double <[email protected]> writes:
> Hi,
>
> The following line produces a memory leak, compiled
> on Win32 MinGW (dmalloc) - no problems on Linux:
>
> libgcrypt-1.4.1/cipher/pubkey.c:2197
>
> I will try to get the call stack.
Please do, or at least get a valgrind-style stacktrace. Did you use
libgcrypt on the non-MinGW build too?
> Sample code below.
It is too brief to compile for me, please post a self-contained snippet
if you can.
/Simon
> Thanks
> Markus
>
>
> /* exec "uptime" */
> int rc = libssh2_channel_exec( channel, "uptime" );
> if( rc != 0 )
> exit( 1 );
> for( ;; )
> {
> char buffer[0x4000];
> int rc = libssh2_channel_read( channel, buffer, sizeof(buffer) );
> if( rc <= 0 )
> break;
> /* process output */
> }
> int exitcode = 127;
> if( libssh2_channel_close(channel) == 0 )
> {
> //if( libssh2_channel_wait_closed(channel) == 0 )
> exitcode = libssh2_channel_get_exit_status( channel );
> }
> printf( "exit code: %d", exitcode );
>
>
> ------------------------------------------------------------------------------
> Check out the new SourceForge.net Marketplace.
> It is the best place to buy or sell services for
> just about anything Open Source.
> http://p.sf.net/sfu/Xq1LFB_______________________________________________
> libssh2-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/libssh2-devel
------------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It is the best place to buy or sell services for
just about anything Open Source.
http://p.sf.net/sfu/Xq1LFB
_______________________________________________
libssh2-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/libssh2-devel