_verify_locations() is causing memory leak in my > application. Folowing is the function trace. > >    262  1072 bytes leaked in 4 blocks (2.25% of all bytes leaked) >    263  These range in si

Memory leak in SSL_CTX_load_verify_locations()

2011-12-21 Thread nandan shantharaj
Hi All, SSL_CTX_load_verify_locations() is causing memory leak in my application. Folowing is the function trace. 262 1072 bytes leaked in 4 blocks (2.25% of all bytes leaked) 263 These range in size from 268 to 268 bytes and are allocated 264 #0 0x83ffefb9b6b8 in

RE: Question regarding to memory leak

2011-06-27 Thread Yan, Bob
didn't use the "X509_OBJECT_free_contents()" to free the contents of the returned object "obj". It seems this is the cause of the memory leak. By adding "X509_OBJECT_free_contents(&obj)" function, the Purify does not report any memory leaks. Thanks Bob -Original Message

Re: Question regarding to memory leak

2011-06-24 Thread Chris Dodd
On Fri, Jun 24, 2011, Yan, Bob wrote: Hi, I have used IBM purify to check my test program which invokes openssl library. There are some memory leaks reported by Purify, please see below. Could somebody point to me from which function those leaks were generated, and how to avoid those leak

Re: Question regarding to memory leak

2011-06-24 Thread terr
On Behalf Of t...@terralogic.net > Sent: Friday, June 24, 2011 4:52 PM > To: openssl-users@openssl.org > Subject: Re: Question regarding to memory leak > > I have suggested this before. Write your own memtools. > > > http://www.terralogic.net/developer/developer.html >

Re: Question regarding to memory leak

2011-06-24 Thread Dr. Stephen Henson
On Fri, Jun 24, 2011, Yan, Bob wrote: > Hi, > > I have used IBM purify to check my test program which invokes openssl > library. There are some memory leaks reported by Purify, please see below. > Could somebody point to me from which function those leaks were generated, > and how to avoid tho

RE: Question regarding to memory leak

2011-06-24 Thread Yan, Bob
To: openssl-users@openssl.org Subject: Re: Question regarding to memory leak I have suggested this before. Write your own memtools. http://www.terralogic.net/developer/developer.html I tossed up a couple poor boy examples. Note the calls: struct pfa_ControlBlock chain1 = { ipfa_ControlBlock

Re: Question regarding to memory leak

2011-06-24 Thread terr
I have suggested this before. Write your own memtools. http://www.terralogic.net/developer/developer.html I tossed up a couple poor boy examples. Note the calls: struct pfa_ControlBlock chain1 = { ipfa_ControlBlock } , chain2 = { ipfa_ControlBlock }; pfa_Init( &chain1,

Re: Question regarding to memory leak

2011-06-24 Thread Eric S. Eberhard
As a general comment not all memory leaks reported by these tools are a bad thing. I often write code that has these type of leaks on purpose for performance reasons. For example a function that is called often and malloc's memory ... rather than malloc and free each time (causing context swi

Question regarding to memory leak

2011-06-24 Thread Yan, Bob
Hi, I have used IBM purify to check my test program which invokes openssl library. There are some memory leaks reported by Purify, please see below. Could somebody point to me from which function those leaks were generated, and how to avoid those leaks? Thanks, Bob MLK: 1104 bytes le

Re:about ssl_accept and memory leak

2010-12-28 Thread
dear all: No one encountered this problem? >From: "" >Reply-To: openssl-users@openssl.org >To: openssl-users@openssl.org >Subject: about ssl_accept and memory leak >Date:Mon, 27 Dec 2010 13:38:49 +0800 > >Dear openssl-users£¬ > > > When using

about ssl_accept and memory leak

2010-12-26 Thread
Dear openssl-users£¬ When using the openssl and found a large number of connections during the establishment of the memory has been growing closed, the test found that when the memory is increased to 317548K, the not increased, the initial memory, only a few K, very strange. why? How can I

Re: about ssl_accept and memory leak

2010-12-26 Thread Miguel Ghobangieno
Stop opressing women. Girls should NOT be married at puberty to men, men should NOT be happy for the rest of their lives. --- On Mon, 12/27/10, lizhiping wrote: From: lizhiping Subject: about ssl_accept and memory leak To: "openssl-users" Date: Monday, December 27, 201

about ssl_accept and memory leak

2010-12-26 Thread lizhiping
Dear openssl-users, When using the openssl and found a large number of connections during the establishment of the memory has been growing closed, the test found that when the memory is increased to 317548K, the not increased, the initial memory, only a few K, very strange. why? How can I res

Observing memory leak in x509_name_ex_new

2010-05-26 Thread Anirudh Kamatgi
Hello, We have a firewall acting as a reverse proxy(server) doing SSL offload and we are seeing a memory leak in x509_name_ex_new. We are using OpenSSL 0.9.8l and we ran the OpenSSL's builtin memory leak checker, dumped the results using CRYPTO_mem_leaks_fp and found several leaks reported

Re: possible user error / memory leak using RSA_new() and RSA_free();

2010-04-19 Thread Stuart Weatherby
Steve & Mounir, Thanks a lot for answering my questions. Stuart - Original Message From: Dr. Stephen Henson To: openssl-users@openssl.org Sent: Mon, April 19, 2010 4:38:14 PM Subject: Re: possible user error / memory leak using RSA_new() and RSA_free(); On Mon, Apr 19,

Re: possible user error / memory leak using RSA_new() and RSA_free();

2010-04-19 Thread Dr. Stephen Henson
On Mon, Apr 19, 2010, Stuart Weatherby wrote: > Thanks Steve, > > After commenting out lines 24 & 25 there is still unfree'd memory: > http://www.openssl.org/support/faq.html#PROG13 Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http:

Re: possible user error / memory leak using RSA_new() and RSA_free();

2010-04-19 Thread Stuart Weatherby
enssl.org Sent: Mon, April 19, 2010 3:12:53 PM Subject: Re: possible user error / memory leak using RSA_new() and RSA_free(); On Mon, Apr 19, 2010, Stuart Weatherby wrote: > Hi List, > > I am trying to figure out why there is a memory leak using RSA_new & RSA_free: > Below is

  1   2   3   >