count
that it incremented on the SSL bio, OR it shouldn't have incremented it
in the first place.
-Original Message-
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of David Schwartz
Sent: Saturday, April 18, 2009 10:04 PM
To: openssl-users@
wner-openssl-us...@openssl.org] On Behalf Of David Schwartz
Sent: Saturday, April 18, 2009 10:04 PM
To: openssl-users@openssl.org
Subject: RE: tracking down memory leaks
> Yeah, I think I tried that.
>
> But I got multiple free errors. Maybe I did it wrong. I'll try what
> you suggest.
Well, I am definiately leaking stuff related to BIOs, among other things.
But, why, is what I'm wondering.
From: owner-openssl-us...@openssl.org on behalf of Dr. Stephen Henson
Sent: Sun 4/19/2009 1:53 PM
To: openssl-users@openssl.org
Subject: Re: tracking
? I'd really like to get a snapshot across a session,
after context has been established.
From: owner-openssl-us...@openssl.org on behalf of Dr. Stephen Henson
Sent: Sun 4/19/2009 1:53 PM
To: openssl-users@openssl.org
Subject: Re: tracking down memory leaks
On Sun, Apr 19, 2009, Rene Hollan wrote:
> Well, I tried what you suggested and it still makes no difference.
>
> One thing I am doing is creating a single SSL_CTX and using it for multiple
> SSL sessions. I presume the SSL_CTX is reference counted.
>
> I will try with a debug version of the
default_malloc_ex replaced with malloc and see where these things are getting
allocated.
From: owner-openssl-us...@openssl.org on behalf of David Schwartz
Sent: Sat 4/18/2009 10:04 PM
To: openssl-users@openssl.org
Subject: RE: tracking down memory leaks
> Yeah, I th
Yes, I am using a BIO pair on the encrypted side. This is good advice. I will
try it.
-Original Message-
From: owner-openssl-us...@openssl.org on behalf of David Schwartz
Sent: Sat 4/18/2009 10:04 PM
To: openssl-users@openssl.org
Subject: RE: tracking down memory leaks
> Yeah
> Yeah, I think I tried that.
>
> But I got multiple free errors. Maybe I did it wrong. I'll try
> what you suggest. What I remember was that it was wrong to delete
> the SSL session (implicitly deleting the equivalent of io_bio in
> your example), and then ap_bio. I didn't try deleting io_bio
IRST, then the session, then the ap_bio.
-Original Message-
From: owner-openssl-us...@openssl.org on behalf of David Schwartz
Sent: Sat 4/18/2009 4:20 PM
To: openssl-users@openssl.org
Subject: RE: tracking down memory leaks
> I am using a BIO pair under SSL and a BIO above
> I am using a BIO pair under SSL and a BIO above SSL to handle
> asynchronous traffic that is delivered to me on a
> non-standard system.
> It works very well, except when I try to free the SSL sessions
> at the end of a connection. I'm calling BIO_free_all() on the BIO
> that wraps the SSL sess
10 matches
Mail list logo