memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser518-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser518-rsa (process id 21330) RTC: Enabling Error Checking... RTC: Running program... 1191354219654493: EAF0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB00: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB10: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB20: 3A 32 35 36 31 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2561..Content-T EB30: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB40: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB50: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EB60: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EB70: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EB80: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EB90: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBA0: E2 73 2E 77 AB 0A D6 02 02 02 06 A2 1E 30 1C 30 .s.w.........0.0 EBB0: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EBC0: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354219657931: EBE8: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EBF8: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC08: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC18: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC28: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC38: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC48: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 30 35 tent-Length: 105 EC58: 36 0D 0A 0D 0A 6.... 1191354219658519: 6B98: 30 82 04 1C 0A 01 00 A0 82 04 15 30 82 04 11 06 0..........0.... 6BA8: 09 2B 06 01 05 05 07 30 01 01 04 82 04 02 30 82 .+.....0......0. 6BB8: 03 FE 30 81 EA A1 70 30 6E 31 0B 30 09 06 03 55 ..0...p0n1.0...U 6BC8: 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 ....US1.0...U... 6BD8: 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 .California1.0.. 6BE8: 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 .U....Mountain V 6BF8: 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F iew1.0...U....BO 6C08: 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 GUS NSS1.0...U.. 6C18: 13 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 ..NSS IOPR Test 6C28: 43 41 20 33 36 38 34 18 0F 32 30 30 37 31 30 30 CA 3684..2007100 6C38: 32 31 39 34 33 33 39 5A 30 65 30 63 30 3B 30 09 2194339Z0e0c0;0. 6C48: 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF ..+.........*.H. 6C58: 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 q.......5.d;.... 6C68: 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 ...>0.....l....s 6C78: 2E 77 AB 0A D6 02 02 02 06 80 00 18 0F 32 30 30 .w...........200 6C88: 37 30 31 31 31 31 36 35 39 33 33 5A A0 11 18 0F 70111165933Z.... 6C98: 32 30 30 37 31 30 30 32 31 39 34 38 33 39 5A 30 20071002194839Z0 6CA8: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H.......... 6CB8: 81 00 39 3E FE B1 2E 82 EC 99 8A 06 E6 69 E5 E2 ..9>.........i.. 6CC8: EB B3 84 D4 84 16 09 EA EA C3 13 F3 A0 84 91 9C ................ 6CD8: A7 97 82 73 20 95 47 DD 4D 4E F4 6C 4B 59 80 08 ...s .G.MN.lKY.. 6CE8: 65 D9 4F 62 2C A0 32 A5 10 FC 6C 45 EE 75 65 35 e.Ob,.2...lE.ue5 6CF8: 90 18 71 88 E5 F0 13 02 E2 A0 5C 09 03 C8 FB 9F ..q.......\..... 6D08: 79 C9 A5 2C 2D F5 09 C3 6E C7 4D 75 B0 2E C9 B5 y..,-...n.Mu.... 6D18: EE C2 A6 C6 D4 82 3B 6C 25 43 83 43 2A 81 FD E3 ......;l%C.C*... 6D28: 85 A3 16 85 3B BB F4 6D DE 33 EC 4D 42 C6 8C 77 ....;..m.3.MB..w 6D38: 9A 32 A0 82 02 7A 30 82 02 76 30 82 02 72 30 82 .2...z0..v0..r0. 6D48: 01 DB A0 03 02 01 02 02 02 27 10 30 0D 06 09 2A .........'.0...* 6D58: 86 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 09 .H........0n1.0. 6D68: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 6D78: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 6D88: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 6D98: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 6DA8: 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 .BOGUS NSS1.0... 6DB8: 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 65 U....NSS IOPR Te 6DC8: 73 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 36 st CA 36840 ..06 6DD8: 31 30 31 39 32 30 31 33 33 39 5A 18 0F 32 30 35 1019201339Z..205 6DE8: 36 31 30 31 39 32 30 31 33 33 39 5A 30 6E 31 0B 61019201339Z0n1. 6DF8: 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 0...U....US1.0.. 6E08: 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 .U....California 6E18: 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 1.0...U....Mount 6E28: 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 ain View1.0...U. 6E38: 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C ...BOGUS NSS1.0. 6E48: 06 03 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 ..U....NSS IOPR 6E58: 54 65 73 74 20 43 41 20 33 36 38 34 30 81 9F 30 Test CA 36840..0 6E68: 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 ...*.H.......... 6E78: 8D 00 30 81 89 02 81 81 00 BA 53 DF A7 E2 BD A4 ..0.......S..... 6E88: E4 D8 93 C9 19 22 C4 37 CE A5 14 3E 26 35 29 B5 .....".7...>&5). 6E98: 37 DA C5 27 11 FF 48 90 BC 14 E4 E5 43 95 77 B5 7..'..H.....C.w. 6EA8: 93 15 4A 16 1D E5 38 98 44 B4 71 AF 2A 7A B9 B6 ..J...8.D.q.*z.. 6EB8: 63 A6 AD 0E EA 47 A3 84 6E F7 2D 9C 04 C6 65 76 c....G..n.-...ev 6EC8: 93 DC 15 44 F7 15 E1 EA 0C D1 FE DB AF 50 FA 8F ...D.........P.. 6ED8: 19 02 92 3C 06 3C C3 17 59 1E 09 FC 3E EC 77 49 ...<.<..Y...>.wI 6EE8: 9F 0F E7 1C 03 65 3B F1 6F 5D 4E 5F CF 45 C7 48 .....e;.o]N_.E.H 6EF8: C3 AA 8D 15 8A E6 8D B0 4B 02 03 01 00 01 A3 1D ........K....... 6F08: 30 1B 30 0C 06 03 55 1D 13 04 05 30 03 01 01 FF 0.0...U....0.... 6F18: 30 0B 06 03 55 1D 0F 04 04 03 02 01 06 30 0D 06 0...U........0.. 6F28: 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 00 .*.H............ 6F38: 24 CA FC 23 C8 72 6D D7 59 0B FF C9 13 7C 63 59 $..#.rm.Y....|cY 6F48: B0 A6 C0 D9 C3 AF 02 ED 01 A6 E4 CC CA 1A CE 62 ...............b 6F58: E1 73 68 8B E5 8F 35 87 CB F3 59 EE 85 A9 0F 53 .sh...5...Y....S 6F68: 63 12 99 B4 4A CA B8 7A 2F 29 93 93 0C 85 77 5B c...J..z/)....w[ 6F78: 9C 3B 2B 18 C1 20 37 F0 9F BD C8 1A E4 82 89 5E .;+.. 7........^ 6F88: 50 A7 E5 16 3E 73 C7 58 F7 97 FA 97 4B FE 2B F6 P...>s.X....K.+. 6F98: 16 A5 51 B8 C7 AD 82 4E 80 61 D4 FB AF E3 1B 8F ..Q....N.a...... 6FA8: 98 DE D1 4D 7A 39 C6 94 63 CA E3 1B D0 99 AE F3 ...Mz9..c....... Check of certificate "ocspRCATestUser518-rsa" succeeded. Checking for memory leaks... Actual leaks report (actual leaks: 3 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 81 total size: 3203 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.98% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.99% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.99% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (4.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found 7 blocks totaling 78 bytes (2.44% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef638 (2.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.50% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.34% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81f59b8 (1.12% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.03% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (1.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 3 blocks totaling 24 bytes (0.75% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xbc921005 [2] fgetnetconfig() at 0xbc920c61 [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found block of size 24 bytes at address 0x81d2bb8 (0.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser520-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser520-rsa (process id 21353) RTC: Enabling Error Checking... RTC: Running program... 1191354220218122: EB38: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB48: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB58: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB68: 3A 32 35 36 31 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2561..Content-T EB78: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB88: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB98: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EBA8: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EBB8: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EBC8: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EBD8: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 08 A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354220221590: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 30 37 tent-Length: 107 ECA0: 33 0D 0A 0D 0A 3.... 1191354220222182: 8C48: 30 82 04 2D 0A 01 00 A0 82 04 26 30 82 04 22 06 0..-......&0..". 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 13 30 82 .+.....0......0. 8C68: 04 0F 30 81 FB A1 70 30 6E 31 0B 30 09 06 03 55 ..0...p0n1.0...U 8C78: 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 ....US1.0...U... 8C88: 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 .California1.0.. 8C98: 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 .U....Mountain V 8CA8: 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F iew1.0...U....BO 8CB8: 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 GUS NSS1.0...U.. 8CC8: 13 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 ..NSS IOPR Test 8CD8: 43 41 20 33 36 38 34 18 0F 32 30 30 37 31 30 30 CA 3684..2007100 8CE8: 32 31 39 34 33 34 30 5A 30 76 30 74 30 3B 30 09 2194340Z0v0t0;0. 8CF8: 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF ..+.........*.H. 8D08: 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 q.......5.d;.... 8D18: 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 ...>0.....l....s 8D28: 2E 77 AB 0A D6 02 02 02 08 A1 11 18 0F 32 30 30 .w...........200 8D38: 37 30 31 31 31 31 36 35 39 33 33 5A 18 0F 32 30 70111165933Z..20 8D48: 30 37 30 31 31 31 31 36 35 39 33 33 5A A0 11 18 070111165933Z... 8D58: 0F 32 30 30 37 31 30 30 32 31 39 34 38 34 30 5A .20071002194840Z 8D68: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 0...*.H......... 8D78: 81 81 00 20 6F F2 24 5F 7F A6 B3 B6 F9 52 B6 92 ... o.$_.....R.. 8D88: 78 90 3A 9C DC B1 F2 E5 CF 07 53 A1 15 F9 DC C7 x.:.......S..... 8D98: 6B C0 94 40 F7 F8 98 3D EC E4 9C 83 49 ED 56 05 k..@...=....I.V. 8DA8: D2 91 16 33 61 68 C7 DD D6 03 AC 67 30 6B BE DE ...3ah.....g0k.. 8DB8: 8C F3 0A ED 1F 9F 7D EA 37 41 B2 13 ED 63 DD 16 ......}.7A...c.. 8DC8: 6A 87 55 77 14 C4 FB C9 16 2D EB BA 59 41 57 42 j.Uw.....-..YAWB 8DD8: 3D BF D7 76 7D 40 EC 21 BE 03 74 A9 AE 9D EB 2B =..v}@.!..t....+ 8DE8: 9E AA 1B F8 C3 8C 45 94 91 B8 44 E7 29 07 60 6D ......E...D.).`m 8DF8: 28 B8 DF A0 82 02 7A 30 82 02 76 30 82 02 72 30 (.....z0..v0..r0 8E08: 82 01 DB A0 03 02 01 02 02 02 27 10 30 0D 06 09 ..........'.0... 8E18: 2A 86 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 *.H........0n1.0 8E28: 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 ...U....US1.0... 8E38: 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 U....California1 8E48: 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 .0...U....Mounta 8E58: 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A in View1.0...U.. 8E68: 13 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 ..BOGUS NSS1.0.. 8E78: 03 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 .U....NSS IOPR T 8E88: 65 73 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 est CA 36840 ..0 8E98: 36 31 30 31 39 32 30 31 33 33 39 5A 18 0F 32 30 61019201339Z..20 8EA8: 35 36 31 30 31 39 32 30 31 33 33 39 5A 30 6E 31 561019201339Z0n1 8EB8: 0B 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 .0...U....US1.0. 8EC8: 06 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 ..U....Californi 8ED8: 61 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E a1.0...U....Moun 8EE8: 74 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 tain View1.0...U 8EF8: 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 ....BOGUS NSS1.0 8F08: 1C 06 03 55 04 03 13 15 4E 53 53 20 49 4F 50 52 ...U....NSS IOPR 8F18: 20 54 65 73 74 20 43 41 20 33 36 38 34 30 81 9F Test CA 36840.. 8F28: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 0...*.H......... 8F38: 81 8D 00 30 81 89 02 81 81 00 BA 53 DF A7 E2 BD ...0.......S.... 8F48: A4 E4 D8 93 C9 19 22 C4 37 CE A5 14 3E 26 35 29 ......".7...>&5) 8F58: B5 37 DA C5 27 11 FF 48 90 BC 14 E4 E5 43 95 77 .7..'..H.....C.w 8F68: B5 93 15 4A 16 1D E5 38 98 44 B4 71 AF 2A 7A B9 ...J...8.D.q.*z. 8F78: B6 63 A6 AD 0E EA 47 A3 84 6E F7 2D 9C 04 C6 65 .c....G..n.-...e 8F88: 76 93 DC 15 44 F7 15 E1 EA 0C D1 FE DB AF 50 FA v...D.........P. 8F98: 8F 19 02 92 3C 06 3C C3 17 59 1E 09 FC 3E EC 77 ....<.<..Y...>.w 8FA8: 49 9F 0F E7 1C 03 65 3B F1 6F 5D 4E 5F CF 45 C7 I.....e;.o]N_.E. 8FB8: 48 C3 AA 8D 15 8A E6 8D B0 4B 02 03 01 00 01 A3 H........K...... 8FC8: 1D 30 1B 30 0C 06 03 55 1D 13 04 05 30 03 01 01 .0.0...U....0... 8FD8: FF 30 0B 06 03 55 1D 0F 04 04 03 02 01 06 30 0D .0...U........0. 8FE8: 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 ..*.H........... 8FF8: 00 24 CA FC 23 C8 72 6D D7 59 0B FF C9 13 7C 63 .$..#.rm.Y....|c 9008: 59 B0 A6 C0 D9 C3 AF 02 ED 01 A6 E4 CC CA 1A CE Y............... 9018: 62 E1 73 68 8B E5 8F 35 87 CB F3 59 EE 85 A9 0F b.sh...5...Y.... 9028: 53 63 12 99 B4 4A CA B8 7A 2F 29 93 93 0C 85 77 Sc...J..z/)....w 9038: 5B 9C 3B 2B 18 C1 20 37 F0 9F BD C8 1A E4 82 89 [.;+.. 7........ 9048: 5E 50 A7 E5 16 3E 73 C7 58 F7 97 FA 97 4B FE 2B ^P...>s.X....K.+ 9058: F6 16 A5 51 B8 C7 AD 82 4E 80 61 D4 FB AF E3 1B ...Q....N.a..... 9068: 8F 98 DE D1 4D 7A 39 C6 94 63 CA E3 1B D0 99 AE ....Mz9..c...... 9078: F3 . Check of certificate "ocspRCATestUser520-rsa" failed. Reason: Peer's Certificate has been revoked. Checking for memory leaks... Actual leaks report (actual leaks: 3 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 81 total size: 3203 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.98% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.99% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.99% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (4.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found 7 blocks totaling 78 bytes (2.44% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef638 (2.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.50% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.34% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81d4870 (1.12% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.03% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (1.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2bb8 (0.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRTestUser522-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRTestUser522-rsa (process id 21390) RTC: Enabling Error Checking... RTC: Running program... 1191354220990100: EB38: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB48: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB58: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB68: 3A 32 35 36 32 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2562..Content-T EB78: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB88: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB98: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EBA8: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EBB8: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EBC8: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EBD8: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 0A A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354220993505: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 36 tent-Length: 116 ECA0: 39 0D 0A 0D 0A 9.... 1191354220994092: 8C48: 30 82 04 8D 0A 01 00 A0 82 04 86 30 82 04 82 06 0..........0.... 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 73 30 82 .+.....0.....s0. 8C68: 04 6F 30 82 01 24 A1 81 A9 30 81 A6 31 0B 30 09 .o0..$...0..1.0. 8C78: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 8C88: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 8C98: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 8CA8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 8CB8: 09 42 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 .BOGUS NSS1402.. 8CC8: 2A 86 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 *.H.......%ocspD 8CD8: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8CE8: 65 72 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D er-rsa@bogus.com 8CF8: 31 20 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 1 0...U....ocspD 8D08: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8D18: 65 72 18 0F 32 30 30 37 31 30 30 32 31 39 34 33 er..200710021943 8D28: 34 30 5A 30 65 30 63 30 3B 30 09 06 05 2B 0E 03 40Z0e0c0;0...+.. 8D38: 02 1A 05 00 04 14 8C 2A 92 48 AF 71 F2 D5 CB 85 .......*.H.q.... 8D48: D5 96 F2 35 A4 64 3B B8 AB AD 04 14 0A 07 3E 30 ...5.d;.......>0 8D58: 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E 77 AB 0A D6 .....l....s.w... 8D68: 02 02 02 0A 80 00 18 0F 32 30 30 37 30 31 31 31 ........20070111 8D78: 31 36 35 39 33 33 5A A0 11 18 0F 32 30 30 37 31 165933Z....20071 8D88: 30 30 32 31 39 34 38 34 30 5A 30 0D 06 09 2A 86 002194840Z0...*. 8D98: 48 86 F7 0D 01 01 05 05 00 03 81 81 00 7F 94 C8 H............... 8DA8: 4D CE A8 79 11 3C F7 73 85 39 FA 6C 1A 2B 6A 54 M..y.<.s.9.l.+jT 8DB8: DF E2 9A 28 0B 67 64 86 67 68 57 BA 9F 5D AE 7C ...(.gd.ghW..].| 8DC8: 06 EF A3 B8 8F 10 54 67 CD F3 34 8D 2A 18 83 62 ......Tg..4.*..b 8DD8: 29 72 64 3D 97 19 AE A6 EE 17 75 3E A8 31 A4 02 )rd=......u>.1.. 8DE8: DC 2B 7F 1C 5A CC F3 F4 CF B4 AF 78 24 1E 6C 20 .+..Z......x$.l 8DF8: F4 2F 4A 56 3D AC E6 AF A2 71 ED 9A 6B DE 0F 53 ./JV=....q..k..S 8E08: 27 54 30 3F E8 01 09 14 7A 9E C3 64 D2 33 D1 2A 'T0?....z..d.3.* 8E18: 92 F0 47 44 56 F5 39 DD 43 69 60 37 E8 A0 82 02 ..GDV.9.Ci`7.... 8E28: B0 30 82 02 AC 30 82 02 A8 30 82 02 11 A0 03 02 .0...0...0...... 8E38: 01 02 02 02 02 0E 30 0D 06 09 2A 86 48 86 F7 0D ......0...*.H... 8E48: 01 01 05 05 00 30 6E 31 0B 30 09 06 03 55 04 06 .....0n1.0...U.. 8E58: 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A 43 ..US1.0...U....C 8E68: 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 55 alifornia1.0...U 8E78: 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 65 ....Mountain Vie 8E88: 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 55 w1.0...U....BOGU 8E98: 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 15 S NSS1.0...U.... 8EA8: 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 41 NSS IOPR Test CA 8EB8: 20 33 36 38 34 30 20 17 0D 30 37 30 31 31 32 30 36840 ..0701120 8EC8: 30 35 39 32 38 5A 18 0F 32 30 35 36 31 32 31 32 05928Z..20561212 8ED8: 30 30 35 39 32 38 5A 30 81 A6 31 0B 30 09 06 03 005928Z0..1.0... 8EE8: 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 U....US1.0...U.. 8EF8: 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 ..California1.0. 8F08: 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 ..U....Mountain 8F18: 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 View1.0...U....B 8F28: 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 2A 86 OGUS NSS1402..*. 8F38: 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 65 73 H.......%ocspDes 8F48: 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 72 ignatedResponder 8F58: 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 20 -rsa@bogus.com1 8F68: 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 65 73 0...U....ocspDes 8F78: 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 72 ignatedResponder 8F88: 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 0..0...*.H...... 8F98: 05 00 03 81 8D 00 30 81 89 02 81 81 00 A4 A8 66 ......0........f 8FA8: F2 73 E2 0D D6 F8 51 C4 C1 75 94 1F 13 BE 96 C2 .s....Q..u...... 8FB8: 76 10 C6 B3 D5 B6 6C 00 FE 6D DF A8 23 6A EA AF v.....l..m..#j.. 8FC8: 2F 64 EB 8B BA 9F B0 07 AD 09 42 8B C2 37 0B F0 /d........B..7.. 8FD8: 1E 6D F0 FE BE 74 88 C9 40 65 86 AC AC D0 80 18 .m...t..@e...... 8FE8: C5 F4 86 78 CE 1D CF 0B 9C 0F 37 DB 5D 04 63 D7 ...x......7.].c. 8FF8: 1E 09 44 9B D0 14 27 BE 0C 2A FF EF 48 20 3C 61 ..D...'..*..H .RE...Y...#..R 9088: C1 E8 46 42 DC 59 7A F6 B9 3C 72 7C 17 AA 10 00 ..FB.Yz..0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 0C A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354221732927: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 38 tent-Length: 118 ECA0: 36 0D 0A 0D 0A 6.... 1191354221733519: 8C48: 30 82 04 9E 0A 01 00 A0 82 04 97 30 82 04 93 06 0..........0.... 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 84 30 82 .+.....0......0. 8C68: 04 80 30 82 01 35 A1 81 A9 30 81 A6 31 0B 30 09 ..0..5...0..1.0. 8C78: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 8C88: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 8C98: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 8CA8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 8CB8: 09 42 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 .BOGUS NSS1402.. 8CC8: 2A 86 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 *.H.......%ocspD 8CD8: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8CE8: 65 72 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D er-rsa@bogus.com 8CF8: 31 20 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 1 0...U....ocspD 8D08: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8D18: 65 72 18 0F 32 30 30 37 31 30 30 32 31 39 34 33 er..200710021943 8D28: 34 31 5A 30 76 30 74 30 3B 30 09 06 05 2B 0E 03 41Z0v0t0;0...+.. 8D38: 02 1A 05 00 04 14 8C 2A 92 48 AF 71 F2 D5 CB 85 .......*.H.q.... 8D48: D5 96 F2 35 A4 64 3B B8 AB AD 04 14 0A 07 3E 30 ...5.d;.......>0 8D58: 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E 77 AB 0A D6 .....l....s.w... 8D68: 02 02 02 0C A1 11 18 0F 32 30 30 37 30 31 31 31 ........20070111 8D78: 31 36 35 39 33 33 5A 18 0F 32 30 30 37 30 31 31 165933Z..2007011 8D88: 31 31 36 35 39 33 33 5A A0 11 18 0F 32 30 30 37 1165933Z....2007 8D98: 31 30 30 32 31 39 34 38 34 31 5A 30 0D 06 09 2A 1002194841Z0...* 8DA8: 86 48 86 F7 0D 01 01 05 05 00 03 81 81 00 32 BB .H............2. 8DB8: BB 08 15 93 74 5F 8F F0 47 EA CE 13 78 30 39 89 ....t_..G...x09. 8DC8: 48 E6 56 06 C3 95 A9 66 6D D8 FD B1 52 D6 05 25 H.V....fm...R..% 8DD8: 97 74 82 DF E9 C9 FC F1 19 70 5E FD 23 57 3F B3 .t.......p^.#W?. 8DE8: 53 33 3E 52 BD 7F FF AD BF C2 FF AE F4 BE BB 8A S3>R............ 8DF8: 67 89 80 84 76 12 BB 4D A4 89 31 63 DD 7C 59 08 g...v..M..1c.|Y. 8E08: BE B2 8F 32 C9 A2 80 4F 6C 6F AD 98 A6 DF 3F A0 ...2...Olo....?. 8E18: 82 1F 8A 9F 68 29 62 60 60 38 DD 5C 02 EB 84 C1 ....h)b``8.\.... 8E28: 1F 12 CF 9D A2 98 8D 91 99 7B 0E 3D BE 72 A0 82 .........{.=.r.. 8E38: 02 B0 30 82 02 AC 30 82 02 A8 30 82 02 11 A0 03 ..0...0...0..... 8E48: 02 01 02 02 02 02 0E 30 0D 06 09 2A 86 48 86 F7 .......0...*.H.. 8E58: 0D 01 01 05 05 00 30 6E 31 0B 30 09 06 03 55 04 ......0n1.0...U. 8E68: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U.... 8E78: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 8E88: 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 8E98: 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 ew1.0...U....BOG 8EA8: 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 US NSS1.0...U... 8EB8: 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 .NSS IOPR Test C 8EC8: 41 20 33 36 38 34 30 20 17 0D 30 37 30 31 31 32 A 36840 ..070112 8ED8: 30 30 35 39 32 38 5A 18 0F 32 30 35 36 31 32 31 005928Z..2056121 8EE8: 32 30 30 35 39 32 38 5A 30 81 A6 31 0B 30 09 06 2005928Z0..1.0.. 8EF8: 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 .U....US1.0...U. 8F08: 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 ...California1.0 8F18: 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E ...U....Mountain 8F28: 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 View1.0...U.... 8F38: 42 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 2A BOGUS NSS1402..* 8F48: 86 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 65 .H.......%ocspDe 8F58: 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 signatedResponde 8F68: 72 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 r-rsa@bogus.com1 8F78: 20 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 65 0...U....ocspDe 8F88: 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 signatedResponde 8F98: 72 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 r0..0...*.H..... 8FA8: 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 A4 A8 .......0........ 8FB8: 66 F2 73 E2 0D D6 F8 51 C4 C1 75 94 1F 13 BE 96 f.s....Q..u..... 8FC8: C2 76 10 C6 B3 D5 B6 6C 00 FE 6D DF A8 23 6A EA .v.....l..m..#j. 8FD8: AF 2F 64 EB 8B BA 9F B0 07 AD 09 42 8B C2 37 0B ./d........B..7. 8FE8: F0 1E 6D F0 FE BE 74 88 C9 40 65 86 AC AC D0 80 ..m...t..@e..... 8FF8: 18 C5 F4 86 78 CE 1D CF 0B 9C 0F 37 DB 5D 04 63 ....x......7.].c 9008: D7 1E 09 44 9B D0 14 27 BE 0C 2A FF EF 48 20 3C ...D...'..*..H < 9018: 61 6F 3A 7E BC 90 2F FF A6 C0 38 47 02 5C DD 0B ao:.../...8G.\.. 9028: D5 70 FE CD E7 77 29 44 21 BB 39 AE D4 0F 02 03 .p...w)D!.9..... 9038: 01 00 01 A3 1A 30 18 30 16 06 03 55 1D 25 01 01 .....0.0...U.%.. 9048: FF 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 30 ...0...+.......0 9058: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H.......... 9068: 81 00 90 64 13 62 83 AE D5 CB 4C 16 87 C0 4E 73 ...d.b....L...Ns 9078: CF 4B A0 5C 95 19 22 C7 0F 1B 82 2E 07 1D A0 62 .K.\.."........b 9088: 55 DC 3E B2 52 45 8F B7 E6 59 D6 00 B1 23 88 DC U.>.RE...Y...#.. 9098: 52 C1 E8 46 42 DC 59 7A F6 B9 3C 72 7C 17 AA 10 R..FB.Yz..0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 1C A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354222326183: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 39 tent-Length: 119 ECA0: 34 0D 0A 0D 0A 4.... 1191354222326927: 8C48: 30 82 04 A6 0A 01 00 A0 82 04 9F 30 82 04 9B 06 0..........0.... 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 8C 30 82 .+.....0......0. 8C68: 04 88 30 82 01 28 A1 81 AD 30 81 AA 31 0B 30 09 ..0..(...0..1.0. 8C78: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 8C88: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 8C98: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 8CA8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 8CB8: 09 42 4F 47 55 53 20 4E 53 53 31 36 30 34 06 09 .BOGUS NSS1604.. 8CC8: 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 73 70 44 *.H.......'ocspD 8CD8: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8CE8: 65 72 43 41 2D 72 73 61 40 62 6F 67 75 73 2E 63 erCA-rsa@bogus.c 8CF8: 6F 6D 31 22 30 20 06 03 55 04 03 13 19 6F 63 73 om1"0 ..U....ocs 8D08: 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F pDesignatedRespo 8D18: 6E 64 65 72 43 41 18 0F 32 30 30 37 31 30 30 32 nderCA..20071002 8D28: 31 39 34 33 34 32 5A 30 65 30 63 30 3B 30 09 06 194342Z0e0c0;0.. 8D38: 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF 71 .+.........*.H.q 8D48: F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 14 .......5.d;..... 8D58: 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E ..>0.....l....s. 8D68: 77 AB 0A D6 02 02 02 1C 80 00 18 0F 32 30 30 37 w...........2007 8D78: 30 35 32 31 31 34 33 31 31 33 5A A0 11 18 0F 32 0521143113Z....2 8D88: 30 30 37 31 30 30 32 31 39 34 38 34 32 5A 30 0D 0071002194842Z0. 8D98: 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 ..*.H........... 8DA8: 00 52 F5 4D BB 54 42 B1 9B 4A E1 51 ED 21 A4 F7 .R.M.TB..J.Q.!.. 8DB8: 28 68 92 5A ED 74 82 E0 47 D9 CB 0B F2 BA 8E 82 (h.Z.t..G....... 8DC8: F0 FE F7 54 28 5B A4 07 D8 28 5D F8 88 96 3A 5F ...T([...(]...:_ 8DD8: 0C 73 73 46 E2 96 1D 4B 12 D1 44 92 F9 EC D6 CF .ssF...K..D..... 8DE8: 4E B2 5F 0D A4 46 8C A2 3F 2C 82 F3 62 9D FF 6B N._..F..?,..b..k 8DF8: D2 A9 C4 70 EA 0D 4B C7 57 A5 C3 0B A8 94 25 40 ...p..K.W.....%@ 8E08: 0A D2 05 E0 A2 E7 9C D1 20 71 8F 58 C7 D4 E7 83 ........ q.X.... 8E18: DD 6D 35 8C C2 64 A8 9F AF E1 B9 06 4E CD 9F 1A .m5..d......N... 8E28: 19 A0 82 02 C5 30 82 02 C1 30 82 02 BD 30 82 02 .....0...0...0.. 8E38: 26 A0 03 02 01 02 02 02 02 0F 30 0D 06 09 2A 86 &.........0...*. 8E48: 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 09 06 H........0n1.0.. 8E58: 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 .U....US1.0...U. 8E68: 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 ...California1.0 8E78: 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E ...U....Mountain 8E88: 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 View1.0...U.... 8E98: 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 BOGUS NSS1.0...U 8EA8: 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 65 73 ....NSS IOPR Tes 8EB8: 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 37 30 t CA 36840 ..070 8EC8: 35 32 31 32 31 33 31 30 36 5A 18 0F 32 30 35 37 521213106Z..2057 8ED8: 30 34 32 31 32 31 33 31 30 36 5A 30 81 AA 31 0B 0421213106Z0..1. 8EE8: 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 0...U....US1.0.. 8EF8: 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 .U....California 8F08: 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 1.0...U....Mount 8F18: 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 ain View1.0...U. 8F28: 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 36 30 34 ...BOGUS NSS1604 8F38: 06 09 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 73 ..*.H.......'ocs 8F48: 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F pDesignatedRespo 8F58: 6E 64 65 72 43 41 2D 72 73 61 40 62 6F 67 75 73 nderCA-rsa@bogus 8F68: 2E 63 6F 6D 31 22 30 20 06 03 55 04 03 13 19 6F .com1"0 ..U....o 8F78: 63 73 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 cspDesignatedRes 8F88: 70 6F 6E 64 65 72 43 41 30 81 9F 30 0D 06 09 2A ponderCA0..0...* 8F98: 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 30 81 .H............0. 8FA8: 89 02 81 81 00 A3 5A E4 F6 21 BC D2 BB CB 74 1C ......Z..!....t. 8FB8: BC 4F 5D 9A 15 38 39 DF 83 BC 6B E9 23 B0 E7 8D .O]..89...k.#... 8FC8: E0 67 74 72 BB EB CF E4 8A BA 90 67 66 4A C8 59 .gtr.......gfJ.Y 8FD8: 64 C8 1C 98 93 DE 06 E4 91 28 20 D6 14 69 08 C7 d........( ..i.. 8FE8: 94 85 04 78 E0 47 9F 0C 3D 30 E2 54 38 77 42 D5 ...x.G..=0.T8wB. 8FF8: EC 09 09 27 54 34 E4 E4 27 08 03 01 04 91 04 1A ...'T4..'....... 9008: 37 EE 93 3E 9F 94 8D CB 34 41 15 7B 07 E8 F6 8D 7..>....4A.{.... 9018: DD 03 F4 7F 68 4F 04 8A A3 82 06 A9 4E 26 BA 7B ....hO......N&.{ 9028: 9A 5F 9F BF 81 02 03 01 00 01 A3 2B 30 29 30 0F ._.........+0)0. 9038: 06 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 30 ..U....0.......0 9048: 16 06 03 55 1D 25 01 01 FF 04 0C 30 0A 06 08 2B ...U.%.....0...+ 9058: 06 01 05 05 07 03 09 30 0D 06 09 2A 86 48 86 F7 .......0...*.H.. 9068: 0D 01 01 05 05 00 03 81 81 00 68 F4 DF 00 B7 C4 ..........h..... 9078: 3B E7 04 F5 47 85 94 7B E1 FF 14 94 F1 08 9D 55 ;...G..{.......U 9088: A1 A8 E4 8A E7 C4 D6 B1 0C 9E 78 2A 4A 9A 1F 64 ..........x*J..d 9098: 86 69 17 76 93 57 96 5C 41 65 53 3A A3 68 45 F8 .i.v.W.\AeS:.hE. 90A8: 17 22 92 8F 6E 18 87 68 0B EE F0 B6 2B A2 80 85 ."..n..h....+... 90B8: 2D 98 6C E1 74 BD 9B 7A 55 37 94 28 7C 4E 97 29 -.l.t..zU7.(|N.) 90C8: 87 88 92 BA 37 AD 46 E1 EA 52 8E F5 06 84 7F 25 ....7.F..R.....% 90D8: 18 6A 06 4C 3F D8 6F DD D1 67 C4 66 FD D0 12 B1 .j.L?.o..g.f.... 90E8: CD 17 61 7E 37 E5 BA 36 10 89 ..a.7..6.. Check of certificate "ocspDRCATestUser540-rsa" failed. Reason: Invalid OCSP signing certificate in OCSP response. Checking for memory leaks... Actual leaks report (actual leaks: 9 total size: 540 bytes) Memory Leak (mel): Found 3 leaked blocks with total size 264 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Object_Alloc() at 0x811d8a5 [5] PKIX_Error_Create() at 0x812feec [6] pkix_Throw() at 0x812cab9 [7] PKIX_DoReturn() at 0x813a076 [8] pkix_Build_VerifyCertificate() at 0x8103f67 [9] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [10] pkix_Build_InitiateBuildChain() at 0x810b075 [11] PKIX_BuildChain() at 0x810bb9a [12] cert_VerifyCertChainPkix() at 0x809768f [13] CERT_VerifyCert() at 0x8093736 [14] CERT_VerifyOCSPResponseSignature() at 0x808de52 [15] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [16] CERT_CheckOCSPStatus() at 0x808e92a Memory Leak (mel): Found 3 leaked blocks with total size 132 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PKIX_PL_Malloc() at 0x8129b0b [3] PKIX_PL_Object_Alloc() at 0x811d83a [4] PKIX_Error_Create() at 0x812feec [5] pkix_Throw() at 0x812cab9 [6] PKIX_DoReturn() at 0x813a076 [7] pkix_Build_VerifyCertificate() at 0x8103f67 [8] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [9] pkix_Build_InitiateBuildChain() at 0x810b075 [10] PKIX_BuildChain() at 0x810bb9a [11] cert_VerifyCertChainPkix() at 0x809768f [12] CERT_VerifyCert() at 0x8093736 [13] CERT_VerifyOCSPResponseSignature() at 0x808de52 [14] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [15] CERT_CheckOCSPStatus() at 0x808e92a [16] main() at 0x8071ba1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x8209b08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] CERT_VerifyCert() at 0x8093736 [15] CERT_VerifyOCSPResponseSignature() at 0x808de52 [16] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef638 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81f76b0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xbc921005 [2] fgetnetconfig() at 0xbc920c61 [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRCATestUser541-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRCATestUser541-rsa (process id 21473) RTC: Enabling Error Checking... RTC: Running program... 1191354222894122: EAF0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB00: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB10: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB20: 3A 32 35 36 33 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2563..Content-T EB30: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB40: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB50: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EB60: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EB70: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EB80: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EB90: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBA0: E2 73 2E 77 AB 0A D6 02 02 02 1D A2 1E 30 1C 30 .s.w.........0.0 EBB0: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EBC0: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354222897470: EBE8: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EBF8: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC08: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC18: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC28: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC38: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC48: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 32 31 tent-Length: 121 EC58: 31 0D 0A 0D 0A 1.... 1191354222898056: 6B98: 30 82 04 B7 0A 01 00 A0 82 04 B0 30 82 04 AC 06 0..........0.... 6BA8: 09 2B 06 01 05 05 07 30 01 01 04 82 04 9D 30 82 .+.....0......0. 6BB8: 04 99 30 82 01 39 A1 81 AD 30 81 AA 31 0B 30 09 ..0..9...0..1.0. 6BC8: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 6BD8: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 6BE8: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 6BF8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 6C08: 09 42 4F 47 55 53 20 4E 53 53 31 36 30 34 06 09 .BOGUS NSS1604.. 6C18: 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 73 70 44 *.H.......'ocspD 6C28: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 6C38: 65 72 43 41 2D 72 73 61 40 62 6F 67 75 73 2E 63 erCA-rsa@bogus.c 6C48: 6F 6D 31 22 30 20 06 03 55 04 03 13 19 6F 63 73 om1"0 ..U....ocs 6C58: 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F pDesignatedRespo 6C68: 6E 64 65 72 43 41 18 0F 32 30 30 37 31 30 30 32 nderCA..20071002 6C78: 31 39 34 33 34 32 5A 30 76 30 74 30 3B 30 09 06 194342Z0v0t0;0.. 6C88: 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF 71 .+.........*.H.q 6C98: F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 14 .......5.d;..... 6CA8: 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E ..>0.....l....s. 6CB8: 77 AB 0A D6 02 02 02 1D A1 11 18 0F 32 30 30 37 w...........2007 6CC8: 30 35 32 31 31 34 33 31 31 33 5A 18 0F 32 30 30 0521143113Z..200 6CD8: 37 30 35 32 31 31 34 33 31 31 33 5A A0 11 18 0F 70521143113Z.... 6CE8: 32 30 30 37 31 30 30 32 31 39 34 38 34 32 5A 30 20071002194842Z0 6CF8: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H.......... 6D08: 81 00 98 07 D1 57 25 C1 56 D5 94 1B EB 22 12 BC .....W%.V....".. 6D18: A8 D6 86 B2 86 58 8C A6 D3 0A A3 D1 D3 76 F7 EF .....X.......v.. 6D28: FC C9 AA 4A 69 92 48 94 E6 2E 89 06 3A 93 7D AA ...Ji.H.....:.}. 6D38: D7 10 CF CD B0 0F 07 2D 2F 03 79 9E 8D E3 89 81 .......-/.y..... 6D48: A4 0B 9E 24 8D 5D 53 AF AF C3 96 6A 0C 6D 6A 75 ...$.]S....j.mju 6D58: E5 74 89 AB 76 19 04 35 D2 69 23 64 80 B0 54 D2 .t..v..5.i#d..T. 6D68: 77 86 AA 51 2E E6 BF 1D 54 CD 13 F1 8D 00 D9 E6 w..Q....T....... 6D78: B3 D9 FF 83 92 F9 EE D2 35 AF A8 C0 66 3F 9D 7A ........5...f?.z 6D88: 75 43 A0 82 02 C5 30 82 02 C1 30 82 02 BD 30 82 uC....0...0...0. 6D98: 02 26 A0 03 02 01 02 02 02 02 0F 30 0D 06 09 2A .&.........0...* 6DA8: 86 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 09 .H........0n1.0. 6DB8: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 6DC8: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 6DD8: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 6DE8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 6DF8: 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 .BOGUS NSS1.0... 6E08: 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 65 U....NSS IOPR Te 6E18: 73 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 37 st CA 36840 ..07 6E28: 30 35 32 31 32 31 33 31 30 36 5A 18 0F 32 30 35 0521213106Z..205 6E38: 37 30 34 32 31 32 31 33 31 30 36 5A 30 81 AA 31 70421213106Z0..1 6E48: 0B 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 .0...U....US1.0. 6E58: 06 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 ..U....Californi 6E68: 61 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E a1.0...U....Moun 6E78: 74 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 tain View1.0...U 6E88: 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 36 30 ....BOGUS NSS160 6E98: 34 06 09 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 4..*.H.......'oc 6EA8: 73 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 spDesignatedResp 6EB8: 6F 6E 64 65 72 43 41 2D 72 73 61 40 62 6F 67 75 onderCA-rsa@bogu 6EC8: 73 2E 63 6F 6D 31 22 30 20 06 03 55 04 03 13 19 s.com1"0 ..U.... 6ED8: 6F 63 73 70 44 65 73 69 67 6E 61 74 65 64 52 65 ocspDesignatedRe 6EE8: 73 70 6F 6E 64 65 72 43 41 30 81 9F 30 0D 06 09 sponderCA0..0... 6EF8: 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 30 *.H............0 6F08: 81 89 02 81 81 00 A3 5A E4 F6 21 BC D2 BB CB 74 .......Z..!....t 6F18: 1C BC 4F 5D 9A 15 38 39 DF 83 BC 6B E9 23 B0 E7 ..O]..89...k.#.. 6F28: 8D E0 67 74 72 BB EB CF E4 8A BA 90 67 66 4A C8 ..gtr.......gfJ. 6F38: 59 64 C8 1C 98 93 DE 06 E4 91 28 20 D6 14 69 08 Yd........( ..i. 6F48: C7 94 85 04 78 E0 47 9F 0C 3D 30 E2 54 38 77 42 ....x.G..=0.T8wB 6F58: D5 EC 09 09 27 54 34 E4 E4 27 08 03 01 04 91 04 ....'T4..'...... 6F68: 1A 37 EE 93 3E 9F 94 8D CB 34 41 15 7B 07 E8 F6 .7..>....4A.{... 6F78: 8D DD 03 F4 7F 68 4F 04 8A A3 82 06 A9 4E 26 BA .....hO......N&. 6F88: 7B 9A 5F 9F BF 81 02 03 01 00 01 A3 2B 30 29 30 {._.........+0)0 6F98: 0F 06 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 ...U....0....... 6FA8: 30 16 06 03 55 1D 25 01 01 FF 04 0C 30 0A 06 08 0...U.%.....0... 6FB8: 2B 06 01 05 05 07 03 09 30 0D 06 09 2A 86 48 86 +.......0...*.H. 6FC8: F7 0D 01 01 05 05 00 03 81 81 00 68 F4 DF 00 B7 ...........h.... 6FD8: C4 3B E7 04 F5 47 85 94 7B E1 FF 14 94 F1 08 9D .;...G..{....... 6FE8: 55 A1 A8 E4 8A E7 C4 D6 B1 0C 9E 78 2A 4A 9A 1F U..........x*J.. 6FF8: 64 86 69 17 76 93 57 96 5C 41 65 53 3A A3 68 45 d.i.v.W.\AeS:.hE 7008: F8 17 22 92 8F 6E 18 87 68 0B EE F0 B6 2B A2 80 .."..n..h....+.. 7018: 85 2D 98 6C E1 74 BD 9B 7A 55 37 94 28 7C 4E 97 .-.l.t..zU7.(|N. 7028: 29 87 88 92 BA 37 AD 46 E1 EA 52 8E F5 06 84 7F )....7.F..R..... 7038: 25 18 6A 06 4C 3F D8 6F DD D1 67 C4 66 FD D0 12 %.j.L?.o..g.f... 7048: B1 CD 17 61 7E 37 E5 BA 36 10 89 ...a.7..6.. Check of certificate "ocspDRCATestUser541-rsa" failed. Reason: Invalid OCSP signing certificate in OCSP response. Checking for memory leaks... Actual leaks report (actual leaks: 9 total size: 540 bytes) Memory Leak (mel): Found 3 leaked blocks with total size 264 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Object_Alloc() at 0x811d8a5 [5] PKIX_Error_Create() at 0x812feec [6] pkix_Throw() at 0x812cab9 [7] PKIX_DoReturn() at 0x813a076 [8] pkix_Build_VerifyCertificate() at 0x8103f67 [9] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [10] pkix_Build_InitiateBuildChain() at 0x810b075 [11] PKIX_BuildChain() at 0x810bb9a [12] cert_VerifyCertChainPkix() at 0x809768f [13] CERT_VerifyCert() at 0x8093736 [14] CERT_VerifyOCSPResponseSignature() at 0x808de52 [15] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [16] CERT_CheckOCSPStatus() at 0x808e92a Memory Leak (mel): Found 3 leaked blocks with total size 132 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PKIX_PL_Malloc() at 0x8129b0b [3] PKIX_PL_Object_Alloc() at 0x811d83a [4] PKIX_Error_Create() at 0x812feec [5] pkix_Throw() at 0x812cab9 [6] PKIX_DoReturn() at 0x813a076 [7] pkix_Build_VerifyCertificate() at 0x8103f67 [8] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [9] pkix_Build_InitiateBuildChain() at 0x810b075 [10] PKIX_BuildChain() at 0x810bb9a [11] cert_VerifyCertChainPkix() at 0x809768f [12] CERT_VerifyCert() at 0x8093736 [13] CERT_VerifyOCSPResponseSignature() at 0x808de52 [14] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [15] CERT_CheckOCSPStatus() at 0x808e92a [16] main() at 0x8071ba1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x8209bb8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] CERT_VerifyCert() at 0x8093736 [15] CERT_VerifyOCSPResponseSignature() at 0x808de52 [16] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef4e8 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81ea008 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser514-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser514-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa (process id 21510) RTC: Enabling Error Checking... RTC: Running program... 1191354223519571: 57E0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. 57F0: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups 5800: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com 5810: 3A 32 35 36 30 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2560..Content-T 5820: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application 5830: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C 5840: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 32 ontent-Length: 2 5850: 34 30 0D 0A 0D 0A 30 81 ED 30 81 EA 30 81 C7 30 40....0..0..0..0 5860: 81 C4 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 ..0;0...+....... 5870: 14 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 ..*.H.q.......5. 5880: 64 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 d;.......>0..... 5890: 6C 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 02 A0 l....s.w........ 58A0: 81 84 30 81 81 30 7F 06 09 2B 06 01 05 05 07 30 ..0..0...+.....0 58B0: 01 07 04 72 30 70 30 6E 31 0B 30 09 06 03 55 04 ...r0p0n1.0...U. 58C0: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U.... 58D0: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 58E0: 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 58F0: 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 ew1.0...U....BOG 5900: 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 US NSS1.0...U... 5910: 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 .NSS IOPR Test C 5920: 41 20 33 36 38 34 A2 1E 30 1C 30 1A 06 09 2B 06 A 3684..0.0...+. 5930: 01 05 05 07 30 01 04 04 0D 30 0B 06 09 2B 06 01 ....0....0...+.. 5940: 05 05 07 30 01 01 ...0.. 1191354223522984: 0A08: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. 0A18: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a 0A28: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- 0A38: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten 0A48: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod 0A58: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con 0A68: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 32 tent-Length: 112 0A78: 39 0D 0A 0D 0A 9.... 1191354223523585: 9B30: 30 82 04 65 0A 01 00 A0 82 04 5E 30 82 04 5A 06 0..e......^0..Z. 9B40: 09 2B 06 01 05 05 07 30 01 01 04 82 04 4B 30 82 .+.....0.....K0. 9B50: 04 47 30 82 01 1E A1 81 A3 30 81 A0 31 0B 30 09 .G0......0..1.0. 9B60: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 9B70: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 9B80: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 9B90: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 9BA0: 09 42 4F 47 55 53 20 4E 53 53 31 31 30 2F 06 09 .BOGUS NSS110/.. 9BB0: 2A 86 48 86 F7 0D 01 09 01 16 22 6F 63 73 70 54 *.H......."ocspT 9BC0: 72 75 73 74 65 64 52 65 73 70 6F 6E 64 65 72 2D rustedResponder- 9BD0: 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 1D 30 rsa@bogus.com1.0 9BE0: 1B 06 03 55 04 03 13 14 6F 63 73 70 54 72 75 73 ...U....ocspTrus 9BF0: 74 65 64 52 65 73 70 6F 6E 64 65 72 18 0F 32 30 tedResponder..20 9C00: 30 37 31 30 30 32 31 39 34 33 34 33 5A 30 65 30 071002194343Z0e0 9C10: 63 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 c0;0...+........ 9C20: 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 .*.H.q.......5.d 9C30: 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C ;.......>0.....l 9C40: 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 02 80 00 ....s.w......... 9C50: 18 0F 32 30 30 37 30 31 31 31 31 36 35 39 33 33 ..20070111165933 9C60: 5A A0 11 18 0F 32 30 30 37 31 30 30 32 31 39 34 Z....20071002194 9C70: 38 34 33 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 843Z0...*.H..... 9C80: 05 05 00 03 81 81 00 9D 6D 0D 6B 17 52 4D 90 96 ........m.k.RM.. 9C90: C6 7F 42 2D 05 9B 31 D6 7D 31 7F 4B 2C 9E 42 C7 ..B-..1.}1.K,.B. 9CA0: 86 0B EB 2B 27 16 3B 3E FC AA E1 81 C5 64 89 42 ...+'.;>.....d.B 9CB0: 19 19 19 C8 9F 90 7B 2B 42 E8 ED 63 88 0E 8F 2B ......{+B..c...+ 9CC0: 0D 4D 02 79 EE C5 7C C1 62 77 1C 15 FF A4 2F 28 .M.y..|.bw..../( 9CD0: 0F 26 F4 97 EF 8A 5A 5E 71 78 A1 8B 79 90 5A A4 .&....Z^qx..y.Z. 9CE0: 94 BF 22 AF F2 93 01 1A D2 19 9B 14 68 0F F2 54 ..".........h..T 9CF0: D5 48 5E 17 36 60 6B B7 D1 1F 53 D4 D7 66 F8 B3 .H^.6`k...S..f.. 9D00: A8 0A 43 B3 54 9C 6B A0 82 02 8E 30 82 02 8A 30 ..C.T.k....0...0 9D10: 82 02 86 30 82 01 EF A0 03 02 01 02 02 02 02 0D ...0............ 9D20: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 0...*.H........0 9D30: 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 13 n1.0...U....US1. 9D40: 30 11 06 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 0...U....Califor 9D50: 6E 69 61 31 16 30 14 06 03 55 04 07 13 0D 4D 6F nia1.0...U....Mo 9D60: 75 6E 74 61 69 6E 20 56 69 65 77 31 12 30 10 06 untain View1.0.. 9D70: 03 55 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 .U....BOGUS NSS1 9D80: 1E 30 1C 06 03 55 04 03 13 15 4E 53 53 20 49 4F .0...U....NSS IO 9D90: 50 52 20 54 65 73 74 20 43 41 20 33 36 38 34 30 PR Test CA 36840 9DA0: 20 17 0D 30 37 30 31 31 32 30 30 35 39 32 37 5A ..070112005927Z 9DB0: 18 0F 32 30 35 36 31 32 31 32 30 30 35 39 32 37 ..20561212005927 9DC0: 5A 30 81 A0 31 0B 30 09 06 03 55 04 06 13 02 55 Z0..1.0...U....U 9DD0: 53 31 13 30 11 06 03 55 04 08 13 0A 43 61 6C 69 S1.0...U....Cali 9DE0: 66 6F 72 6E 69 61 31 16 30 14 06 03 55 04 07 13 fornia1.0...U... 9DF0: 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 31 12 .Mountain View1. 9E00: 30 10 06 03 55 04 0A 13 09 42 4F 47 55 53 20 4E 0...U....BOGUS N 9E10: 53 53 31 31 30 2F 06 09 2A 86 48 86 F7 0D 01 09 SS110/..*.H..... 9E20: 01 16 22 6F 63 73 70 54 72 75 73 74 65 64 52 65 .."ocspTrustedRe 9E30: 73 70 6F 6E 64 65 72 2D 72 73 61 40 62 6F 67 75 sponder-rsa@bogu 9E40: 73 2E 63 6F 6D 31 1D 30 1B 06 03 55 04 03 13 14 s.com1.0...U.... 9E50: 6F 63 73 70 54 72 75 73 74 65 64 52 65 73 70 6F ocspTrustedRespo 9E60: 6E 64 65 72 30 81 9F 30 0D 06 09 2A 86 48 86 F7 nder0..0...*.H.. 9E70: 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 ..........0..... 9E80: 00 BF 64 20 3E 5F 8F C8 A7 F9 28 B8 D9 F2 CF F2 ..d >_....(..... 9E90: B5 40 ED A9 EE A5 13 7F 62 D8 8C 39 BC 97 C0 23 .@......b..9...# 9EA0: B5 1D 56 DF A3 E4 EF C8 77 33 DC 6A AC A2 54 CB ..V.....w3.j..T. 9EB0: 4F 60 DC FD 21 42 10 5B E8 24 30 47 B0 FA 15 BC O`..!B.[.$0G.... 9EC0: 49 CA 2C B8 04 68 1C D5 22 EC 56 BD 5F 89 DB 85 I.,..h..".V._... 9ED0: C5 7B 1C 3C 88 E2 85 C2 FD 7D BE 82 76 11 F2 C7 .{.<.....}..v... 9EE0: 7F DF AC 24 93 1C E1 10 D9 7C F7 EA 9B 72 E6 2E ...$.....|...r.. 9EF0: 6F FE CE F0 A0 1E 70 60 C0 A8 F9 1D 6A E3 38 F1 o.....p`....j.8. 9F00: 6F 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D o.....0...*.H... 9F10: 01 01 05 05 00 03 81 81 00 B6 97 C5 57 17 3D FE ............W.=. 9F20: 16 CE BF A1 6C B3 D3 E1 B3 72 60 D6 0E 73 6E 54 ....l....r`..snT 9F30: BA 05 DB 2B 21 92 CA F0 8C 32 51 EE 75 48 3D D1 ...+!....2Q.uH=. 9F40: D6 BB CE 94 8A 0B 76 CB C0 D0 B7 65 1B B5 E1 20 ......v....e... 9F50: 92 66 EF 74 8A F7 C7 20 E7 6D 1D E9 69 5B 92 FC .f.t... .m..i[.. 9F60: 10 5C 40 44 C0 96 F4 00 4B 6E 54 0E 47 ED 37 13 .\@D....KnT.G.7. 9F70: 7F AB 6A E4 80 C2 BB 2F 6B 72 F7 FD F6 61 93 B2 ..j..../kr...a.. 9F80: F5 CE 95 D0 6D A0 65 46 BF 33 86 73 AC BD AB 7F ....m.eF.3.s.... 9F90: 4A 80 B8 13 97 37 61 4C 98 J....7aL. Check of certificate "ocspTRTestUser514-rsa" succeeded. Checking for memory leaks... Actual leaks report (actual leaks: 7 total size: 235 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 38 bytes at address 0x81f7770 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f75c [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 25 bytes at address 0x81d4870 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f768 [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 16 bytes at address 0x81edfe0 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f88b [5] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 12 bytes at address 0x81edf68 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f87b [5] main() at 0x80719c4 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x8201ef8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] cert_VerifyCertChain() at 0x8092622 [15] CERT_VerifyCertificate() at 0x8092e9c [16] CERT_VerifyCertificateNow() at 0x8093bc7 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81fdae0 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81ea588 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser516-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser516-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa (process id 21533) RTC: Enabling Error Checking... RTC: Running program... 1191354224102828: 57E0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. 57F0: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups 5800: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com 5810: 3A 32 35 36 30 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2560..Content-T 5820: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application 5830: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C 5840: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 32 ontent-Length: 2 5850: 34 30 0D 0A 0D 0A 30 81 ED 30 81 EA 30 81 C7 30 40....0..0..0..0 5860: 81 C4 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 ..0;0...+....... 5870: 14 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 ..*.H.q.......5. 5880: 64 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 d;.......>0..... 5890: 6C 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 04 A0 l....s.w........ 58A0: 81 84 30 81 81 30 7F 06 09 2B 06 01 05 05 07 30 ..0..0...+.....0 58B0: 01 07 04 72 30 70 30 6E 31 0B 30 09 06 03 55 04 ...r0p0n1.0...U. 58C0: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U.... 58D0: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 58E0: 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 58F0: 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 ew1.0...U....BOG 5900: 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 US NSS1.0...U... 5910: 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 .NSS IOPR Test C 5920: 41 20 33 36 38 34 A2 1E 30 1C 30 1A 06 09 2B 06 A 3684..0.0...+. 5930: 01 05 05 07 30 01 04 04 0D 30 0B 06 09 2B 06 01 ....0....0...+.. 5940: 05 05 07 30 01 01 ...0.. 1191354224106216: 0A08: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. 0A18: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a 0A28: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- 0A38: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten 0A48: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod 0A58: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con 0A68: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 34 tent-Length: 114 0A78: 36 0D 0A 0D 0A 6.... 1191354224106813: 9B30: 30 82 04 76 0A 01 00 A0 82 04 6F 30 82 04 6B 06 0..v......o0..k. 9B40: 09 2B 06 01 05 05 07 30 01 01 04 82 04 5C 30 82 .+.....0.....\0. 9B50: 04 58 30 82 01 2F A1 81 A3 30 81 A0 31 0B 30 09 .X0../...0..1.0. 9B60: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 9B70: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 9B80: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 9B90: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 9BA0: 09 42 4F 47 55 53 20 4E 53 53 31 31 30 2F 06 09 .BOGUS NSS110/.. 9BB0: 2A 86 48 86 F7 0D 01 09 01 16 22 6F 63 73 70 54 *.H......."ocspT 9BC0: 72 75 73 74 65 64 52 65 73 70 6F 6E 64 65 72 2D rustedResponder- 9BD0: 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 1D 30 rsa@bogus.com1.0 9BE0: 1B 06 03 55 04 03 13 14 6F 63 73 70 54 72 75 73 ...U....ocspTrus 9BF0: 74 65 64 52 65 73 70 6F 6E 64 65 72 18 0F 32 30 tedResponder..20 9C00: 30 37 31 30 30 32 31 39 34 33 34 34 5A 30 76 30 071002194344Z0v0 9C10: 74 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 t0;0...+........ 9C20: 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 .*.H.q.......5.d 9C30: 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C ;.......>0.....l 9C40: 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 04 A1 11 ....s.w......... 9C50: 18 0F 32 30 30 37 30 31 31 31 31 36 35 39 33 33 ..20070111165933 9C60: 5A 18 0F 32 30 30 37 30 31 31 31 31 36 35 39 33 Z..2007011116593 9C70: 33 5A A0 11 18 0F 32 30 30 37 31 30 30 32 31 39 3Z....2007100219 9C80: 34 38 34 34 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 4844Z0...*.H.... 9C90: 01 05 05 00 03 81 81 00 4F C8 2E 9C 1F 40 BA 0C ........O....@.. 9CA0: AD FA 92 C3 4D C0 31 93 C5 A0 D9 36 A6 2D C3 CA ....M.1....6.-.. 9CB0: DF 12 54 31 A7 51 C2 16 B9 9A D4 B5 FB 37 F9 FE ..T1.Q.......7.. 9CC0: 37 64 92 1A EA F2 79 BC FC 9C 2F FA 78 E4 82 E6 7d....y.../.x... 9CD0: CE 94 11 24 45 38 02 D8 FA 16 DC 20 5C A1 BE 83 ...$E8..... \... 9CE0: F2 6E FC BE 2F 32 D3 69 ED 80 5A D0 2D DC 1C 83 .n../2.i..Z.-... 9CF0: 7B 5C E8 BB F1 4D D1 A5 1F 86 65 FC 7E D1 88 B3 {\...M....e..... 9D00: 72 EA 83 59 22 3D 42 E8 44 01 BC BD 40 86 97 2E r..Y"=B.D...@... 9D10: 3F 5F 4D 07 AC 14 FB 64 A0 82 02 8E 30 82 02 8A ?_M....d....0... 9D20: 30 82 02 86 30 82 01 EF A0 03 02 01 02 02 02 02 0...0........... 9D30: 0D 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 .0...*.H........ 9D40: 30 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0n1.0...U....US1 9D50: 13 30 11 06 03 55 04 08 13 0A 43 61 6C 69 66 6F .0...U....Califo 9D60: 72 6E 69 61 31 16 30 14 06 03 55 04 07 13 0D 4D rnia1.0...U....M 9D70: 6F 75 6E 74 61 69 6E 20 56 69 65 77 31 12 30 10 ountain View1.0. 9D80: 06 03 55 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 ..U....BOGUS NSS 9D90: 31 1E 30 1C 06 03 55 04 03 13 15 4E 53 53 20 49 1.0...U....NSS I 9DA0: 4F 50 52 20 54 65 73 74 20 43 41 20 33 36 38 34 OPR Test CA 3684 9DB0: 30 20 17 0D 30 37 30 31 31 32 30 30 35 39 32 37 0 ..070112005927 9DC0: 5A 18 0F 32 30 35 36 31 32 31 32 30 30 35 39 32 Z..2056121200592 9DD0: 37 5A 30 81 A0 31 0B 30 09 06 03 55 04 06 13 02 7Z0..1.0...U.... 9DE0: 55 53 31 13 30 11 06 03 55 04 08 13 0A 43 61 6C US1.0...U....Cal 9DF0: 69 66 6F 72 6E 69 61 31 16 30 14 06 03 55 04 07 ifornia1.0...U.. 9E00: 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 31 ..Mountain View1 9E10: 12 30 10 06 03 55 04 0A 13 09 42 4F 47 55 53 20 .0...U....BOGUS 9E20: 4E 53 53 31 31 30 2F 06 09 2A 86 48 86 F7 0D 01 NSS110/..*.H.... 9E30: 09 01 16 22 6F 63 73 70 54 72 75 73 74 65 64 52 ..."ocspTrustedR 9E40: 65 73 70 6F 6E 64 65 72 2D 72 73 61 40 62 6F 67 esponder-rsa@bog 9E50: 75 73 2E 63 6F 6D 31 1D 30 1B 06 03 55 04 03 13 us.com1.0...U... 9E60: 14 6F 63 73 70 54 72 75 73 74 65 64 52 65 73 70 .ocspTrustedResp 9E70: 6F 6E 64 65 72 30 81 9F 30 0D 06 09 2A 86 48 86 onder0..0...*.H. 9E80: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0.... 9E90: 81 00 BF 64 20 3E 5F 8F C8 A7 F9 28 B8 D9 F2 CF ...d >_....(.... 9EA0: F2 B5 40 ED A9 EE A5 13 7F 62 D8 8C 39 BC 97 C0 ..@......b..9... 9EB0: 23 B5 1D 56 DF A3 E4 EF C8 77 33 DC 6A AC A2 54 #..V.....w3.j..T 9EC0: CB 4F 60 DC FD 21 42 10 5B E8 24 30 47 B0 FA 15 .O`..!B.[.$0G... 9ED0: BC 49 CA 2C B8 04 68 1C D5 22 EC 56 BD 5F 89 DB .I.,..h..".V._.. 9EE0: 85 C5 7B 1C 3C 88 E2 85 C2 FD 7D BE 82 76 11 F2 ..{.<.....}..v.. 9EF0: C7 7F DF AC 24 93 1C E1 10 D9 7C F7 EA 9B 72 E6 ....$.....|...r. 9F00: 2E 6F FE CE F0 A0 1E 70 60 C0 A8 F9 1D 6A E3 38 .o.....p`....j.8 9F10: F1 6F 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 .o.....0...*.H.. 9F20: 0D 01 01 05 05 00 03 81 81 00 B6 97 C5 57 17 3D .............W.= 9F30: FE 16 CE BF A1 6C B3 D3 E1 B3 72 60 D6 0E 73 6E .....l....r`..sn 9F40: 54 BA 05 DB 2B 21 92 CA F0 8C 32 51 EE 75 48 3D T...+!....2Q.uH= 9F50: D1 D6 BB CE 94 8A 0B 76 CB C0 D0 B7 65 1B B5 E1 .......v....e... 9F60: 20 92 66 EF 74 8A F7 C7 20 E7 6D 1D E9 69 5B 92 .f.t... .m..i[. 9F70: FC 10 5C 40 44 C0 96 F4 00 4B 6E 54 0E 47 ED 37 ..\@D....KnT.G.7 9F80: 13 7F AB 6A E4 80 C2 BB 2F 6B 72 F7 FD F6 61 93 ...j..../kr...a. 9F90: B2 F5 CE 95 D0 6D A0 65 46 BF 33 86 73 AC BD AB .....m.eF.3.s... 9FA0: 7F 4A 80 B8 13 97 37 61 4C 98 .J....7aL. Check of certificate "ocspTRTestUser516-rsa" failed. Reason: Peer's Certificate has been revoked. Checking for memory leaks... Actual leaks report (actual leaks: 7 total size: 235 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 38 bytes at address 0x81f7770 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f75c [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 25 bytes at address 0x81d4870 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f768 [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 16 bytes at address 0x81edfe0 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f88b [5] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 12 bytes at address 0x81edf68 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f87b [5] main() at 0x80719c4 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x8201ef8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] cert_VerifyCertChain() at 0x8092622 [15] CERT_VerifyCertificate() at 0x8092e9c [16] CERT_VerifyCertificateNow() at 0x8093bc7 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81fdae0 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81ea588 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 execution completed, exit code is 0