Re: OpenSSL hash memory leak

2019-02-26 Thread Joe Browning
* EVP_DigestFinal_ex(mdctx, hash_data.md_value, _data.md_len)* *Missing reference there for value?* *Joe* On Mon, Feb 25, 2019, 09:31 Jakob Bohm via openssl-users < openssl-users@openssl.org> wrote: > On 25/02/2019 15:05, Hubert Kario wrote: > > On Sunday, 24 February 2019 11:34:18 CET

Re: OpenSSL hash memory leak

2019-02-25 Thread Jakob Bohm via openssl-users
On 25/02/2019 15:05, Hubert Kario wrote: On Sunday, 24 February 2019 11:34:18 CET prithiraj das wrote: If it helps, sometimes I do get the following errors for the same and subsequent reboot: Alignment trap: sh (601) PC=0xb6e008f8 Instr=0x4589c0d7 Address=0x00d7 FSR 0x801 Alignment trap:

Re: OpenSSL hash memory leak

2019-02-25 Thread Hubert Kario
On Sunday, 24 February 2019 11:34:18 CET prithiraj das wrote: > If it helps, sometimes I do get the following errors for the same and > subsequent reboot: > > Alignment trap: sh (601) PC=0xb6e008f8 Instr=0x4589c0d7 Address=0x00d7 > FSR 0x801 > Alignment trap: login (584) PC=0xb6e6ab00

Re: OpenSSL hash memory leak

2019-02-24 Thread Georg Höllrigl
, openssl-users@openssl.org, Jordan Brown Betreff: Re: OpenSSL hash memory leak If it helps, sometimes I do get the following errors for the same and subsequent reboot:Alignment trap: sh (601) PC=0xb6e008f8 Instr=0x4589c0d7 Address=0x00d7 FSR 0x801Alignment trap: login (584) PC=0xb6e6ab00

Re: OpenSSL hash memory leak

2019-02-24 Thread prithiraj das
gt;> Buff/cache is keeping files in memory that were least accessed as long as >> not needed by other stuff. >> >> You don’t need to free the buffer/cache, because linux does that >> automatically, when memory is needed. >> >> >> >> Kind Regards, >>

Re: OpenSSL hash memory leak

2019-02-24 Thread prithiraj das
hiraj > das > *Gesendet:* 23 February 2019 18:25 > *An:* Jordan Brown > *Cc:* openssl-users@openssl.org > *Betreff:* Re: OpenSSL hash memory leak > > > > Hi, > > This is how I have initialized my variables:- > > > > EVP_MD_CTX *mdctx; > > const EVP_

AW: OpenSSL hash memory leak

2019-02-23 Thread Georg Höllrigl
memory is needed. Kind Regards, Georg Von: openssl-users Im Auftrag von prithiraj das Gesendet: 23 February 2019 18:25 An: Jordan Brown Cc: openssl-users@openssl.org Betreff: Re: OpenSSL hash memory leak Hi, This is how I have initialized my variables:- EVP_MD_CTX *mdctx; const

Re: OpenSSL hash memory leak

2019-02-23 Thread prithiraj das
Hi, This is how I have initialized my variables:- EVP_MD_CTX *mdctx; const EVP_MD *md; int i; HASH hash_data; unsigned char message_data[BUFFER_SIZE]; BUFFER_SIZE has been defined as 131072 and HASH is my hash structure defined to hold the message digest, message digest length and message digest

Re: OpenSSL hash memory leak

2019-02-22 Thread Jordan Brown
The most obvious question is "how are you allocating your message_data buffer?".  You don't show that. On 2/22/2019 2:27 AM, prithiraj das wrote: > > Hi All, > > Using OpenSSL 1.0.2g, I have written a code to generate the hash of a > file in an embeddded device having linux OS and low memory

OpenSSL hash memory leak

2019-02-22 Thread prithiraj das
Hi All, Using OpenSSL 1.0.2g, I have written a code to generate the hash of a file in an embeddded device having linux OS and low memory capacity and the files are generally of size 44 MB or more. The first time or even the second time on some occasions, the hash of any file is successfully