If I use IE several times to get a crypted htmlfile from my server program
then I get memoryleaks.

- server: using API C from openssl-0.9.6 with pthreads
- client: Internet Explorer 5.00.2614.3500 (40Bits) and
          Netscape6/6.0 Gecko/20001106 (128Bits)
- openssl-0.9.6 compiled with gcc version 2.95.2 19991024 (release)
  under linux-2.2.17-i686

I cant directly re-produce the same memory leak situation.
If I reload the htmlfile 5 or 10 times, all seems to be ok.
But if I reload the htmlfile several times (e.g. 174 reloads ;])
there are some threads with memory leaks.
Each pthread dealing one SSL *connection.

Exist memory usage of a connection after SSL_free()?
For example session cache informations.

What shows the address field at CRYPTO_mem_leaks_fp()?

It seems that an incomplete SSL_accept() produce memory leaks?

-------------------------------------------------
cleaning up procedure after program shutdown:
    ...
    SSL_CTX_free(ctx);
    /* cleans all ciphers and digests from the table */
    EVP_cleanup();
    /* free all unread errors */
    ERR_remove_state(0);
    /* free readable error messages */
    ERR_free_strings();
    myssl_thread_cleanup();        /* own function */
    myssl_printstats(ctx);         /* own function */
    CRYPTO_mem_leaks_fp(stderr);
    ...
-------------------------------------------------
myssl_printstats(ctx) result:
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
 174 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
 174 server accepts that finished
 173 session cache hits
   0 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (20480 allowed)
CRYPTO_mem_leaks_fp(stderr) result:
 4813 file=bf_buff.c, line=98, thread=115717, number=32, address=0813D2A8
 5593 file=s3_enc.c, line=184, thread=158725, number=4216, address=08148E88
 5577 file=ssl_cert.c, line=165, thread=158725, number=76, address=081433C8
 4373 file=bf_buff.c, line=98, thread=91141, number=32, address=0813D318
 5368 file=ssl_cert.c, line=165, thread=146437, number=76, address=08143268
 4146 file=bf_buff.c, line=98, thread=78853, number=32, address=0813D400
 4926 file=bf_buff.c, line=98, thread=121861, number=32, address=0814D948
 2797 file=buffer.c, line=67, thread=6150, number=12, address=08140A20
 4921 file=buffer.c, line=67, thread=121861, number=12, address=08143120
 3572 file=buffer.c, line=67, thread=48133, number=12, address=081414A8
 4808 file=buffer.c, line=67, thread=115717, number=12, address=081428E8
 4141 file=buffer.c, line=67, thread=78853, number=12, address=08141F30
4556 bytes leaked in 12 chunks
-------------------------------------------------
with netscape...
-------------------------------------------------
myssl_printstats(ctx) result:
   0 items in the session cache
   0 client connects (SSL_connect())
   0 client renegotiates (SSL_connect())
   0 client connects that finished
  63 server accepts (SSL_accept())
   0 server renegotiates (SSL_accept())
  63 server accepts that finished
  62 session cache hits
   1 session cache misses
   0 session cache timeouts
   0 callback cache hits
   0 cache full overflows (20480 allowed)
CRYPTO_mem_leaks_fp(stderr) result:
 3371 file=t1_enc.c, line=358, thread=14341, number=64, address=0814C368
 3959 file=bio_lib.c, line=73, thread=48133, number=64, address=0814D878
 3955 file=buffer.c, line=67, thread=48133, number=12, address=08140668
 3787 file=buffer.c, line=67, thread=39942, number=12, address=0814D8C0
 3792 file=bf_buff.c, line=98, thread=39942, number=32, address=0813D8D0
 4014 file=buffer.c, line=67, thread=51205, number=12, address=08140EA8
 4276 file=t1_enc.c, line=181, thread=63493, number=4216, address=08152368
 4139 file=bf_buff.c, line=98, thread=57349, number=32, address=0813DD40
 4124 file=buffer.c, line=67, thread=57349, number=12, address=081416E8
 3960 file=bf_buff.c, line=98, thread=48133, number=32, address=0813D2B0
 4275 file=t1_enc.c, line=211, thread=63493, number=4216, address=08161968
8704 bytes leaked in 11 chunks

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to