If Open-SSL does not already do this, they should add code for memory pools.
On Wed, May 26, 2004 at 03:15:36PM -0400, [EMAIL PROTECTED] wrote: > How do you read the debug output of CRYPTO_MDEBUG? > > Why is there so many "87389 bytes leaked in 1881 chunks"? > > After making three connections all of which completed successfully > I got 4 "nnnnn bytes leaked in nnnn chunks" > > Mike ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
