|
0.9.7b – I will upgrade to 0.9.7d and run
tests. From: Diarmuid O'Neill
[mailto:[EMAIL PROTECTED] What version of OpenSSL are you using Ken? -----Original Message----- I have narrowed it down to the function
BN_BLINDING_new in the file crypto\bn\bn_blind.c, the memory allocated for the
BN_BLINDING structure never gets freed. I am assuming that the BIGNUM
structures allocated with BN_new inside of BN_BLINDING never gets freed also. Here are my test results after running 24 hours
monitoring the OPENSSL_malloc and OPENSSL_free calls:
Is there anyone out there willing to help out that
understands the big number code? Can anyone at least tell me if
Apache/mod_ssl/OpenSSL needs to initialize some kind of callback? Like CRYPTO_set_locking_callback
<- Just an example, this is in the code, are there any other callbacks
anyone can think of to get the OpenSSL code to release the BN memory? .
|
Title: RE: Major memory leak in OpenSSL using threads
- Major memory leak in OpenSSL using threads Avery, Ken
- Re: Major memory leak in OpenSSL using threads Geoff Thorpe
- Re: Major memory leak in OpenSSL using threads terr
- Re: Major memory leak in OpenSSL using threads Geoff Thorpe
- Avery, Ken
