init.sh init: Testing PATH .:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin against LIB /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib Running tests for memleak TIMESTAMP memleak BEGIN: Tue Oct 2 12:19:32 PDT 2007 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: Creating a CA Certificate TestCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -f ../tests.pw.29173 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -o root.cert cert.sh: Creating a CA Certificate serverCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -f ../tests.pw.29173 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -o root.cert cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -o root.cert cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -o root.cert cert.sh: Creating a CA Certificate clientCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -f ../tests.pw.29173 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -o root.cert cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -o root.cert cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -o root.cert cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing aquash.red.iplanet.com's Cert DB (ext.) -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -f ../tests.pw.29173 cert.sh: Loading root cert module to aquash.red.iplanet.com's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Generate Cert Request for aquash.red.iplanet.com (ext) -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -i req -o aquash.red.iplanet.com.cert -f ../tests.pw.29173 cert.sh: Import aquash.red.iplanet.com's Cert -t u,u,u (ext) -------------------------- certutil -A -n aquash.red.iplanet.com -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -f ../tests.pw.29173 -i aquash.red.iplanet.com.cert cert.sh: Import Client Root CA -t T,, for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/clientCA.ca.cert cert.sh: Generate EC Cert Request for aquash.red.iplanet.com (ext) -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -k ec -q secp256r1 -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -i req -o aquash.red.iplanet.com-ec.cert -f ../tests.pw.29173 cert.sh: Import aquash.red.iplanet.com's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n aquash.red.iplanet.com-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -f ../tests.pw.29173 -i aquash.red.iplanet.com-ec.cert cert.sh: Import Client EC Root CA -t T,, for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/clientCA-ec.ca.cert cert.sh: Generate mixed EC Cert Request for aquash.red.iplanet.com (ext) -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -k ec -q secp256r1 -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA -i req -o aquash.red.iplanet.com-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import aquash.red.iplanet.com's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n aquash.red.iplanet.com-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -f ../tests.pw.29173 -i aquash.red.iplanet.com-ecmixed.cert Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/serverCA.ca.cert cert.sh: Import chain-1-serverCA CA -t u,u,u for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/chain-1-serverCA.ca.cert cert.sh: Import chain-2-serverCA CA -t u,u,u for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/chain-2-serverCA.ca.cert cert.sh: Import serverCA-ec CA -t C,C,C for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/serverCA-ec.ca.cert cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/chain-1-serverCA-ec.ca.cert cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for aquash.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_server -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/chain-2-serverCA-ec.ca.cert Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -f ../tests.pw.29173 cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw.29173 cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -f ../tests.pw.29173 -i ExtendedSSLUser.cert cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/serverCA.ca.cert cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -k ec -q secp256r1 -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw.29173 cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -f ../tests.pw.29173 -i ExtendedSSLUser-ec.cert cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/serverCA/serverCA-ec.ca.cert cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -k ec -q secp256r1 -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -f ../tests.pw.29173 -i ExtendedSSLUser-ecmixed.cert Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/clientCA.ca.cert cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/chain-1-clientCA.ca.cert cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/chain-2-clientCA.ca.cert cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/clientCA-ec.ca.cert cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/chain-1-clientCA-ec.ca.cert cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/ext_client -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/clientCA/chain-2-clientCA-ec.ca.cert cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -i ../CA/root.cert cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -i ../CA/ecroot.cert cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw.29173 cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser.cert cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser-ec.cert cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser-ecmixed.cert cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ aquash.red.iplanet.com ------------------------------------ cert.sh: Initializing aquash.red.iplanet.com's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 cert.sh: Loading root cert module to aquash.red.iplanet.com's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for aquash.red.iplanet.com -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -i ../CA/root.cert cert.sh: Import EC Root CA for aquash.red.iplanet.com -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -i ../CA/ecroot.cert cert.sh: Generate Cert Request for aquash.red.iplanet.com -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o aquash.red.iplanet.com.cert -f ../tests.pw.29173 cert.sh: Import aquash.red.iplanet.com's Cert -------------------------- certutil -A -n aquash.red.iplanet.com -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 -i aquash.red.iplanet.com.cert cert.sh SUCCESS: aquash.red.iplanet.com's Cert Created cert.sh: Generate EC Cert Request for aquash.red.iplanet.com -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o aquash.red.iplanet.com-ec.cert -f ../tests.pw.29173 cert.sh: Import aquash.red.iplanet.com's EC Cert -------------------------- certutil -A -n aquash.red.iplanet.com-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 -i aquash.red.iplanet.com-ec.cert cert.sh SUCCESS: aquash.red.iplanet.com's EC Cert Created cert.sh: Generate mixed EC Cert Request for aquash.red.iplanet.com -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o aquash.red.iplanet.com-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import aquash.red.iplanet.com's mixed EC Cert -------------------------- certutil -A -n aquash.red.iplanet.com-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 -i aquash.red.iplanet.com-ecmixed.cert cert.sh SUCCESS: aquash.red.iplanet.com's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server -f ../tests.pw.29173 cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -i ../CA/root.cert cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw.29173 cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 -i Alice.cert cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw.29173 cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 -i Alice-ec.cert cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/alicedir -f ../tests.pw.29173 -i Alice-ecmixed.cert cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -i ../CA/root.cert cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw.29173 cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 -i Bob.cert cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw.29173 cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 -i Bob-ec.cert cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/bobdir -f ../tests.pw.29173 -i Bob-ecmixed.cert cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -i ../CA/root.cert cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw.29173 cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 -i Dave.cert cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw.29173 cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 -i Dave-ec.cert cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dave -f ../tests.pw.29173 -i Dave-ecmixed.cert cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -i ../CA/root.cert cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw.29173 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 -i Eve.cert cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw.29173 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 -i Eve-ec.cert cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw.29173 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eve -f ../tests.pw.29173 -i Eve-ecmixed.cert cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.29173 -i ../bobdir/Bob.cert cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.29173 -i ../dave/Dave.cert cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.29173 -i ../dave/Dave.cert cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.29173 -i ../eve/Eve.cert cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.29173 -i ../eve/Eve.cert cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.29173 -i ../bobdir/Bob-ec.cert cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.29173 -i ../dave/Dave-ec.cert cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.29173 -i ../dave/Dave-ec.cert cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/fips -f ../tests.fipspw.29173 cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/fips -f ../tests.fipspw.29173 -k dsa -v 600 -m 500 -z ../tests_noise.29173 Generating key. This may take a few moments... cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -i ../CA/ecroot.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 -------------------------- certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb163v1's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb163v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 -------------------------- certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb163v2's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb163v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 -------------------------- certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb163v3's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb163v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 -------------------------- certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb176v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb176v1's EC Cert -------------------------- certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb176v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 -------------------------- certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb208w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb208w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb208w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 -------------------------- certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb272w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb272w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb272w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 -------------------------- certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb304w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb304w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb304w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 -------------------------- certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb368w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2pnb368w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2pnb368w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 -------------------------- certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb191v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb191v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 -------------------------- certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb191v2's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb191v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 -------------------------- certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb191v3's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb191v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 -------------------------- certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb239v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb239v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 -------------------------- certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb239v2's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb239v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 -------------------------- certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb239v3's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb239v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 -------------------------- certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb359v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb359v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb359v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 -------------------------- certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb431r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-c2tnb431r1's EC Cert -------------------------- certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-c2tnb431r1-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb163 -------------------------- certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb163's EC Request -------------------------- certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistb163's EC Cert -------------------------- certutil -A -n Curve-nistb163-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistb163-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb233 -------------------------- certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb233's EC Request -------------------------- certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistb233's EC Cert -------------------------- certutil -A -n Curve-nistb233-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistb233-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb283 -------------------------- certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb283's EC Request -------------------------- certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistb283's EC Cert -------------------------- certutil -A -n Curve-nistb283-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistb283-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb409 -------------------------- certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb409's EC Request -------------------------- certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistb409's EC Cert -------------------------- certutil -A -n Curve-nistb409-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistb409-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb571 -------------------------- certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb571's EC Request -------------------------- certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistb571's EC Cert -------------------------- certutil -A -n Curve-nistb571-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistb571-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk163 -------------------------- certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk163's EC Request -------------------------- certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistk163's EC Cert -------------------------- certutil -A -n Curve-nistk163-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistk163-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk233 -------------------------- certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk233's EC Request -------------------------- certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistk233's EC Cert -------------------------- certutil -A -n Curve-nistk233-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistk233-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk283 -------------------------- certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk283's EC Request -------------------------- certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistk283's EC Cert -------------------------- certutil -A -n Curve-nistk283-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistk283-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk409 -------------------------- certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk409's EC Request -------------------------- certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistk409's EC Cert -------------------------- certutil -A -n Curve-nistk409-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistk409-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk571 -------------------------- certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk571's EC Request -------------------------- certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistk571's EC Cert -------------------------- certutil -A -n Curve-nistk571-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistk571-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp192 -------------------------- certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp192's EC Request -------------------------- certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistp192's EC Cert -------------------------- certutil -A -n Curve-nistp192-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistp192-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp224 -------------------------- certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp224's EC Request -------------------------- certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistp224's EC Cert -------------------------- certutil -A -n Curve-nistp224-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistp224-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistp256-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistp384-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-nistp521-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v1 -------------------------- certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-prime192v1's EC Cert -------------------------- certutil -A -n Curve-prime192v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-prime192v1-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v2 -------------------------- certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-prime192v2's EC Cert -------------------------- certutil -A -n Curve-prime192v2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-prime192v2-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v3 -------------------------- certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-prime192v3's EC Cert -------------------------- certutil -A -n Curve-prime192v3-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-prime192v3-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v1 -------------------------- certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-prime239v1's EC Cert -------------------------- certutil -A -n Curve-prime239v1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-prime239v1-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v2 -------------------------- certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-prime239v2's EC Cert -------------------------- certutil -A -n Curve-prime239v2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-prime239v2-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v3 -------------------------- certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-prime239v3's EC Cert -------------------------- certutil -A -n Curve-prime239v3-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-prime239v3-ec.cert cert.sh: Generate EC Cert Request for Curve-secp112r1 -------------------------- certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp112r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp112r1's EC Cert -------------------------- certutil -A -n Curve-secp112r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp112r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp112r2 -------------------------- certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp112r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp112r2's EC Cert -------------------------- certutil -A -n Curve-secp112r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp112r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp128r1 -------------------------- certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp128r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp128r1's EC Cert -------------------------- certutil -A -n Curve-secp128r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp128r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp128r2 -------------------------- certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp128r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp128r2's EC Cert -------------------------- certutil -A -n Curve-secp128r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp128r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160k1 -------------------------- certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp160k1's EC Cert -------------------------- certutil -A -n Curve-secp160k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp160k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160r1 -------------------------- certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp160r1's EC Cert -------------------------- certutil -A -n Curve-secp160r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp160r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160r2 -------------------------- certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp160r2's EC Cert -------------------------- certutil -A -n Curve-secp160r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp160r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp192k1 -------------------------- certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp192k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp192k1's EC Cert -------------------------- certutil -A -n Curve-secp192k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp192k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp192r1 -------------------------- certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp192r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp192r1's EC Cert -------------------------- certutil -A -n Curve-secp192r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp192r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp224k1 -------------------------- certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp224k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp224k1's EC Cert -------------------------- certutil -A -n Curve-secp224k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp224k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp224r1 -------------------------- certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp224r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp224r1's EC Cert -------------------------- certutil -A -n Curve-secp224r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp224r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp256k1 -------------------------- certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp256k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp256k1's EC Cert -------------------------- certutil -A -n Curve-secp256k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp256k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp256r1 -------------------------- certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp256r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp256r1's EC Cert -------------------------- certutil -A -n Curve-secp256r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp256r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp384r1 -------------------------- certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp384r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp384r1's EC Cert -------------------------- certutil -A -n Curve-secp384r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp384r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp521r1 -------------------------- certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp521r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-secp521r1's EC Cert -------------------------- certutil -A -n Curve-secp521r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-secp521r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect113r1 -------------------------- certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect113r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect113r1's EC Cert -------------------------- certutil -A -n Curve-sect113r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect113r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect113r2 -------------------------- certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect113r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect113r2's EC Cert -------------------------- certutil -A -n Curve-sect113r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect113r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect131r1 -------------------------- certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect131r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect131r1's EC Cert -------------------------- certutil -A -n Curve-sect131r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect131r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect131r2 -------------------------- certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect131r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect131r2's EC Cert -------------------------- certutil -A -n Curve-sect131r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect131r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163k1 -------------------------- certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect163k1's EC Cert -------------------------- certutil -A -n Curve-sect163k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect163k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163r1 -------------------------- certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect163r1's EC Cert -------------------------- certutil -A -n Curve-sect163r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect163r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163r2 -------------------------- certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect163r2's EC Cert -------------------------- certutil -A -n Curve-sect163r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect163r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect193r1 -------------------------- certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect193r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect193r1's EC Cert -------------------------- certutil -A -n Curve-sect193r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect193r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect193r2 -------------------------- certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect193r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect193r2's EC Cert -------------------------- certutil -A -n Curve-sect193r2-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect193r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect233k1 -------------------------- certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect233k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect233k1's EC Cert -------------------------- certutil -A -n Curve-sect233k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect233k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect233r1 -------------------------- certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect233r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect233r1's EC Cert -------------------------- certutil -A -n Curve-sect233r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect233r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect239k1 -------------------------- certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect239k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect239k1's EC Cert -------------------------- certutil -A -n Curve-sect239k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect239k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect283k1 -------------------------- certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect283k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect283k1's EC Cert -------------------------- certutil -A -n Curve-sect283k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect283k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect283r1 -------------------------- certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect283r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect283r1's EC Cert -------------------------- certutil -A -n Curve-sect283r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect283r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect409k1 -------------------------- certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect409k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect409k1's EC Cert -------------------------- certutil -A -n Curve-sect409k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect409k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect409r1 -------------------------- certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect409r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect409r1's EC Cert -------------------------- certutil -A -n Curve-sect409r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect409r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect571k1 -------------------------- certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect571k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect571k1's EC Cert -------------------------- certutil -A -n Curve-sect571k1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect571k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect571r1 -------------------------- certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect571r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw.29173 cert.sh: Import Curve-sect571r1's EC Cert -------------------------- certutil -A -n Curve-sect571r1-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/eccurves -f ../tests.pw.29173 -i Curve-sect571r1-ec.cert cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -i ../CA/root.cert cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -i ../CA/ecroot.cert cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw.29173 cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 -i TestExt.cert cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw.29173 cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 -i TestExt-ec.cert cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -f ../tests.pw.29173 -i TestExt-ecmixed.cert cert.sh SUCCESS: TestExt's mixed EC Cert Created ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 n ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 y ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -2 Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil options: y -1 n ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -2 Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil options: n -1 y ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -3 Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil options: y 12341235123 y ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -3 Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil options: y 3 test.com 214123 y ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -4 Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -4 Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -5 Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil options: 0 1 2 10 n ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -6 Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 y ################################################# certutil -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.29173 -z ../tests_noise.29173 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil options: 1 2 3 4 5 6 10 n cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass -f ../tests.pw.29173 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass -1 -2 -5 -f ../tests.pw.29173 -z ../tests_noise.29173 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass -o root.cert cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass -f ../tests.pw.29173 -@ ../tests.fipspw.29173 Password changed successfully. cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass -f ../tests.fipspw.29173 -z ../tests_noise.29173 Generating key. This may take a few moments... cert.sh SUCCESS: PASSORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/dbpass -f ../tests.fipspw.29173 certutil: certificate is valid cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw.29173 cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser40.cert cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser40-ec.cert cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser40-ecmixed.cert cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw.29173 cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser41.cert cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser41-ec.cert cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser41-ecmixed.cert cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw.29173 cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser42.cert cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser42-ec.cert cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser42-ecmixed.cert cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw.29173 cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser43.cert cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser43-ec.cert cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser43-ecmixed.cert cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw.29173 cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser44.cert cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser44-ec.cert cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser44-ecmixed.cert cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw.29173 cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser45.cert cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser45-ec.cert cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser45-ecmixed.cert cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw.29173 cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser46.cert cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser46-ec.cert cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser46-ecmixed.cert cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw.29173 cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser47.cert cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser47-ec.cert cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser47-ecmixed.cert cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw.29173 cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser48.cert cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser48-ec.cert cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser48-ecmixed.cert cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw.29173 cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser49.cert cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser49-ec.cert cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser49-ecmixed.cert cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw.29173 cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser50.cert cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser50-ec.cert cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser50-ecmixed.cert cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw.29173 cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser51.cert cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser51-ec.cert cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser51-ecmixed.cert cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw.29173 cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser52.cert cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw.29173 cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser52-ec.cert cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -z ../tests_noise.29173 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw.29173 cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client -f ../tests.pw.29173 -i TestUser52-ecmixed.cert cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -G -n TestCA -f ../tests.pw.29173 -o ../server/root.crl_40-42_or cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -G -n TestCA-ec -f ../tests.pw.29173 -o ../server/root.crl_40-42_or-ec cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA -f ../tests.pw.29173 -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA-ec -f ../tests.pw.29173 -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA -f ../tests.pw.29173 -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA-ec -f ../tests.pw.29173 -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA -f ../tests.pw.29173 -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA-ec -f ../tests.pw.29173 -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA -f ../tests.pw.29173 -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA -M -n TestCA-ec -f ../tests.pw.29173 -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw.29173 -d ../server crlutil: could not find TestCA's CRL: security library: bad database. crlutil: could not find the issuer TestCA's CRL: security library: bad database. cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw.29173 -d ../server cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw.29173 -d ../server crlutil: could not find TestCA-ec's CRL: security library: bad database. crlutil: could not find the issuer TestCA-ec's CRL: security library: bad database. cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw.29173 -d ../server cert.sh SUCCESS: SSL CRL prep passed Installing certs for dochinups.red.iplanet.com:443: /iopr cert.sh: Initializing DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -f ../tests.pw.29173 cert.sh: Loading root cert module to Cert DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. Bad server certificate: -8164, This certificate is not valid. subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable Bad server certificate: -8164, This certificate is not valid. subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable Importing p12 /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/TestCA.p12 to DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -------------------------- pk12util -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/TestCA.p12 -k ../tests.pw.29173 -W iopr pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Modifying trust for cert TestCA at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -------------------------- certutil -M -n TestCA -t TC,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com cert.sh: Exporting Root CA cert(ws: dochinups.red.iplanet.com) -------------------------- certutil -L -n TestCA -r -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -o /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/TestCA.cert cert.sh: Initializing DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -f ../tests.pw.29173 cert.sh: Loading root cert module to Cert DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Importing cert server-client-CA with trust TC,C,C to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n server-client-CA -t TC,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/TestCA.cert cert.sh: Generate Cert Request for aquash.red.iplanet.com (ws: dochinups.red.iplanet.com) -------------------------- certutil -s "CN=aquash.red.iplanet.com, E=aquash.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -f ../tests.pw.29173 -z ../tests_noise.29173 -o /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com/req Generating key. This may take a few moments... cert.sh: Sign aquash.red.iplanet.com's Request (ws: dochinups.red.iplanet.com) -------------------------- certutil -C -c TestCA -m %s -v 60 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com/req -o /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/aquash.red.iplanet.com.cert -f ../tests.pw.29173 cert.sh: Importing cert aquash.red.iplanet.com with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n aquash.red.iplanet.com -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/aquash.red.iplanet.com.cert subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing crl /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com/TestCA.crl to DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -------------------------- crlutil -q -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com -I -n TestCA -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_ssl_iopr_dochinups.red.iplanet.com/TestCA.crl cert.sh: Initializing DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -f ../tests.pw.29173 cert.sh: Loading root cert module to Cert DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Importing cert server-client-CA with trust TC,C,C to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n server-client-CA -t TC,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/TestCA.cert cert.sh: Initializing DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -N -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -f ../tests.pw.29173 cert.sh: Loading root cert module to Cert DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- modutil -add RootCerts -libfile /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: Importing cert server-client-CA with trust TC,C,C to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n server-client-CA -t TC,C,C -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/CA_iopr_dochinups.red.iplanet.com/TestCA.cert subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable Importing p12 /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com/TestUser510-rsa.p12 to DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- pk12util -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com/TestUser510-rsa.p12 -k ../tests.pw.29173 -W iopr pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Modifying trust for cert TestUser510-rsa at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -M -n TestUser510-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable Importing p12 /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com/TestUser512-rsa.p12 to DB at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- pk12util -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com/TestUser512-rsa.p12 -k ../tests.pw.29173 -W iopr pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Modifying trust for cert TestUser512-rsa at /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com -------------------------- certutil -M -n TestUser512-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ssl_iopr_dochinups.red.iplanet.com subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspTrustedResponder-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspTrustedResponder-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspTrustedResponder-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspTRTestUser514-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspTRTestUser514-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspTRTestUser514-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspTRTestUser516-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspTRTestUser516-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspTRTestUser516-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspRCATestUser518-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspRCATestUser518-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspRCATestUser518-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspRCATestUser520-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspRCATestUser520-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspRCATestUser520-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspDRTestUser522-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspDRTestUser522-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspDRTestUser522-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspDRTestUser524-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspDRTestUser524-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspDRTestUser524-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspDRCATestUser540-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspDRCATestUser540-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspDRCATestUser540-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspDRCATestUser541-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspDRCATestUser541-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspDRCATestUser541-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspTRUnknownIssuerCert-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspTRUnknownIssuerCert-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspTRUnknownIssuerCert-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspRCAUnknownIssuerCert-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspRCAUnknownIssuerCert-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspRCAUnknownIssuerCert-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspDRUnknownIssuerCert-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspDRUnknownIssuerCert-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspDRUnknownIssuerCert-rsa.crt subject DN: CN=dochinups.red.iplanet.com,E=dochinups.red.iplanet.com-rsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS IOPR Test CA 3684,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable cert.sh: Importing cert ocspDRCAUnknownIssuerCert-rsa with trust ,, to /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -------------------------- certutil -A -n ocspDRCAUnknownIssuerCert-rsa -t ,, -f ../tests.pw.29173 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -i /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com/ocspDRCAUnknownIssuerCert-rsa.crt cert.sh cert.sh: finished cert.sh memleak.sh: DBX found: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx memleak.sh: Memory leak checking - server =============================== memleak.sh: BYPASS is OFF FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running server-32-libfreebl_3-NORMAL PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C A aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C B aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C C aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C D aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C E aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C F aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C001 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C002 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C003 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C004 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C005 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C006 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C007 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C008 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C009 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C00A aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C010 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C011 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C012 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C013 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C014 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C c aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C d aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C e aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C f aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C g aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C i aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C j aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C k aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C l aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C m aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C n aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C v aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C y aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C z aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 2984) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 215 total size: 18920 bytes) Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_FindTrustForCertificate() at 0xc0586364 [11] nssTrustDomain_FindTrustForCertificate() at 0xc057c9be [12] fill_CERTCertificateFields() at 0xc058201d [13] STAN_GetCERTCertificate() at 0xc0582479 [14] convert_cert() at 0xc052e977 [15] nssPKIObjectCollection_Traverse() at 0xc058035b [16] NSSTrustDomain_TraverseCertificates() at 0xc057c853 Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_TraverseCertificates() at 0xc0586e9f [11] NSSTrustDomain_TraverseCertificates() at 0xc057c80a [12] PK11_TraverseSlotCerts() at 0xc052f311 [13] CERT_GetSSLCACerts() at 0xc051ab68 [14] serverCAListSetup() at 0xc2d1e4a3 [15] PR_CallOnceWithArg() at 0xbc91ac50 [16] SSL_ConfigSecureServer() at 0xc2d1e7e1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8177530 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 34 total size: 2552 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (32.60% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 512 bytes at address 0x8085a78 (20.06% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x80581a1 Block in use (biu): Found 8 blocks totaling 192 bytes (7.52% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 128 bytes at address 0x8085fb0 (5.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 104 bytes at address 0x8086d00 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 104 bytes at address 0x813ebc8 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8181488 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8085f40 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8086fc0 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitSymWrapKeysLock() at 0xc2d0d35e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21717 [7] main() at 0x8058951 Block in use (biu): Found block of size 88 bytes at address 0x8086c60 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8086f50 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitClientSessionCacheLock() at 0xc2d1cd2e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21712 [7] main() at 0x8058951 Block in use (biu): Found block of size 88 bytes at address 0x813f9a8 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x8058ce9 Block in use (biu): Found block of size 32 bytes at address 0x80865c8 (1.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 24 bytes at address 0x813eb98 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 24 bytes at address 0x8086cd0 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 20 bytes at address 0x8142128 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] pr_LoadLibraryByPathname() at 0xbc91147b [4] PR_LoadLibraryWithFlags() at 0xbc911332 [5] 0xaed2f7d9 [6] PR_CallOnce() at 0xbc91a9b3 [7] 0xaed30fe3 [8] 0xaed1109f [9] 0xaed11372 [10] SECMOD_LoadPKCS11Module() at 0xc05376ed [11] SECMOD_LoadModule() at 0xc054473b [12] SECMOD_LoadModule() at 0xc0544792 [13] nss_Init() at 0xc051204f [14] NSS_Initialize() at 0xc0512341 [15] main() at 0x8058ce9 Block in use (biu): Found block of size 20 bytes at address 0x8086a40 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitLinker() at 0xbc910f9c [4] PR_Init() at 0xbc91a129 [5] main() at 0x80581a1 Block in use (biu): Found block of size 14 bytes at address 0x8144990 (0.55% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] pr_LoadLibraryByPathname() at 0xbc9114d6 [3] PR_LoadLibraryWithFlags() at 0xbc911332 [4] 0xaed2f7d9 [5] PR_CallOnce() at 0xbc91a9b3 [6] 0xaed30fe3 [7] 0xaed1109f [8] 0xaed11372 [9] SECMOD_LoadPKCS11Module() at 0xc05376ed [10] SECMOD_LoadModule() at 0xc054473b [11] SECMOD_LoadModule() at 0xc0544792 [12] nss_Init() at 0xc051204f [13] NSS_Initialize() at 0xc0512341 [14] main() at 0x8058ce9 Block in use (biu): Found block of size 12 bytes at address 0x8084a78 (0.47% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PR_ErrorInstallTable() at 0xbc919b9b [3] nspr_InitializePRErrorTable() at 0xbc9197af [4] PR_Init() at 0xbc91a15c [5] main() at 0x80581a1 Block in use (biu): Found block of size 6 bytes at address 0x80853f8 (0.24% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] _PR_InitLinker() at 0xbc910fb1 [3] PR_Init() at 0xbc91a129 [4] main() at 0x80581a1 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_3-NORMAL produced a returncode of 1, expected is 0 FAILED memleak.sh: BYPASS is ON FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running server-32-libfreebl_3-BYPASS PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C A aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C B aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C C aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C D aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C E aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C F aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C001 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C002 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C003 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C004 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C005 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C006 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C007 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C008 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C009 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C00A aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C010 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C011 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C012 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C013 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C :C014 aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C c aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C d aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C e aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C f aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C g aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C i aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C j aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C k aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C l aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C m aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C n aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C v aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C y aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C z aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -B -s -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 18683) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 215 total size: 18920 bytes) Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_FindTrustForCertificate() at 0xc0586364 [11] nssTrustDomain_FindTrustForCertificate() at 0xc057c9be [12] fill_CERTCertificateFields() at 0xc058201d [13] STAN_GetCERTCertificate() at 0xc0582479 [14] convert_cert() at 0xc052e977 [15] nssPKIObjectCollection_Traverse() at 0xc058035b [16] NSSTrustDomain_TraverseCertificates() at 0xc057c853 Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_TraverseCertificates() at 0xc0586e9f [11] NSSTrustDomain_TraverseCertificates() at 0xc057c80a [12] PK11_TraverseSlotCerts() at 0xc052f311 [13] CERT_GetSSLCACerts() at 0xc051ab68 [14] serverCAListSetup() at 0xc2d1e4a3 [15] PR_CallOnceWithArg() at 0xbc91ac50 [16] SSL_ConfigSecureServer() at 0xc2d1e7e1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8177530 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 34 total size: 2552 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (32.60% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 512 bytes at address 0x8085a78 (20.06% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x80581a1 Block in use (biu): Found 8 blocks totaling 192 bytes (7.52% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 128 bytes at address 0x8085fb0 (5.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 104 bytes at address 0x813ebc8 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 104 bytes at address 0x8086d00 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8086c60 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8085f40 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x813f9a8 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086fc0 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitSymWrapKeysLock() at 0xc2d0d35e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21717 [7] main() at 0x8058951 Block in use (biu): Found block of size 88 bytes at address 0x8181488 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086f50 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitClientSessionCacheLock() at 0xc2d1cd2e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21712 [7] main() at 0x8058951 Block in use (biu): Found block of size 32 bytes at address 0x80865c8 (1.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 24 bytes at address 0x813eb98 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 24 bytes at address 0x8086cd0 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 20 bytes at address 0x8142128 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] pr_LoadLibraryByPathname() at 0xbc91147b [4] PR_LoadLibraryWithFlags() at 0xbc911332 [5] 0xaed2f7d9 [6] PR_CallOnce() at 0xbc91a9b3 [7] 0xaed30fe3 [8] 0xaed1109f [9] 0xaed11372 [10] SECMOD_LoadPKCS11Module() at 0xc05376ed [11] SECMOD_LoadModule() at 0xc054473b [12] SECMOD_LoadModule() at 0xc0544792 [13] nss_Init() at 0xc051204f [14] NSS_Initialize() at 0xc0512341 [15] main() at 0x8058ce9 Block in use (biu): Found block of size 20 bytes at address 0x8086a40 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitLinker() at 0xbc910f9c [4] PR_Init() at 0xbc91a129 [5] main() at 0x80581a1 Block in use (biu): Found block of size 14 bytes at address 0x8144990 (0.55% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] pr_LoadLibraryByPathname() at 0xbc9114d6 [3] PR_LoadLibraryWithFlags() at 0xbc911332 [4] 0xaed2f7d9 [5] PR_CallOnce() at 0xbc91a9b3 [6] 0xaed30fe3 [7] 0xaed1109f [8] 0xaed11372 [9] SECMOD_LoadPKCS11Module() at 0xc05376ed [10] SECMOD_LoadModule() at 0xc054473b [11] SECMOD_LoadModule() at 0xc0544792 [12] nss_Init() at 0xc051204f [13] NSS_Initialize() at 0xc0512341 [14] main() at 0x8058ce9 Block in use (biu): Found block of size 12 bytes at address 0x8084a78 (0.47% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PR_ErrorInstallTable() at 0xbc919b9b [3] nspr_InitializePRErrorTable() at 0xbc9197af [4] PR_Init() at 0xbc91a15c [5] main() at 0x80581a1 Block in use (biu): Found block of size 6 bytes at address 0x80853f8 (0.24% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] _PR_InitLinker() at 0xbc910fb1 [3] PR_Init() at 0xbc91a129 [4] main() at 0x80581a1 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_3-BYPASS produced a returncode of 1, expected is 0 FAILED memleak.sh: BYPASS is OFF FIPS mode enabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is ON Running server-32-libfreebl_3-FIPS PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/selfserv memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C c aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C d aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C e aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C i aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C j aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C k aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C n aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C v aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C y aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1000 -C z aquash.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 4406) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 184 total size: 16192 bytes) Memory Leak (mel): Found 107 leaked blocks with total size 9416 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_TraverseCertificates() at 0xc0586e9f [11] NSSTrustDomain_TraverseCertificates() at 0xc057c80a [12] PK11_TraverseSlotCerts() at 0xc052f311 [13] CERT_GetSSLCACerts() at 0xc051ab68 [14] serverCAListSetup() at 0xc2d1e4a3 [15] PR_CallOnceWithArg() at 0xbc91ac50 [16] SSL_ConfigSecureServer() at 0xc2d1e7e1 Memory Leak (mel): Found 76 leaked blocks with total size 6688 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] nssToken_FindTrustForCertificate() at 0xc0586364 [11] nssTrustDomain_FindTrustForCertificate() at 0xc057c9be [12] fill_CERTCertificateFields() at 0xc058201d [13] STAN_GetCERTCertificate() at 0xc0582479 [14] convert_cert() at 0xc052e977 [15] nssPKIObjectCollection_Traverse() at 0xc058035b [16] NSSTrustDomain_TraverseCertificates() at 0xc057c853 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8166990 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 34 total size: 2552 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (32.60% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 512 bytes at address 0x8085a78 (20.06% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x80581a1 Block in use (biu): Found 8 blocks totaling 192 bytes (7.52% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x80581a1 Block in use (biu): Found block of size 128 bytes at address 0x8085fb0 (5.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 104 bytes at address 0x813ebc8 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 104 bytes at address 0x8086d00 (4.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8086c60 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x8085f40 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 88 bytes at address 0x813f9a8 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086fc0 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitSymWrapKeysLock() at 0xc2d0d35e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21717 [7] main() at 0x8058951 Block in use (biu): Found block of size 88 bytes at address 0x816f648 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x8058ce9 Block in use (biu): Found block of size 88 bytes at address 0x8086f50 (3.45% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_InitClientSessionCacheLock() at 0xc2d1cd2e [6] SSL_ConfigServerSessionIDCache() at 0xc2d21712 [7] main() at 0x8058951 Block in use (biu): Found block of size 32 bytes at address 0x80865c8 (1.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x80581a1 Block in use (biu): Found block of size 24 bytes at address 0x813eb98 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x8058ce9 Block in use (biu): Found block of size 24 bytes at address 0x8086cd0 (0.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x80581a1 Block in use (biu): Found block of size 20 bytes at address 0x8142128 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] pr_LoadLibraryByPathname() at 0xbc91147b [4] PR_LoadLibraryWithFlags() at 0xbc911332 [5] 0xaed2f7d9 [6] PR_CallOnce() at 0xbc91a9b3 [7] 0xaed30fe3 [8] 0xaed1109f [9] 0xaed08088 [10] SECMOD_LoadPKCS11Module() at 0xc05376ed [11] SECMOD_LoadModule() at 0xc054473b [12] SECMOD_LoadModule() at 0xc0544792 [13] nss_Init() at 0xc051204f [14] NSS_Initialize() at 0xc0512341 [15] main() at 0x8058ce9 Block in use (biu): Found block of size 20 bytes at address 0x8086a40 (0.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitLinker() at 0xbc910f9c [4] PR_Init() at 0xbc91a129 [5] main() at 0x80581a1 Block in use (biu): Found block of size 14 bytes at address 0x8144990 (0.55% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] pr_LoadLibraryByPathname() at 0xbc9114d6 [3] PR_LoadLibraryWithFlags() at 0xbc911332 [4] 0xaed2f7d9 [5] PR_CallOnce() at 0xbc91a9b3 [6] 0xaed30fe3 [7] 0xaed1109f [8] 0xaed08088 [9] SECMOD_LoadPKCS11Module() at 0xc05376ed [10] SECMOD_LoadModule() at 0xc054473b [11] SECMOD_LoadModule() at 0xc0544792 [12] nss_Init() at 0xc051204f [13] NSS_Initialize() at 0xc0512341 [14] main() at 0x8058ce9 Block in use (biu): Found block of size 12 bytes at address 0x8084a78 (0.47% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PR_ErrorInstallTable() at 0xbc919b9b [3] nspr_InitializePRErrorTable() at 0xbc9197af [4] PR_Init() at 0xbc91a15c [5] main() at 0x80581a1 Block in use (biu): Found block of size 6 bytes at address 0x80853f8 (0.24% of total) At time of allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] _PR_InitLinker() at 0xbc910fb1 [3] PR_Init() at 0xbc91a129 [4] main() at 0x80581a1 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_3-FIPS produced a returncode of 1, expected is 0 FAILED memleak.sh: Memory leak checking - client =============================== memleak.sh: BYPASS is OFF FIPS mode disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running client-32-libfreebl_3-NORMAL PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C A aquash.red.iplanet.com (process id 20071) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81083c8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C B aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C B aquash.red.iplanet.com (process id 20094) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81083c8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C C aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C C aquash.red.iplanet.com (process id 20117) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8108308 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C D aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C D aquash.red.iplanet.com (process id 20140) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8108308 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C E aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C E aquash.red.iplanet.com (process id 20163) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8108d18 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C F aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C F aquash.red.iplanet.com (process id 20186) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8108688 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C001 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C001 aquash.red.iplanet.com (process id 20209) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C002 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C002 aquash.red.iplanet.com (process id 20232) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C003 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C003 aquash.red.iplanet.com (process id 20255) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C004 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C004 aquash.red.iplanet.com (process id 20278) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C005 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C005 aquash.red.iplanet.com (process id 20301) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C006 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C006 aquash.red.iplanet.com (process id 20324) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C007 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C007 aquash.red.iplanet.com (process id 20347) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C008 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C008 aquash.red.iplanet.com (process id 20370) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C009 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C009 aquash.red.iplanet.com (process id 20393) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C00A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C00A aquash.red.iplanet.com (process id 20416) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8111818 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C010 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C010 aquash.red.iplanet.com (process id 20439) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C011 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C011 aquash.red.iplanet.com (process id 20462) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C012 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C012 aquash.red.iplanet.com (process id 20485) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C013 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C013 aquash.red.iplanet.com (process id 20508) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C014 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C014 aquash.red.iplanet.com (process id 20531) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com (process id 20554) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com (process id 20577) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com (process id 20600) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C f aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C f aquash.red.iplanet.com (process id 20623) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C g aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C g aquash.red.iplanet.com (process id 20646) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com (process id 20669) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com (process id 20692) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com (process id 20715) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C l aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C l aquash.red.iplanet.com (process id 20738) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C m aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C m aquash.red.iplanet.com (process id 20761) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com (process id 20784) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com (process id 20807) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com (process id 20830) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com (process id 20853) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x81118b8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80f0340 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_3-NORMAL produced a returncode of 1, expected is 0 FAILED memleak.sh: BYPASS is ON FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running client-32-libfreebl_3-BYPASS PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C A aquash.red.iplanet.com (process id 27632) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x81079c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C B aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C B aquash.red.iplanet.com (process id 27655) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x81079c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C C aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C C aquash.red.iplanet.com (process id 27678) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8107908 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C D aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C D aquash.red.iplanet.com (process id 27701) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8107908 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C E aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C E aquash.red.iplanet.com (process id 27724) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8108328 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C F aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C F aquash.red.iplanet.com (process id 27747) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8107c48 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C001 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C001 aquash.red.iplanet.com (process id 27770) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C002 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C002 aquash.red.iplanet.com (process id 27793) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C003 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C003 aquash.red.iplanet.com (process id 27816) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C004 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C004 aquash.red.iplanet.com (process id 27839) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C005 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C005 aquash.red.iplanet.com (process id 27862) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C006 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C006 aquash.red.iplanet.com (process id 27885) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C007 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C007 aquash.red.iplanet.com (process id 27908) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C008 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C008 aquash.red.iplanet.com (process id 27931) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C009 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C009 aquash.red.iplanet.com (process id 27954) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C00A aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C00A aquash.red.iplanet.com (process id 27977) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110e80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C010 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C010 aquash.red.iplanet.com (process id 28000) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C011 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C011 aquash.red.iplanet.com (process id 28023) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C012 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C012 aquash.red.iplanet.com (process id 28046) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C013 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C013 aquash.red.iplanet.com (process id 28069) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C014 aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C :C014 aquash.red.iplanet.com (process id 28092) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com (process id 28115) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com (process id 28138) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com (process id 28161) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C f aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C f aquash.red.iplanet.com (process id 28184) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C g aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C g aquash.red.iplanet.com (process id 28208) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com (process id 28231) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com (process id 28254) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com (process id 28277) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C l aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C l aquash.red.iplanet.com (process id 28300) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C m aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C m aquash.red.iplanet.com (process id 28323) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com (process id 28346) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com (process id 28369) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com (process id 28392) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com (process id 28415) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 1000 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80bd810 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8110f30 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80c7798 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80bd3e8 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80c8e20 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80c8de0 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 0 memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=aquash.red.iplanet.com,E=aquash.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_3-BYPASS produced a returncode of 1, expected is 0 FAILED memleak.sh: BYPASS is OFF FIPS mode already disabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is ON Running client-32-libfreebl_3-FIPS PATH=.:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin:/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/opt/sfw/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin:/usr/ucb:/usr/ccs/bin LD_LIBRARY_PATH=/export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/server_memleak -n aquash.red.iplanet.com -e aquash.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C c aquash.red.iplanet.com (process id 5233) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acca8 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80b5990 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80de508 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80fe248 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b7018 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6fd8 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C d aquash.red.iplanet.com (process id 5256) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C e aquash.red.iplanet.com (process id 5279) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C i aquash.red.iplanet.com (process id 5302) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C j aquash.red.iplanet.com (process id 5325) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acca0 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5988 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe248 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de508 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b7018 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6fd8 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C k aquash.red.iplanet.com (process id 5348) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C n aquash.red.iplanet.com (process id 5371) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C v aquash.red.iplanet.com (process id 5394) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C y aquash.red.iplanet.com (process id 5417) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acc78 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5960 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80fe200 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x80de4c0 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b6fd0 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6f90 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/strsclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8443 -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss -c 1001 -C z aquash.red.iplanet.com (process id 5440) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 109 total size: 7216 bytes) Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 2376 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Object_Alloc() at 0xc05fc32d [5] PKIX_Error_Create() at 0xc05c5dd8 [6] pkix_Throw() at 0xc05c29a5 [7] PKIX_DoReturn() at 0xc05cff62 [8] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [9] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] PKIX_PL_Cert_VerifySignature() at 0xc05e0dcf [8] pkix_Build_VerifyCertificate() at 0xc05ba7d8 [9] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [10] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [11] PKIX_BuildChain() at 0xc05c2516 [12] cert_VerifyCertChainPkix() at 0xc05218b7 [13] CERT_VerifyCert() at 0xc051d95e [14] CERT_VerifyCertNow() at 0xc051de3f [15] SSL_AuthCertificate() at 0xc2d16685 [16] mySSLAuthCertificate() at 0x8054d22 Memory Leak (mel): Found 27 leaked blocks with total size 1188 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbc9124cc [2] PKIX_PL_Malloc() at 0xc05fadcb [3] PKIX_PL_Object_Alloc() at 0xc05fc2c2 [4] PKIX_Error_Create() at 0xc05c5dd8 [5] pkix_Throw() at 0xc05c29a5 [6] PKIX_DoReturn() at 0xc05cff62 [7] pkix_Build_VerifyCertificate() at 0xc05ba8e3 [8] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [9] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [10] PKIX_BuildChain() at 0xc05c2516 [11] cert_VerifyCertChainPkix() at 0xc05218b7 [12] CERT_VerifyCert() at 0xc051d95e [13] CERT_VerifyCertNow() at 0xc051de3f [14] SSL_AuthCertificate() at 0xc2d16685 [15] mySSLAuthCertificate() at 0x8054d22 [16] ssl3_HandleCertificate() at 0xc2d12a11 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80acca0 At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] 0xa7515d79 [5] 0xa75155f4 [6] 0xa7515fb0 [7] 0xa7514e09 [8] 0xa750e7a8 [9] 0xa75070ef [10] pk11_FindObjectByTemplate() at 0xc0541444 [11] PK11_InitSlot() at 0xc0550308 [12] SECMOD_LoadPKCS11Module() at 0xc0537897 [13] SECMOD_LoadModule() at 0xc054473b [14] SECMOD_LoadModule() at 0xc0544792 [15] nss_Init() at 0xc051204f [16] NSS_Initialize() at 0xc0512341 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 83 total size: 3379 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (24.62% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 512 bytes at address 0x8083998 (15.15% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] _PR_InitTPD() at 0xbc910caf [4] PR_Init() at 0xbc91a0e1 [5] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 448 bytes (13.26% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba120900 [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 8 blocks totaling 192 bytes (5.68% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242dd [4] ExpandMonitorCache() at 0xbc9104bf [5] _PR_InitCMon() at 0xbc910723 [6] PR_Init() at 0xbc91a115 [7] main() at 0x8057df4 Block in use (biu): Found block of size 128 bytes at address 0x8083ed0 (3.79% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910488 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084c20 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] _PR_UnixInit() at 0xbc92d7cc [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 104 bytes at address 0x8084e70 (3.08% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewMonitor() at 0xbc9242ef [4] OCSP_InitGlobal() at 0xc0514bab [5] nss_Init() at 0xc0511d92 [6] NSS_Initialize() at 0xc0512341 [7] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x8084b80 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_UnixInit() at 0xbc92d7c1 [5] PR_Init() at 0xbc91a166 [6] main() at 0x8057df4 Block in use (biu): Found block of size 88 bytes at address 0x80b5988 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] PKIX_PL_Initialize() at 0xc0604a95 [5] PKIX_Initialize() at 0xc05b7bf8 [6] nss_Init() at 0xc051216f [7] NSS_Initialize() at 0xc0512341 [8] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80fe248 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] nss_InitLock() at 0xc056e6ea [5] CERT_LockCertTrust() at 0xc055ca86 [6] CERT_GetCertTrust() at 0xc05653b6 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0xc061ebaa [8] PKIX_PL_Cert_IsCertTrusted() at 0xc05e1a5f [9] pkix_Build_VerifyCertificate() at 0xc05ba36c [10] pkix_BuildForwardDepthFirstSearch() at 0xc05bd222 [11] pkix_Build_InitiateBuildChain() at 0xc05c19f1 [12] PKIX_BuildChain() at 0xc05c2516 [13] cert_VerifyCertChainPkix() at 0xc05218b7 [14] CERT_VerifyCert() at 0xc051d95e [15] CERT_VerifyCertNow() at 0xc051de3f [16] SSL_AuthCertificate() at 0xc2d16685 Block in use (biu): Found block of size 88 bytes at address 0x8085c50 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] InitializeArenas() at 0xbdd00a60 [5] PR_CallOnce() at 0xbc91a9b3 [6] PL_ArenaAllocate() at 0xbdd00b29 [7] PORT_ArenaAlloc() at 0xc057690c [8] secmod_NewModule() at 0xc0543b60 [9] SECMOD_CreateModule() at 0xc0543c0c [10] SECMOD_LoadModule() at 0xc05446d9 [11] nss_Init() at 0xc051204f [12] NSS_Initialize() at 0xc0512341 [13] main() at 0x805822c Block in use (biu): Found block of size 88 bytes at address 0x80de508 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] __nss_InitLock() at 0xc056e672 [5] ssl_LookupSID() at 0xc2d1ce57 [6] ssl2_BeginClientHandshake() at 0xc2d1a352 [7] ssl_Do1stHandshake() at 0xc2d1d67f [8] ssl_SecureSend() at 0xc2d1f6fd [9] ssl_Send() at 0xc2d24b84 [10] PR_Send() at 0xbc90a66a [11] do_connects() at 0x8056632 [12] thread_wrapper() at 0x805515c [13] _pt_root() at 0xbc92b341 [14] _thr_setup() at 0xbb514513 [15] _lwp_start() at 0xbb514790 Block in use (biu): Found block of size 88 bytes at address 0x8083e60 (2.60% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] PR_NewLock() at 0xbc923bc1 [4] _PR_InitCMon() at 0xbc910714 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 Block in use (biu): Found 7 blocks totaling 78 bytes (2.31% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120c25 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 64 bytes at address 0x80b7018 (1.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] fgetnetconfig() at 0xba120b4e [3] getnetlist() at 0xba1208ec [4] setnetconfig() at 0xba11452d [5] __rpc_getconfip() at 0xba14806f [6] getipnodebyname() at 0xba12fd05 [7] get_addr() at 0xb8d04484 [8] getaddrinfo() at 0xb8d0416e [9] PR_GetAddrInfoByName() at 0xbc91c2a1 [10] client_main() at 0x80571c5 [11] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 48 bytes (1.42% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120bf3 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found 7 blocks totaling 43 bytes (1.27% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] gettoken() at 0xba120e16 [3] fgetnetconfig() at 0xba120b1e [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 36 bytes at address 0x80b6fd8 (1.07% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xba1208cb [2] setnetconfig() at 0xba11452d [3] __rpc_getconfip() at 0xba14806f [4] getipnodebyname() at 0xba12fd05 [5] get_addr() at 0xb8d04484 [6] getaddrinfo() at 0xb8d0416e [7] PR_GetAddrInfoByName() at 0xbc91c2a1 [8] client_main() at 0x80571c5 [9] main() at 0x80582e9 Block in use (biu): Found 3 blocks totaling 33 bytes (0.98% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb514b313 [2] getlookups() at 0xba12107f [3] fgetnetconfig() at 0xba120c61 [4] getnetlist() at 0xba120900 [5] setnetconfig() at 0xba11452d [6] __rpc_getconfip() at 0xba14806f [7] getipnodebyname() at 0xba12fd05 [8] get_addr() at 0xb8d04484 [9] getaddrinfo() at 0xb8d0416e [10] PR_GetAddrInfoByName() at 0xbc91c2a1 [11] client_main() at 0x80571c5 [12] main() at 0x80582e9 Block in use (biu): Found block of size 32 bytes at address 0x80844e8 (0.95% of total) At time of allocation, the call stack was: [1] calloc() at 0xb51308a0 [2] PR_Calloc() at 0xbc91253e [3] ExpandMonitorCache() at 0xbc910613 [4] _PR_InitCMon() at 0xbc910723 [5] PR_Init() at 0xbc91a115 [6] main() at 0x8057df4 execution completed, exit code is 1 memleak.sh: -------- Stopping server: tstclnt -p 8443 -h aquash.red.iplanet.com -c j -f -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_memleak -w nss < /export/tinderbox/SunOS_5.9/mozilla/security/nss/tests/memleak/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: write to SSL socket failed: This certificate is not valid. memleak.sh: client-32-libfreebl_3-FIPS produced a returncode of 1, expected is 0 FAILED memleak.sh: Memory leak checking - IOPR =============================== Testing ocsp interoperability. Client: local(tstclnt). Responder: remote(dochinups.red.iplanet.com) memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser518-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser518-rsa (process id 21330) RTC: Enabling Error Checking... RTC: Running program... 1191354219654493: EAF0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB00: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB10: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB20: 3A 32 35 36 31 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2561..Content-T EB30: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB40: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB50: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EB60: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EB70: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EB80: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EB90: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBA0: E2 73 2E 77 AB 0A D6 02 02 02 06 A2 1E 30 1C 30 .s.w.........0.0 EBB0: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EBC0: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354219657931: EBE8: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EBF8: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC08: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC18: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC28: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC38: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC48: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 30 35 tent-Length: 105 EC58: 36 0D 0A 0D 0A 6.... 1191354219658519: 6B98: 30 82 04 1C 0A 01 00 A0 82 04 15 30 82 04 11 06 0..........0.... 6BA8: 09 2B 06 01 05 05 07 30 01 01 04 82 04 02 30 82 .+.....0......0. 6BB8: 03 FE 30 81 EA A1 70 30 6E 31 0B 30 09 06 03 55 ..0...p0n1.0...U 6BC8: 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 ....US1.0...U... 6BD8: 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 .California1.0.. 6BE8: 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 .U....Mountain V 6BF8: 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F iew1.0...U....BO 6C08: 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 GUS NSS1.0...U.. 6C18: 13 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 ..NSS IOPR Test 6C28: 43 41 20 33 36 38 34 18 0F 32 30 30 37 31 30 30 CA 3684..2007100 6C38: 32 31 39 34 33 33 39 5A 30 65 30 63 30 3B 30 09 2194339Z0e0c0;0. 6C48: 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF ..+.........*.H. 6C58: 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 q.......5.d;.... 6C68: 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 ...>0.....l....s 6C78: 2E 77 AB 0A D6 02 02 02 06 80 00 18 0F 32 30 30 .w...........200 6C88: 37 30 31 31 31 31 36 35 39 33 33 5A A0 11 18 0F 70111165933Z.... 6C98: 32 30 30 37 31 30 30 32 31 39 34 38 33 39 5A 30 20071002194839Z0 6CA8: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H.......... 6CB8: 81 00 39 3E FE B1 2E 82 EC 99 8A 06 E6 69 E5 E2 ..9>.........i.. 6CC8: EB B3 84 D4 84 16 09 EA EA C3 13 F3 A0 84 91 9C ................ 6CD8: A7 97 82 73 20 95 47 DD 4D 4E F4 6C 4B 59 80 08 ...s .G.MN.lKY.. 6CE8: 65 D9 4F 62 2C A0 32 A5 10 FC 6C 45 EE 75 65 35 e.Ob,.2...lE.ue5 6CF8: 90 18 71 88 E5 F0 13 02 E2 A0 5C 09 03 C8 FB 9F ..q.......\..... 6D08: 79 C9 A5 2C 2D F5 09 C3 6E C7 4D 75 B0 2E C9 B5 y..,-...n.Mu.... 6D18: EE C2 A6 C6 D4 82 3B 6C 25 43 83 43 2A 81 FD E3 ......;l%C.C*... 6D28: 85 A3 16 85 3B BB F4 6D DE 33 EC 4D 42 C6 8C 77 ....;..m.3.MB..w 6D38: 9A 32 A0 82 02 7A 30 82 02 76 30 82 02 72 30 82 .2...z0..v0..r0. 6D48: 01 DB A0 03 02 01 02 02 02 27 10 30 0D 06 09 2A .........'.0...* 6D58: 86 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 09 .H........0n1.0. 6D68: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 6D78: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 6D88: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 6D98: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 6DA8: 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 .BOGUS NSS1.0... 6DB8: 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 65 U....NSS IOPR Te 6DC8: 73 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 36 st CA 36840 ..06 6DD8: 31 30 31 39 32 30 31 33 33 39 5A 18 0F 32 30 35 1019201339Z..205 6DE8: 36 31 30 31 39 32 30 31 33 33 39 5A 30 6E 31 0B 61019201339Z0n1. 6DF8: 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 0...U....US1.0.. 6E08: 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 .U....California 6E18: 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 1.0...U....Mount 6E28: 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 ain View1.0...U. 6E38: 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C ...BOGUS NSS1.0. 6E48: 06 03 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 ..U....NSS IOPR 6E58: 54 65 73 74 20 43 41 20 33 36 38 34 30 81 9F 30 Test CA 36840..0 6E68: 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 ...*.H.......... 6E78: 8D 00 30 81 89 02 81 81 00 BA 53 DF A7 E2 BD A4 ..0.......S..... 6E88: E4 D8 93 C9 19 22 C4 37 CE A5 14 3E 26 35 29 B5 .....".7...>&5). 6E98: 37 DA C5 27 11 FF 48 90 BC 14 E4 E5 43 95 77 B5 7..'..H.....C.w. 6EA8: 93 15 4A 16 1D E5 38 98 44 B4 71 AF 2A 7A B9 B6 ..J...8.D.q.*z.. 6EB8: 63 A6 AD 0E EA 47 A3 84 6E F7 2D 9C 04 C6 65 76 c....G..n.-...ev 6EC8: 93 DC 15 44 F7 15 E1 EA 0C D1 FE DB AF 50 FA 8F ...D.........P.. 6ED8: 19 02 92 3C 06 3C C3 17 59 1E 09 FC 3E EC 77 49 ...<.<..Y...>.wI 6EE8: 9F 0F E7 1C 03 65 3B F1 6F 5D 4E 5F CF 45 C7 48 .....e;.o]N_.E.H 6EF8: C3 AA 8D 15 8A E6 8D B0 4B 02 03 01 00 01 A3 1D ........K....... 6F08: 30 1B 30 0C 06 03 55 1D 13 04 05 30 03 01 01 FF 0.0...U....0.... 6F18: 30 0B 06 03 55 1D 0F 04 04 03 02 01 06 30 0D 06 0...U........0.. 6F28: 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 00 .*.H............ 6F38: 24 CA FC 23 C8 72 6D D7 59 0B FF C9 13 7C 63 59 $..#.rm.Y....|cY 6F48: B0 A6 C0 D9 C3 AF 02 ED 01 A6 E4 CC CA 1A CE 62 ...............b 6F58: E1 73 68 8B E5 8F 35 87 CB F3 59 EE 85 A9 0F 53 .sh...5...Y....S 6F68: 63 12 99 B4 4A CA B8 7A 2F 29 93 93 0C 85 77 5B c...J..z/)....w[ 6F78: 9C 3B 2B 18 C1 20 37 F0 9F BD C8 1A E4 82 89 5E .;+.. 7........^ 6F88: 50 A7 E5 16 3E 73 C7 58 F7 97 FA 97 4B FE 2B F6 P...>s.X....K.+. 6F98: 16 A5 51 B8 C7 AD 82 4E 80 61 D4 FB AF E3 1B 8F ..Q....N.a...... 6FA8: 98 DE D1 4D 7A 39 C6 94 63 CA E3 1B D0 99 AE F3 ...Mz9..c....... Check of certificate "ocspRCATestUser518-rsa" succeeded. Checking for memory leaks... Actual leaks report (actual leaks: 3 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 81 total size: 3203 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.98% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.99% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.99% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (4.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found 7 blocks totaling 78 bytes (2.44% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef638 (2.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.50% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.34% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81f59b8 (1.12% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.03% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (1.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 3 blocks totaling 24 bytes (0.75% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xbc921005 [2] fgetnetconfig() at 0xbc920c61 [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found block of size 24 bytes at address 0x81d2bb8 (0.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser520-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspRCATestUser520-rsa (process id 21353) RTC: Enabling Error Checking... RTC: Running program... 1191354220218122: EB38: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB48: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB58: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB68: 3A 32 35 36 31 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2561..Content-T EB78: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB88: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB98: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EBA8: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EBB8: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EBC8: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EBD8: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 08 A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354220221590: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 30 37 tent-Length: 107 ECA0: 33 0D 0A 0D 0A 3.... 1191354220222182: 8C48: 30 82 04 2D 0A 01 00 A0 82 04 26 30 82 04 22 06 0..-......&0..". 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 13 30 82 .+.....0......0. 8C68: 04 0F 30 81 FB A1 70 30 6E 31 0B 30 09 06 03 55 ..0...p0n1.0...U 8C78: 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 ....US1.0...U... 8C88: 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 .California1.0.. 8C98: 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 .U....Mountain V 8CA8: 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F iew1.0...U....BO 8CB8: 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 GUS NSS1.0...U.. 8CC8: 13 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 ..NSS IOPR Test 8CD8: 43 41 20 33 36 38 34 18 0F 32 30 30 37 31 30 30 CA 3684..2007100 8CE8: 32 31 39 34 33 34 30 5A 30 76 30 74 30 3B 30 09 2194340Z0v0t0;0. 8CF8: 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF ..+.........*.H. 8D08: 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 q.......5.d;.... 8D18: 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 ...>0.....l....s 8D28: 2E 77 AB 0A D6 02 02 02 08 A1 11 18 0F 32 30 30 .w...........200 8D38: 37 30 31 31 31 31 36 35 39 33 33 5A 18 0F 32 30 70111165933Z..20 8D48: 30 37 30 31 31 31 31 36 35 39 33 33 5A A0 11 18 070111165933Z... 8D58: 0F 32 30 30 37 31 30 30 32 31 39 34 38 34 30 5A .20071002194840Z 8D68: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 0...*.H......... 8D78: 81 81 00 20 6F F2 24 5F 7F A6 B3 B6 F9 52 B6 92 ... o.$_.....R.. 8D88: 78 90 3A 9C DC B1 F2 E5 CF 07 53 A1 15 F9 DC C7 x.:.......S..... 8D98: 6B C0 94 40 F7 F8 98 3D EC E4 9C 83 49 ED 56 05 k..@...=....I.V. 8DA8: D2 91 16 33 61 68 C7 DD D6 03 AC 67 30 6B BE DE ...3ah.....g0k.. 8DB8: 8C F3 0A ED 1F 9F 7D EA 37 41 B2 13 ED 63 DD 16 ......}.7A...c.. 8DC8: 6A 87 55 77 14 C4 FB C9 16 2D EB BA 59 41 57 42 j.Uw.....-..YAWB 8DD8: 3D BF D7 76 7D 40 EC 21 BE 03 74 A9 AE 9D EB 2B =..v}@.!..t....+ 8DE8: 9E AA 1B F8 C3 8C 45 94 91 B8 44 E7 29 07 60 6D ......E...D.).`m 8DF8: 28 B8 DF A0 82 02 7A 30 82 02 76 30 82 02 72 30 (.....z0..v0..r0 8E08: 82 01 DB A0 03 02 01 02 02 02 27 10 30 0D 06 09 ..........'.0... 8E18: 2A 86 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 *.H........0n1.0 8E28: 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 ...U....US1.0... 8E38: 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 U....California1 8E48: 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 .0...U....Mounta 8E58: 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A in View1.0...U.. 8E68: 13 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 ..BOGUS NSS1.0.. 8E78: 03 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 .U....NSS IOPR T 8E88: 65 73 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 est CA 36840 ..0 8E98: 36 31 30 31 39 32 30 31 33 33 39 5A 18 0F 32 30 61019201339Z..20 8EA8: 35 36 31 30 31 39 32 30 31 33 33 39 5A 30 6E 31 561019201339Z0n1 8EB8: 0B 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 .0...U....US1.0. 8EC8: 06 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 ..U....Californi 8ED8: 61 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E a1.0...U....Moun 8EE8: 74 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 tain View1.0...U 8EF8: 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 ....BOGUS NSS1.0 8F08: 1C 06 03 55 04 03 13 15 4E 53 53 20 49 4F 50 52 ...U....NSS IOPR 8F18: 20 54 65 73 74 20 43 41 20 33 36 38 34 30 81 9F Test CA 36840.. 8F28: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 0...*.H......... 8F38: 81 8D 00 30 81 89 02 81 81 00 BA 53 DF A7 E2 BD ...0.......S.... 8F48: A4 E4 D8 93 C9 19 22 C4 37 CE A5 14 3E 26 35 29 ......".7...>&5) 8F58: B5 37 DA C5 27 11 FF 48 90 BC 14 E4 E5 43 95 77 .7..'..H.....C.w 8F68: B5 93 15 4A 16 1D E5 38 98 44 B4 71 AF 2A 7A B9 ...J...8.D.q.*z. 8F78: B6 63 A6 AD 0E EA 47 A3 84 6E F7 2D 9C 04 C6 65 .c....G..n.-...e 8F88: 76 93 DC 15 44 F7 15 E1 EA 0C D1 FE DB AF 50 FA v...D.........P. 8F98: 8F 19 02 92 3C 06 3C C3 17 59 1E 09 FC 3E EC 77 ....<.<..Y...>.w 8FA8: 49 9F 0F E7 1C 03 65 3B F1 6F 5D 4E 5F CF 45 C7 I.....e;.o]N_.E. 8FB8: 48 C3 AA 8D 15 8A E6 8D B0 4B 02 03 01 00 01 A3 H........K...... 8FC8: 1D 30 1B 30 0C 06 03 55 1D 13 04 05 30 03 01 01 .0.0...U....0... 8FD8: FF 30 0B 06 03 55 1D 0F 04 04 03 02 01 06 30 0D .0...U........0. 8FE8: 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 ..*.H........... 8FF8: 00 24 CA FC 23 C8 72 6D D7 59 0B FF C9 13 7C 63 .$..#.rm.Y....|c 9008: 59 B0 A6 C0 D9 C3 AF 02 ED 01 A6 E4 CC CA 1A CE Y............... 9018: 62 E1 73 68 8B E5 8F 35 87 CB F3 59 EE 85 A9 0F b.sh...5...Y.... 9028: 53 63 12 99 B4 4A CA B8 7A 2F 29 93 93 0C 85 77 Sc...J..z/)....w 9038: 5B 9C 3B 2B 18 C1 20 37 F0 9F BD C8 1A E4 82 89 [.;+.. 7........ 9048: 5E 50 A7 E5 16 3E 73 C7 58 F7 97 FA 97 4B FE 2B ^P...>s.X....K.+ 9058: F6 16 A5 51 B8 C7 AD 82 4E 80 61 D4 FB AF E3 1B ...Q....N.a..... 9068: 8F 98 DE D1 4D 7A 39 C6 94 63 CA E3 1B D0 99 AE ....Mz9..c...... 9078: F3 . Check of certificate "ocspRCATestUser520-rsa" failed. Reason: Peer's Certificate has been revoked. Checking for memory leaks... Actual leaks report (actual leaks: 3 total size: 144 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 81 total size: 3203 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.98% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.99% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.99% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (4.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.25% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found 7 blocks totaling 78 bytes (2.44% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef638 (2.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.50% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.34% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81d4870 (1.12% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.03% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (1.00% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2bb8 (0.75% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRTestUser522-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRTestUser522-rsa (process id 21390) RTC: Enabling Error Checking... RTC: Running program... 1191354220990100: EB38: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB48: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB58: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB68: 3A 32 35 36 32 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2562..Content-T EB78: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB88: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB98: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EBA8: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EBB8: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EBC8: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EBD8: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 0A A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354220993505: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 36 tent-Length: 116 ECA0: 39 0D 0A 0D 0A 9.... 1191354220994092: 8C48: 30 82 04 8D 0A 01 00 A0 82 04 86 30 82 04 82 06 0..........0.... 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 73 30 82 .+.....0.....s0. 8C68: 04 6F 30 82 01 24 A1 81 A9 30 81 A6 31 0B 30 09 .o0..$...0..1.0. 8C78: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 8C88: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 8C98: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 8CA8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 8CB8: 09 42 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 .BOGUS NSS1402.. 8CC8: 2A 86 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 *.H.......%ocspD 8CD8: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8CE8: 65 72 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D er-rsa@bogus.com 8CF8: 31 20 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 1 0...U....ocspD 8D08: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8D18: 65 72 18 0F 32 30 30 37 31 30 30 32 31 39 34 33 er..200710021943 8D28: 34 30 5A 30 65 30 63 30 3B 30 09 06 05 2B 0E 03 40Z0e0c0;0...+.. 8D38: 02 1A 05 00 04 14 8C 2A 92 48 AF 71 F2 D5 CB 85 .......*.H.q.... 8D48: D5 96 F2 35 A4 64 3B B8 AB AD 04 14 0A 07 3E 30 ...5.d;.......>0 8D58: 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E 77 AB 0A D6 .....l....s.w... 8D68: 02 02 02 0A 80 00 18 0F 32 30 30 37 30 31 31 31 ........20070111 8D78: 31 36 35 39 33 33 5A A0 11 18 0F 32 30 30 37 31 165933Z....20071 8D88: 30 30 32 31 39 34 38 34 30 5A 30 0D 06 09 2A 86 002194840Z0...*. 8D98: 48 86 F7 0D 01 01 05 05 00 03 81 81 00 7F 94 C8 H............... 8DA8: 4D CE A8 79 11 3C F7 73 85 39 FA 6C 1A 2B 6A 54 M..y.<.s.9.l.+jT 8DB8: DF E2 9A 28 0B 67 64 86 67 68 57 BA 9F 5D AE 7C ...(.gd.ghW..].| 8DC8: 06 EF A3 B8 8F 10 54 67 CD F3 34 8D 2A 18 83 62 ......Tg..4.*..b 8DD8: 29 72 64 3D 97 19 AE A6 EE 17 75 3E A8 31 A4 02 )rd=......u>.1.. 8DE8: DC 2B 7F 1C 5A CC F3 F4 CF B4 AF 78 24 1E 6C 20 .+..Z......x$.l 8DF8: F4 2F 4A 56 3D AC E6 AF A2 71 ED 9A 6B DE 0F 53 ./JV=....q..k..S 8E08: 27 54 30 3F E8 01 09 14 7A 9E C3 64 D2 33 D1 2A 'T0?....z..d.3.* 8E18: 92 F0 47 44 56 F5 39 DD 43 69 60 37 E8 A0 82 02 ..GDV.9.Ci`7.... 8E28: B0 30 82 02 AC 30 82 02 A8 30 82 02 11 A0 03 02 .0...0...0...... 8E38: 01 02 02 02 02 0E 30 0D 06 09 2A 86 48 86 F7 0D ......0...*.H... 8E48: 01 01 05 05 00 30 6E 31 0B 30 09 06 03 55 04 06 .....0n1.0...U.. 8E58: 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A 43 ..US1.0...U....C 8E68: 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 55 alifornia1.0...U 8E78: 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 65 ....Mountain Vie 8E88: 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 55 w1.0...U....BOGU 8E98: 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 15 S NSS1.0...U.... 8EA8: 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 41 NSS IOPR Test CA 8EB8: 20 33 36 38 34 30 20 17 0D 30 37 30 31 31 32 30 36840 ..0701120 8EC8: 30 35 39 32 38 5A 18 0F 32 30 35 36 31 32 31 32 05928Z..20561212 8ED8: 30 30 35 39 32 38 5A 30 81 A6 31 0B 30 09 06 03 005928Z0..1.0... 8EE8: 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 U....US1.0...U.. 8EF8: 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 ..California1.0. 8F08: 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 ..U....Mountain 8F18: 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 View1.0...U....B 8F28: 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 2A 86 OGUS NSS1402..*. 8F38: 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 65 73 H.......%ocspDes 8F48: 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 72 ignatedResponder 8F58: 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 20 -rsa@bogus.com1 8F68: 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 65 73 0...U....ocspDes 8F78: 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 72 ignatedResponder 8F88: 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 0..0...*.H...... 8F98: 05 00 03 81 8D 00 30 81 89 02 81 81 00 A4 A8 66 ......0........f 8FA8: F2 73 E2 0D D6 F8 51 C4 C1 75 94 1F 13 BE 96 C2 .s....Q..u...... 8FB8: 76 10 C6 B3 D5 B6 6C 00 FE 6D DF A8 23 6A EA AF v.....l..m..#j.. 8FC8: 2F 64 EB 8B BA 9F B0 07 AD 09 42 8B C2 37 0B F0 /d........B..7.. 8FD8: 1E 6D F0 FE BE 74 88 C9 40 65 86 AC AC D0 80 18 .m...t..@e...... 8FE8: C5 F4 86 78 CE 1D CF 0B 9C 0F 37 DB 5D 04 63 D7 ...x......7.].c. 8FF8: 1E 09 44 9B D0 14 27 BE 0C 2A FF EF 48 20 3C 61 ..D...'..*..H .RE...Y...#..R 9088: C1 E8 46 42 DC 59 7A F6 B9 3C 72 7C 17 AA 10 00 ..FB.Yz..0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 0C A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354221732927: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 38 tent-Length: 118 ECA0: 36 0D 0A 0D 0A 6.... 1191354221733519: 8C48: 30 82 04 9E 0A 01 00 A0 82 04 97 30 82 04 93 06 0..........0.... 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 84 30 82 .+.....0......0. 8C68: 04 80 30 82 01 35 A1 81 A9 30 81 A6 31 0B 30 09 ..0..5...0..1.0. 8C78: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 8C88: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 8C98: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 8CA8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 8CB8: 09 42 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 .BOGUS NSS1402.. 8CC8: 2A 86 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 *.H.......%ocspD 8CD8: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8CE8: 65 72 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D er-rsa@bogus.com 8CF8: 31 20 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 1 0...U....ocspD 8D08: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8D18: 65 72 18 0F 32 30 30 37 31 30 30 32 31 39 34 33 er..200710021943 8D28: 34 31 5A 30 76 30 74 30 3B 30 09 06 05 2B 0E 03 41Z0v0t0;0...+.. 8D38: 02 1A 05 00 04 14 8C 2A 92 48 AF 71 F2 D5 CB 85 .......*.H.q.... 8D48: D5 96 F2 35 A4 64 3B B8 AB AD 04 14 0A 07 3E 30 ...5.d;.......>0 8D58: 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E 77 AB 0A D6 .....l....s.w... 8D68: 02 02 02 0C A1 11 18 0F 32 30 30 37 30 31 31 31 ........20070111 8D78: 31 36 35 39 33 33 5A 18 0F 32 30 30 37 30 31 31 165933Z..2007011 8D88: 31 31 36 35 39 33 33 5A A0 11 18 0F 32 30 30 37 1165933Z....2007 8D98: 31 30 30 32 31 39 34 38 34 31 5A 30 0D 06 09 2A 1002194841Z0...* 8DA8: 86 48 86 F7 0D 01 01 05 05 00 03 81 81 00 32 BB .H............2. 8DB8: BB 08 15 93 74 5F 8F F0 47 EA CE 13 78 30 39 89 ....t_..G...x09. 8DC8: 48 E6 56 06 C3 95 A9 66 6D D8 FD B1 52 D6 05 25 H.V....fm...R..% 8DD8: 97 74 82 DF E9 C9 FC F1 19 70 5E FD 23 57 3F B3 .t.......p^.#W?. 8DE8: 53 33 3E 52 BD 7F FF AD BF C2 FF AE F4 BE BB 8A S3>R............ 8DF8: 67 89 80 84 76 12 BB 4D A4 89 31 63 DD 7C 59 08 g...v..M..1c.|Y. 8E08: BE B2 8F 32 C9 A2 80 4F 6C 6F AD 98 A6 DF 3F A0 ...2...Olo....?. 8E18: 82 1F 8A 9F 68 29 62 60 60 38 DD 5C 02 EB 84 C1 ....h)b``8.\.... 8E28: 1F 12 CF 9D A2 98 8D 91 99 7B 0E 3D BE 72 A0 82 .........{.=.r.. 8E38: 02 B0 30 82 02 AC 30 82 02 A8 30 82 02 11 A0 03 ..0...0...0..... 8E48: 02 01 02 02 02 02 0E 30 0D 06 09 2A 86 48 86 F7 .......0...*.H.. 8E58: 0D 01 01 05 05 00 30 6E 31 0B 30 09 06 03 55 04 ......0n1.0...U. 8E68: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U.... 8E78: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 8E88: 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 8E98: 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 ew1.0...U....BOG 8EA8: 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 US NSS1.0...U... 8EB8: 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 .NSS IOPR Test C 8EC8: 41 20 33 36 38 34 30 20 17 0D 30 37 30 31 31 32 A 36840 ..070112 8ED8: 30 30 35 39 32 38 5A 18 0F 32 30 35 36 31 32 31 005928Z..2056121 8EE8: 32 30 30 35 39 32 38 5A 30 81 A6 31 0B 30 09 06 2005928Z0..1.0.. 8EF8: 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 .U....US1.0...U. 8F08: 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 ...California1.0 8F18: 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E ...U....Mountain 8F28: 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 View1.0...U.... 8F38: 42 4F 47 55 53 20 4E 53 53 31 34 30 32 06 09 2A BOGUS NSS1402..* 8F48: 86 48 86 F7 0D 01 09 01 16 25 6F 63 73 70 44 65 .H.......%ocspDe 8F58: 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 signatedResponde 8F68: 72 2D 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 r-rsa@bogus.com1 8F78: 20 30 1E 06 03 55 04 03 13 17 6F 63 73 70 44 65 0...U....ocspDe 8F88: 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 65 signatedResponde 8F98: 72 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D 01 01 r0..0...*.H..... 8FA8: 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 A4 A8 .......0........ 8FB8: 66 F2 73 E2 0D D6 F8 51 C4 C1 75 94 1F 13 BE 96 f.s....Q..u..... 8FC8: C2 76 10 C6 B3 D5 B6 6C 00 FE 6D DF A8 23 6A EA .v.....l..m..#j. 8FD8: AF 2F 64 EB 8B BA 9F B0 07 AD 09 42 8B C2 37 0B ./d........B..7. 8FE8: F0 1E 6D F0 FE BE 74 88 C9 40 65 86 AC AC D0 80 ..m...t..@e..... 8FF8: 18 C5 F4 86 78 CE 1D CF 0B 9C 0F 37 DB 5D 04 63 ....x......7.].c 9008: D7 1E 09 44 9B D0 14 27 BE 0C 2A FF EF 48 20 3C ...D...'..*..H < 9018: 61 6F 3A 7E BC 90 2F FF A6 C0 38 47 02 5C DD 0B ao:.../...8G.\.. 9028: D5 70 FE CD E7 77 29 44 21 BB 39 AE D4 0F 02 03 .p...w)D!.9..... 9038: 01 00 01 A3 1A 30 18 30 16 06 03 55 1D 25 01 01 .....0.0...U.%.. 9048: FF 04 0C 30 0A 06 08 2B 06 01 05 05 07 03 09 30 ...0...+.......0 9058: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H.......... 9068: 81 00 90 64 13 62 83 AE D5 CB 4C 16 87 C0 4E 73 ...d.b....L...Ns 9078: CF 4B A0 5C 95 19 22 C7 0F 1B 82 2E 07 1D A0 62 .K.\.."........b 9088: 55 DC 3E B2 52 45 8F B7 E6 59 D6 00 B1 23 88 DC U.>.RE...Y...#.. 9098: 52 C1 E8 46 42 DC 59 7A F6 B9 3C 72 7C 17 AA 10 R..FB.Yz..0.....l... EBE8: E2 73 2E 77 AB 0A D6 02 02 02 1C A2 1E 30 1C 30 .s.w.........0.0 EBF8: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EC08: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354222326183: EC30: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EC40: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC50: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC60: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC70: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC80: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC90: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 39 tent-Length: 119 ECA0: 34 0D 0A 0D 0A 4.... 1191354222326927: 8C48: 30 82 04 A6 0A 01 00 A0 82 04 9F 30 82 04 9B 06 0..........0.... 8C58: 09 2B 06 01 05 05 07 30 01 01 04 82 04 8C 30 82 .+.....0......0. 8C68: 04 88 30 82 01 28 A1 81 AD 30 81 AA 31 0B 30 09 ..0..(...0..1.0. 8C78: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 8C88: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 8C98: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 8CA8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 8CB8: 09 42 4F 47 55 53 20 4E 53 53 31 36 30 34 06 09 .BOGUS NSS1604.. 8CC8: 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 73 70 44 *.H.......'ocspD 8CD8: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 8CE8: 65 72 43 41 2D 72 73 61 40 62 6F 67 75 73 2E 63 erCA-rsa@bogus.c 8CF8: 6F 6D 31 22 30 20 06 03 55 04 03 13 19 6F 63 73 om1"0 ..U....ocs 8D08: 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F pDesignatedRespo 8D18: 6E 64 65 72 43 41 18 0F 32 30 30 37 31 30 30 32 nderCA..20071002 8D28: 31 39 34 33 34 32 5A 30 65 30 63 30 3B 30 09 06 194342Z0e0c0;0.. 8D38: 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF 71 .+.........*.H.q 8D48: F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 14 .......5.d;..... 8D58: 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E ..>0.....l....s. 8D68: 77 AB 0A D6 02 02 02 1C 80 00 18 0F 32 30 30 37 w...........2007 8D78: 30 35 32 31 31 34 33 31 31 33 5A A0 11 18 0F 32 0521143113Z....2 8D88: 30 30 37 31 30 30 32 31 39 34 38 34 32 5A 30 0D 0071002194842Z0. 8D98: 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 81 ..*.H........... 8DA8: 00 52 F5 4D BB 54 42 B1 9B 4A E1 51 ED 21 A4 F7 .R.M.TB..J.Q.!.. 8DB8: 28 68 92 5A ED 74 82 E0 47 D9 CB 0B F2 BA 8E 82 (h.Z.t..G....... 8DC8: F0 FE F7 54 28 5B A4 07 D8 28 5D F8 88 96 3A 5F ...T([...(]...:_ 8DD8: 0C 73 73 46 E2 96 1D 4B 12 D1 44 92 F9 EC D6 CF .ssF...K..D..... 8DE8: 4E B2 5F 0D A4 46 8C A2 3F 2C 82 F3 62 9D FF 6B N._..F..?,..b..k 8DF8: D2 A9 C4 70 EA 0D 4B C7 57 A5 C3 0B A8 94 25 40 ...p..K.W.....%@ 8E08: 0A D2 05 E0 A2 E7 9C D1 20 71 8F 58 C7 D4 E7 83 ........ q.X.... 8E18: DD 6D 35 8C C2 64 A8 9F AF E1 B9 06 4E CD 9F 1A .m5..d......N... 8E28: 19 A0 82 02 C5 30 82 02 C1 30 82 02 BD 30 82 02 .....0...0...0.. 8E38: 26 A0 03 02 01 02 02 02 02 0F 30 0D 06 09 2A 86 &.........0...*. 8E48: 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 09 06 H........0n1.0.. 8E58: 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 .U....US1.0...U. 8E68: 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 ...California1.0 8E78: 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E ...U....Mountain 8E88: 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 09 View1.0...U.... 8E98: 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 BOGUS NSS1.0...U 8EA8: 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 65 73 ....NSS IOPR Tes 8EB8: 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 37 30 t CA 36840 ..070 8EC8: 35 32 31 32 31 33 31 30 36 5A 18 0F 32 30 35 37 521213106Z..2057 8ED8: 30 34 32 31 32 31 33 31 30 36 5A 30 81 AA 31 0B 0421213106Z0..1. 8EE8: 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 0...U....US1.0.. 8EF8: 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 .U....California 8F08: 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 1.0...U....Mount 8F18: 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 ain View1.0...U. 8F28: 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 36 30 34 ...BOGUS NSS1604 8F38: 06 09 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 73 ..*.H.......'ocs 8F48: 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F pDesignatedRespo 8F58: 6E 64 65 72 43 41 2D 72 73 61 40 62 6F 67 75 73 nderCA-rsa@bogus 8F68: 2E 63 6F 6D 31 22 30 20 06 03 55 04 03 13 19 6F .com1"0 ..U....o 8F78: 63 73 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 cspDesignatedRes 8F88: 70 6F 6E 64 65 72 43 41 30 81 9F 30 0D 06 09 2A ponderCA0..0...* 8F98: 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 30 81 .H............0. 8FA8: 89 02 81 81 00 A3 5A E4 F6 21 BC D2 BB CB 74 1C ......Z..!....t. 8FB8: BC 4F 5D 9A 15 38 39 DF 83 BC 6B E9 23 B0 E7 8D .O]..89...k.#... 8FC8: E0 67 74 72 BB EB CF E4 8A BA 90 67 66 4A C8 59 .gtr.......gfJ.Y 8FD8: 64 C8 1C 98 93 DE 06 E4 91 28 20 D6 14 69 08 C7 d........( ..i.. 8FE8: 94 85 04 78 E0 47 9F 0C 3D 30 E2 54 38 77 42 D5 ...x.G..=0.T8wB. 8FF8: EC 09 09 27 54 34 E4 E4 27 08 03 01 04 91 04 1A ...'T4..'....... 9008: 37 EE 93 3E 9F 94 8D CB 34 41 15 7B 07 E8 F6 8D 7..>....4A.{.... 9018: DD 03 F4 7F 68 4F 04 8A A3 82 06 A9 4E 26 BA 7B ....hO......N&.{ 9028: 9A 5F 9F BF 81 02 03 01 00 01 A3 2B 30 29 30 0F ._.........+0)0. 9038: 06 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 30 ..U....0.......0 9048: 16 06 03 55 1D 25 01 01 FF 04 0C 30 0A 06 08 2B ...U.%.....0...+ 9058: 06 01 05 05 07 03 09 30 0D 06 09 2A 86 48 86 F7 .......0...*.H.. 9068: 0D 01 01 05 05 00 03 81 81 00 68 F4 DF 00 B7 C4 ..........h..... 9078: 3B E7 04 F5 47 85 94 7B E1 FF 14 94 F1 08 9D 55 ;...G..{.......U 9088: A1 A8 E4 8A E7 C4 D6 B1 0C 9E 78 2A 4A 9A 1F 64 ..........x*J..d 9098: 86 69 17 76 93 57 96 5C 41 65 53 3A A3 68 45 F8 .i.v.W.\AeS:.hE. 90A8: 17 22 92 8F 6E 18 87 68 0B EE F0 B6 2B A2 80 85 ."..n..h....+... 90B8: 2D 98 6C E1 74 BD 9B 7A 55 37 94 28 7C 4E 97 29 -.l.t..zU7.(|N.) 90C8: 87 88 92 BA 37 AD 46 E1 EA 52 8E F5 06 84 7F 25 ....7.F..R.....% 90D8: 18 6A 06 4C 3F D8 6F DD D1 67 C4 66 FD D0 12 B1 .j.L?.o..g.f.... 90E8: CD 17 61 7E 37 E5 BA 36 10 89 ..a.7..6.. Check of certificate "ocspDRCATestUser540-rsa" failed. Reason: Invalid OCSP signing certificate in OCSP response. Checking for memory leaks... Actual leaks report (actual leaks: 9 total size: 540 bytes) Memory Leak (mel): Found 3 leaked blocks with total size 264 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Object_Alloc() at 0x811d8a5 [5] PKIX_Error_Create() at 0x812feec [6] pkix_Throw() at 0x812cab9 [7] PKIX_DoReturn() at 0x813a076 [8] pkix_Build_VerifyCertificate() at 0x8103f67 [9] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [10] pkix_Build_InitiateBuildChain() at 0x810b075 [11] PKIX_BuildChain() at 0x810bb9a [12] cert_VerifyCertChainPkix() at 0x809768f [13] CERT_VerifyCert() at 0x8093736 [14] CERT_VerifyOCSPResponseSignature() at 0x808de52 [15] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [16] CERT_CheckOCSPStatus() at 0x808e92a Memory Leak (mel): Found 3 leaked blocks with total size 132 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PKIX_PL_Malloc() at 0x8129b0b [3] PKIX_PL_Object_Alloc() at 0x811d83a [4] PKIX_Error_Create() at 0x812feec [5] pkix_Throw() at 0x812cab9 [6] PKIX_DoReturn() at 0x813a076 [7] pkix_Build_VerifyCertificate() at 0x8103f67 [8] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [9] pkix_Build_InitiateBuildChain() at 0x810b075 [10] PKIX_BuildChain() at 0x810bb9a [11] cert_VerifyCertChainPkix() at 0x809768f [12] CERT_VerifyCert() at 0x8093736 [13] CERT_VerifyOCSPResponseSignature() at 0x808de52 [14] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [15] CERT_CheckOCSPStatus() at 0x808e92a [16] main() at 0x8071ba1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x8209b08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] CERT_VerifyCert() at 0x8093736 [15] CERT_VerifyOCSPResponseSignature() at 0x808de52 [16] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef638 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81f76b0 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 3 blocks totaling 24 bytes (0.73% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xbc921005 [2] fgetnetconfig() at 0xbc920c61 [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRCATestUser541-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspDRCATestUser541-rsa (process id 21473) RTC: Enabling Error Checking... RTC: Running program... 1191354222894122: EAF0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. EB00: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups EB10: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com EB20: 3A 32 35 36 33 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2563..Content-T EB30: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application EB40: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C EB50: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 ontent-Length: 1 EB60: 30 31 0D 0A 0D 0A 30 63 30 61 30 3F 30 3D 30 3B 01....0c0a0?0=0; EB70: 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 0...+.........*. EB80: 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB H.q.......5.d;.. EB90: AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F .....>0.....l... EBA0: E2 73 2E 77 AB 0A D6 02 02 02 1D A2 1E 30 1C 30 .s.w.........0.0 EBB0: 1A 06 09 2B 06 01 05 05 07 30 01 04 04 0D 30 0B ...+.....0....0. EBC0: 06 09 2B 06 01 05 05 07 30 01 01 ..+.....0.. 1191354222897470: EBE8: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. EBF8: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a EC08: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- EC18: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten EC28: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod EC38: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con EC48: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 32 31 tent-Length: 121 EC58: 31 0D 0A 0D 0A 1.... 1191354222898056: 6B98: 30 82 04 B7 0A 01 00 A0 82 04 B0 30 82 04 AC 06 0..........0.... 6BA8: 09 2B 06 01 05 05 07 30 01 01 04 82 04 9D 30 82 .+.....0......0. 6BB8: 04 99 30 82 01 39 A1 81 AD 30 81 AA 31 0B 30 09 ..0..9...0..1.0. 6BC8: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 6BD8: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 6BE8: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 6BF8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 6C08: 09 42 4F 47 55 53 20 4E 53 53 31 36 30 34 06 09 .BOGUS NSS1604.. 6C18: 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 73 70 44 *.H.......'ocspD 6C28: 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F 6E 64 esignatedRespond 6C38: 65 72 43 41 2D 72 73 61 40 62 6F 67 75 73 2E 63 erCA-rsa@bogus.c 6C48: 6F 6D 31 22 30 20 06 03 55 04 03 13 19 6F 63 73 om1"0 ..U....ocs 6C58: 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 6F pDesignatedRespo 6C68: 6E 64 65 72 43 41 18 0F 32 30 30 37 31 30 30 32 nderCA..20071002 6C78: 31 39 34 33 34 32 5A 30 76 30 74 30 3B 30 09 06 194342Z0v0t0;0.. 6C88: 05 2B 0E 03 02 1A 05 00 04 14 8C 2A 92 48 AF 71 .+.........*.H.q 6C98: F2 D5 CB 85 D5 96 F2 35 A4 64 3B B8 AB AD 04 14 .......5.d;..... 6CA8: 0A 07 3E 30 7E DF CE 19 E9 6C 03 B8 9F E2 73 2E ..>0.....l....s. 6CB8: 77 AB 0A D6 02 02 02 1D A1 11 18 0F 32 30 30 37 w...........2007 6CC8: 30 35 32 31 31 34 33 31 31 33 5A 18 0F 32 30 30 0521143113Z..200 6CD8: 37 30 35 32 31 31 34 33 31 31 33 5A A0 11 18 0F 70521143113Z.... 6CE8: 32 30 30 37 31 30 30 32 31 39 34 38 34 32 5A 30 20071002194842Z0 6CF8: 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 03 81 ...*.H.......... 6D08: 81 00 98 07 D1 57 25 C1 56 D5 94 1B EB 22 12 BC .....W%.V....".. 6D18: A8 D6 86 B2 86 58 8C A6 D3 0A A3 D1 D3 76 F7 EF .....X.......v.. 6D28: FC C9 AA 4A 69 92 48 94 E6 2E 89 06 3A 93 7D AA ...Ji.H.....:.}. 6D38: D7 10 CF CD B0 0F 07 2D 2F 03 79 9E 8D E3 89 81 .......-/.y..... 6D48: A4 0B 9E 24 8D 5D 53 AF AF C3 96 6A 0C 6D 6A 75 ...$.]S....j.mju 6D58: E5 74 89 AB 76 19 04 35 D2 69 23 64 80 B0 54 D2 .t..v..5.i#d..T. 6D68: 77 86 AA 51 2E E6 BF 1D 54 CD 13 F1 8D 00 D9 E6 w..Q....T....... 6D78: B3 D9 FF 83 92 F9 EE D2 35 AF A8 C0 66 3F 9D 7A ........5...f?.z 6D88: 75 43 A0 82 02 C5 30 82 02 C1 30 82 02 BD 30 82 uC....0...0...0. 6D98: 02 26 A0 03 02 01 02 02 02 02 0F 30 0D 06 09 2A .&.........0...* 6DA8: 86 48 86 F7 0D 01 01 05 05 00 30 6E 31 0B 30 09 .H........0n1.0. 6DB8: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 6DC8: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 6DD8: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 6DE8: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 6DF8: 09 42 4F 47 55 53 20 4E 53 53 31 1E 30 1C 06 03 .BOGUS NSS1.0... 6E08: 55 04 03 13 15 4E 53 53 20 49 4F 50 52 20 54 65 U....NSS IOPR Te 6E18: 73 74 20 43 41 20 33 36 38 34 30 20 17 0D 30 37 st CA 36840 ..07 6E28: 30 35 32 31 32 31 33 31 30 36 5A 18 0F 32 30 35 0521213106Z..205 6E38: 37 30 34 32 31 32 31 33 31 30 36 5A 30 81 AA 31 70421213106Z0..1 6E48: 0B 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 .0...U....US1.0. 6E58: 06 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 ..U....Californi 6E68: 61 31 16 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E a1.0...U....Moun 6E78: 74 61 69 6E 20 56 69 65 77 31 12 30 10 06 03 55 tain View1.0...U 6E88: 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 36 30 ....BOGUS NSS160 6E98: 34 06 09 2A 86 48 86 F7 0D 01 09 01 0C 27 6F 63 4..*.H.......'oc 6EA8: 73 70 44 65 73 69 67 6E 61 74 65 64 52 65 73 70 spDesignatedResp 6EB8: 6F 6E 64 65 72 43 41 2D 72 73 61 40 62 6F 67 75 onderCA-rsa@bogu 6EC8: 73 2E 63 6F 6D 31 22 30 20 06 03 55 04 03 13 19 s.com1"0 ..U.... 6ED8: 6F 63 73 70 44 65 73 69 67 6E 61 74 65 64 52 65 ocspDesignatedRe 6EE8: 73 70 6F 6E 64 65 72 43 41 30 81 9F 30 0D 06 09 sponderCA0..0... 6EF8: 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 30 *.H............0 6F08: 81 89 02 81 81 00 A3 5A E4 F6 21 BC D2 BB CB 74 .......Z..!....t 6F18: 1C BC 4F 5D 9A 15 38 39 DF 83 BC 6B E9 23 B0 E7 ..O]..89...k.#.. 6F28: 8D E0 67 74 72 BB EB CF E4 8A BA 90 67 66 4A C8 ..gtr.......gfJ. 6F38: 59 64 C8 1C 98 93 DE 06 E4 91 28 20 D6 14 69 08 Yd........( ..i. 6F48: C7 94 85 04 78 E0 47 9F 0C 3D 30 E2 54 38 77 42 ....x.G..=0.T8wB 6F58: D5 EC 09 09 27 54 34 E4 E4 27 08 03 01 04 91 04 ....'T4..'...... 6F68: 1A 37 EE 93 3E 9F 94 8D CB 34 41 15 7B 07 E8 F6 .7..>....4A.{... 6F78: 8D DD 03 F4 7F 68 4F 04 8A A3 82 06 A9 4E 26 BA .....hO......N&. 6F88: 7B 9A 5F 9F BF 81 02 03 01 00 01 A3 2B 30 29 30 {._.........+0)0 6F98: 0F 06 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 ...U....0....... 6FA8: 30 16 06 03 55 1D 25 01 01 FF 04 0C 30 0A 06 08 0...U.%.....0... 6FB8: 2B 06 01 05 05 07 03 09 30 0D 06 09 2A 86 48 86 +.......0...*.H. 6FC8: F7 0D 01 01 05 05 00 03 81 81 00 68 F4 DF 00 B7 ...........h.... 6FD8: C4 3B E7 04 F5 47 85 94 7B E1 FF 14 94 F1 08 9D .;...G..{....... 6FE8: 55 A1 A8 E4 8A E7 C4 D6 B1 0C 9E 78 2A 4A 9A 1F U..........x*J.. 6FF8: 64 86 69 17 76 93 57 96 5C 41 65 53 3A A3 68 45 d.i.v.W.\AeS:.hE 7008: F8 17 22 92 8F 6E 18 87 68 0B EE F0 B6 2B A2 80 .."..n..h....+.. 7018: 85 2D 98 6C E1 74 BD 9B 7A 55 37 94 28 7C 4E 97 .-.l.t..zU7.(|N. 7028: 29 87 88 92 BA 37 AD 46 E1 EA 52 8E F5 06 84 7F )....7.F..R..... 7038: 25 18 6A 06 4C 3F D8 6F DD D1 67 C4 66 FD D0 12 %.j.L?.o..g.f... 7048: B1 CD 17 61 7E 37 E5 BA 36 10 89 ...a.7..6.. Check of certificate "ocspDRCATestUser541-rsa" failed. Reason: Invalid OCSP signing certificate in OCSP response. Checking for memory leaks... Actual leaks report (actual leaks: 9 total size: 540 bytes) Memory Leak (mel): Found 3 leaked blocks with total size 264 bytes At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Object_Alloc() at 0x811d8a5 [5] PKIX_Error_Create() at 0x812feec [6] pkix_Throw() at 0x812cab9 [7] PKIX_DoReturn() at 0x813a076 [8] pkix_Build_VerifyCertificate() at 0x8103f67 [9] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [10] pkix_Build_InitiateBuildChain() at 0x810b075 [11] PKIX_BuildChain() at 0x810bb9a [12] cert_VerifyCertChainPkix() at 0x809768f [13] CERT_VerifyCert() at 0x8093736 [14] CERT_VerifyOCSPResponseSignature() at 0x808de52 [15] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [16] CERT_CheckOCSPStatus() at 0x808e92a Memory Leak (mel): Found 3 leaked blocks with total size 132 bytes At time of each allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PKIX_PL_Malloc() at 0x8129b0b [3] PKIX_PL_Object_Alloc() at 0x811d83a [4] PKIX_Error_Create() at 0x812feec [5] pkix_Throw() at 0x812cab9 [6] PKIX_DoReturn() at 0x813a076 [7] pkix_Build_VerifyCertificate() at 0x8103f67 [8] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [9] pkix_Build_InitiateBuildChain() at 0x810b075 [10] PKIX_BuildChain() at 0x810bb9a [11] cert_VerifyCertChainPkix() at 0x809768f [12] CERT_VerifyCert() at 0x8093736 [13] CERT_VerifyOCSPResponseSignature() at 0x808de52 [14] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 [15] CERT_CheckOCSPStatus() at 0x808e92a [16] main() at 0x8071ba1 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x8209bb8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] CERT_VerifyCert() at 0x8093736 [15] CERT_VerifyOCSPResponseSignature() at 0x808de52 [16] ocsp_GetOCSPStatusFromNetwork() at 0x808eb22 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81ef4e8 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81ea008 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser514-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser514-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa (process id 21510) RTC: Enabling Error Checking... RTC: Running program... 1191354223519571: 57E0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. 57F0: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups 5800: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com 5810: 3A 32 35 36 30 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2560..Content-T 5820: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application 5830: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C 5840: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 32 ontent-Length: 2 5850: 34 30 0D 0A 0D 0A 30 81 ED 30 81 EA 30 81 C7 30 40....0..0..0..0 5860: 81 C4 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 ..0;0...+....... 5870: 14 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 ..*.H.q.......5. 5880: 64 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 d;.......>0..... 5890: 6C 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 02 A0 l....s.w........ 58A0: 81 84 30 81 81 30 7F 06 09 2B 06 01 05 05 07 30 ..0..0...+.....0 58B0: 01 07 04 72 30 70 30 6E 31 0B 30 09 06 03 55 04 ...r0p0n1.0...U. 58C0: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U.... 58D0: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 58E0: 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 58F0: 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 ew1.0...U....BOG 5900: 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 US NSS1.0...U... 5910: 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 .NSS IOPR Test C 5920: 41 20 33 36 38 34 A2 1E 30 1C 30 1A 06 09 2B 06 A 3684..0.0...+. 5930: 01 05 05 07 30 01 04 04 0D 30 0B 06 09 2B 06 01 ....0....0...+.. 5940: 05 05 07 30 01 01 ...0.. 1191354223522984: 0A08: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. 0A18: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a 0A28: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- 0A38: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten 0A48: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod 0A58: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con 0A68: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 32 tent-Length: 112 0A78: 39 0D 0A 0D 0A 9.... 1191354223523585: 9B30: 30 82 04 65 0A 01 00 A0 82 04 5E 30 82 04 5A 06 0..e......^0..Z. 9B40: 09 2B 06 01 05 05 07 30 01 01 04 82 04 4B 30 82 .+.....0.....K0. 9B50: 04 47 30 82 01 1E A1 81 A3 30 81 A0 31 0B 30 09 .G0......0..1.0. 9B60: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 9B70: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 9B80: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 9B90: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 9BA0: 09 42 4F 47 55 53 20 4E 53 53 31 31 30 2F 06 09 .BOGUS NSS110/.. 9BB0: 2A 86 48 86 F7 0D 01 09 01 16 22 6F 63 73 70 54 *.H......."ocspT 9BC0: 72 75 73 74 65 64 52 65 73 70 6F 6E 64 65 72 2D rustedResponder- 9BD0: 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 1D 30 rsa@bogus.com1.0 9BE0: 1B 06 03 55 04 03 13 14 6F 63 73 70 54 72 75 73 ...U....ocspTrus 9BF0: 74 65 64 52 65 73 70 6F 6E 64 65 72 18 0F 32 30 tedResponder..20 9C00: 30 37 31 30 30 32 31 39 34 33 34 33 5A 30 65 30 071002194343Z0e0 9C10: 63 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 c0;0...+........ 9C20: 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 .*.H.q.......5.d 9C30: 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C ;.......>0.....l 9C40: 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 02 80 00 ....s.w......... 9C50: 18 0F 32 30 30 37 30 31 31 31 31 36 35 39 33 33 ..20070111165933 9C60: 5A A0 11 18 0F 32 30 30 37 31 30 30 32 31 39 34 Z....20071002194 9C70: 38 34 33 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 01 843Z0...*.H..... 9C80: 05 05 00 03 81 81 00 9D 6D 0D 6B 17 52 4D 90 96 ........m.k.RM.. 9C90: C6 7F 42 2D 05 9B 31 D6 7D 31 7F 4B 2C 9E 42 C7 ..B-..1.}1.K,.B. 9CA0: 86 0B EB 2B 27 16 3B 3E FC AA E1 81 C5 64 89 42 ...+'.;>.....d.B 9CB0: 19 19 19 C8 9F 90 7B 2B 42 E8 ED 63 88 0E 8F 2B ......{+B..c...+ 9CC0: 0D 4D 02 79 EE C5 7C C1 62 77 1C 15 FF A4 2F 28 .M.y..|.bw..../( 9CD0: 0F 26 F4 97 EF 8A 5A 5E 71 78 A1 8B 79 90 5A A4 .&....Z^qx..y.Z. 9CE0: 94 BF 22 AF F2 93 01 1A D2 19 9B 14 68 0F F2 54 ..".........h..T 9CF0: D5 48 5E 17 36 60 6B B7 D1 1F 53 D4 D7 66 F8 B3 .H^.6`k...S..f.. 9D00: A8 0A 43 B3 54 9C 6B A0 82 02 8E 30 82 02 8A 30 ..C.T.k....0...0 9D10: 82 02 86 30 82 01 EF A0 03 02 01 02 02 02 02 0D ...0............ 9D20: 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 30 0...*.H........0 9D30: 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 13 n1.0...U....US1. 9D40: 30 11 06 03 55 04 08 13 0A 43 61 6C 69 66 6F 72 0...U....Califor 9D50: 6E 69 61 31 16 30 14 06 03 55 04 07 13 0D 4D 6F nia1.0...U....Mo 9D60: 75 6E 74 61 69 6E 20 56 69 65 77 31 12 30 10 06 untain View1.0.. 9D70: 03 55 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 31 .U....BOGUS NSS1 9D80: 1E 30 1C 06 03 55 04 03 13 15 4E 53 53 20 49 4F .0...U....NSS IO 9D90: 50 52 20 54 65 73 74 20 43 41 20 33 36 38 34 30 PR Test CA 36840 9DA0: 20 17 0D 30 37 30 31 31 32 30 30 35 39 32 37 5A ..070112005927Z 9DB0: 18 0F 32 30 35 36 31 32 31 32 30 30 35 39 32 37 ..20561212005927 9DC0: 5A 30 81 A0 31 0B 30 09 06 03 55 04 06 13 02 55 Z0..1.0...U....U 9DD0: 53 31 13 30 11 06 03 55 04 08 13 0A 43 61 6C 69 S1.0...U....Cali 9DE0: 66 6F 72 6E 69 61 31 16 30 14 06 03 55 04 07 13 fornia1.0...U... 9DF0: 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 31 12 .Mountain View1. 9E00: 30 10 06 03 55 04 0A 13 09 42 4F 47 55 53 20 4E 0...U....BOGUS N 9E10: 53 53 31 31 30 2F 06 09 2A 86 48 86 F7 0D 01 09 SS110/..*.H..... 9E20: 01 16 22 6F 63 73 70 54 72 75 73 74 65 64 52 65 .."ocspTrustedRe 9E30: 73 70 6F 6E 64 65 72 2D 72 73 61 40 62 6F 67 75 sponder-rsa@bogu 9E40: 73 2E 63 6F 6D 31 1D 30 1B 06 03 55 04 03 13 14 s.com1.0...U.... 9E50: 6F 63 73 70 54 72 75 73 74 65 64 52 65 73 70 6F ocspTrustedRespo 9E60: 6E 64 65 72 30 81 9F 30 0D 06 09 2A 86 48 86 F7 nder0..0...*.H.. 9E70: 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 ..........0..... 9E80: 00 BF 64 20 3E 5F 8F C8 A7 F9 28 B8 D9 F2 CF F2 ..d >_....(..... 9E90: B5 40 ED A9 EE A5 13 7F 62 D8 8C 39 BC 97 C0 23 .@......b..9...# 9EA0: B5 1D 56 DF A3 E4 EF C8 77 33 DC 6A AC A2 54 CB ..V.....w3.j..T. 9EB0: 4F 60 DC FD 21 42 10 5B E8 24 30 47 B0 FA 15 BC O`..!B.[.$0G.... 9EC0: 49 CA 2C B8 04 68 1C D5 22 EC 56 BD 5F 89 DB 85 I.,..h..".V._... 9ED0: C5 7B 1C 3C 88 E2 85 C2 FD 7D BE 82 76 11 F2 C7 .{.<.....}..v... 9EE0: 7F DF AC 24 93 1C E1 10 D9 7C F7 EA 9B 72 E6 2E ...$.....|...r.. 9EF0: 6F FE CE F0 A0 1E 70 60 C0 A8 F9 1D 6A E3 38 F1 o.....p`....j.8. 9F00: 6F 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 0D o.....0...*.H... 9F10: 01 01 05 05 00 03 81 81 00 B6 97 C5 57 17 3D FE ............W.=. 9F20: 16 CE BF A1 6C B3 D3 E1 B3 72 60 D6 0E 73 6E 54 ....l....r`..snT 9F30: BA 05 DB 2B 21 92 CA F0 8C 32 51 EE 75 48 3D D1 ...+!....2Q.uH=. 9F40: D6 BB CE 94 8A 0B 76 CB C0 D0 B7 65 1B B5 E1 20 ......v....e... 9F50: 92 66 EF 74 8A F7 C7 20 E7 6D 1D E9 69 5B 92 FC .f.t... .m..i[.. 9F60: 10 5C 40 44 C0 96 F4 00 4B 6E 54 0E 47 ED 37 13 .\@D....KnT.G.7. 9F70: 7F AB 6A E4 80 C2 BB 2F 6B 72 F7 FD F6 61 93 B2 ..j..../kr...a.. 9F80: F5 CE 95 D0 6D A0 65 46 BF 33 86 73 AC BD AB 7F ....m.eF.3.s.... 9F90: 4A 80 B8 13 97 37 61 4C 98 J....7aL. Check of certificate "ocspTRTestUser514-rsa" succeeded. Checking for memory leaks... Actual leaks report (actual leaks: 7 total size: 235 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 38 bytes at address 0x81f7770 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f75c [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 25 bytes at address 0x81d4870 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f768 [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 16 bytes at address 0x81edfe0 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f88b [5] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 12 bytes at address 0x81edf68 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f87b [5] main() at 0x80719c4 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x8201ef8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] cert_VerifyCertChain() at 0x8092622 [15] CERT_VerifyCertificate() at 0x8092e9c [16] CERT_VerifyCertificateNow() at 0x8093bc7 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81fdae0 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81ea588 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 execution completed, exit code is 0 memleak.sh: -------- Running /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/dbx /export/tinderbox/SunOS_5.9/mozilla/dist/SunOS5.9_i86pc_OPT.OBJ/bin/ocspclnt memleak.sh: -------- DBX commands: dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser516-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: ocspclnt -d /export/tinderbox/SunOS_5.9/mozilla/tests_results/security/aquash.2/client_ocsp_iopr_dochinups.red.iplanet.com -S ocspTRTestUser516-rsa -l http://dochinups.red.iplanet.com:2560 -t ocspTrustedResponder-rsa (process id 21533) RTC: Enabling Error Checking... RTC: Running program... 1191354224102828: 57E0: 50 4F 53 54 20 2F 20 48 54 54 50 2F 31 2E 30 0D POST / HTTP/1.0. 57F0: 0A 48 6F 73 74 3A 20 64 6F 63 68 69 6E 75 70 73 .Host: dochinups 5800: 2E 72 65 64 2E 69 70 6C 61 6E 65 74 2E 63 6F 6D .red.iplanet.com 5810: 3A 32 35 36 30 0D 0A 43 6F 6E 74 65 6E 74 2D 54 :2560..Content-T 5820: 79 70 65 3A 20 61 70 70 6C 69 63 61 74 69 6F 6E ype: application 5830: 2F 6F 63 73 70 2D 72 65 71 75 65 73 74 0D 0A 43 /ocsp-request..C 5840: 6F 6E 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 32 ontent-Length: 2 5850: 34 30 0D 0A 0D 0A 30 81 ED 30 81 EA 30 81 C7 30 40....0..0..0..0 5860: 81 C4 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 ..0;0...+....... 5870: 14 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 ..*.H.q.......5. 5880: 64 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 d;.......>0..... 5890: 6C 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 04 A0 l....s.w........ 58A0: 81 84 30 81 81 30 7F 06 09 2B 06 01 05 05 07 30 ..0..0...+.....0 58B0: 01 07 04 72 30 70 30 6E 31 0B 30 09 06 03 55 04 ...r0p0n1.0...U. 58C0: 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0A ...US1.0...U.... 58D0: 43 61 6C 69 66 6F 72 6E 69 61 31 16 30 14 06 03 California1.0... 58E0: 55 04 07 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 U....Mountain Vi 58F0: 65 77 31 12 30 10 06 03 55 04 0A 13 09 42 4F 47 ew1.0...U....BOG 5900: 55 53 20 4E 53 53 31 1E 30 1C 06 03 55 04 03 13 US NSS1.0...U... 5910: 15 4E 53 53 20 49 4F 50 52 20 54 65 73 74 20 43 .NSS IOPR Test C 5920: 41 20 33 36 38 34 A2 1E 30 1C 30 1A 06 09 2B 06 A 3684..0.0...+. 5930: 01 05 05 07 30 01 04 04 0D 30 0B 06 09 2B 06 01 ....0....0...+.. 5940: 05 05 07 30 01 01 ...0.. 1191354224106216: 0A08: 48 54 54 50 2F 31 2E 30 20 32 30 30 20 4F 4B 0D HTTP/1.0 200 OK. 0A18: 0A 43 6F 6E 74 65 6E 74 2D 74 79 70 65 3A 20 61 .Content-type: a 0A28: 70 70 6C 69 63 61 74 69 6F 6E 2F 6F 63 73 70 2D pplication/ocsp- 0A38: 72 65 73 70 6F 6E 73 65 0D 0A 43 6F 6E 74 65 6E response..Conten 0A48: 74 2D 54 72 61 6E 73 66 65 72 2D 45 6E 63 6F 64 t-Transfer-Encod 0A58: 69 6E 67 3A 20 42 69 6E 61 72 79 0D 0A 43 6F 6E ing: Binary..Con 0A68: 74 65 6E 74 2D 4C 65 6E 67 74 68 3A 20 31 31 34 tent-Length: 114 0A78: 36 0D 0A 0D 0A 6.... 1191354224106813: 9B30: 30 82 04 76 0A 01 00 A0 82 04 6F 30 82 04 6B 06 0..v......o0..k. 9B40: 09 2B 06 01 05 05 07 30 01 01 04 82 04 5C 30 82 .+.....0.....\0. 9B50: 04 58 30 82 01 2F A1 81 A3 30 81 A0 31 0B 30 09 .X0../...0..1.0. 9B60: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 ..U....US1.0...U 9B70: 04 08 13 0A 43 61 6C 69 66 6F 72 6E 69 61 31 16 ....California1. 9B80: 30 14 06 03 55 04 07 13 0D 4D 6F 75 6E 74 61 69 0...U....Mountai 9B90: 6E 20 56 69 65 77 31 12 30 10 06 03 55 04 0A 13 n View1.0...U... 9BA0: 09 42 4F 47 55 53 20 4E 53 53 31 31 30 2F 06 09 .BOGUS NSS110/.. 9BB0: 2A 86 48 86 F7 0D 01 09 01 16 22 6F 63 73 70 54 *.H......."ocspT 9BC0: 72 75 73 74 65 64 52 65 73 70 6F 6E 64 65 72 2D rustedResponder- 9BD0: 72 73 61 40 62 6F 67 75 73 2E 63 6F 6D 31 1D 30 rsa@bogus.com1.0 9BE0: 1B 06 03 55 04 03 13 14 6F 63 73 70 54 72 75 73 ...U....ocspTrus 9BF0: 74 65 64 52 65 73 70 6F 6E 64 65 72 18 0F 32 30 tedResponder..20 9C00: 30 37 31 30 30 32 31 39 34 33 34 34 5A 30 76 30 071002194344Z0v0 9C10: 74 30 3B 30 09 06 05 2B 0E 03 02 1A 05 00 04 14 t0;0...+........ 9C20: 8C 2A 92 48 AF 71 F2 D5 CB 85 D5 96 F2 35 A4 64 .*.H.q.......5.d 9C30: 3B B8 AB AD 04 14 0A 07 3E 30 7E DF CE 19 E9 6C ;.......>0.....l 9C40: 03 B8 9F E2 73 2E 77 AB 0A D6 02 02 02 04 A1 11 ....s.w......... 9C50: 18 0F 32 30 30 37 30 31 31 31 31 36 35 39 33 33 ..20070111165933 9C60: 5A 18 0F 32 30 30 37 30 31 31 31 31 36 35 39 33 Z..2007011116593 9C70: 33 5A A0 11 18 0F 32 30 30 37 31 30 30 32 31 39 3Z....2007100219 9C80: 34 38 34 34 5A 30 0D 06 09 2A 86 48 86 F7 0D 01 4844Z0...*.H.... 9C90: 01 05 05 00 03 81 81 00 4F C8 2E 9C 1F 40 BA 0C ........O....@.. 9CA0: AD FA 92 C3 4D C0 31 93 C5 A0 D9 36 A6 2D C3 CA ....M.1....6.-.. 9CB0: DF 12 54 31 A7 51 C2 16 B9 9A D4 B5 FB 37 F9 FE ..T1.Q.......7.. 9CC0: 37 64 92 1A EA F2 79 BC FC 9C 2F FA 78 E4 82 E6 7d....y.../.x... 9CD0: CE 94 11 24 45 38 02 D8 FA 16 DC 20 5C A1 BE 83 ...$E8..... \... 9CE0: F2 6E FC BE 2F 32 D3 69 ED 80 5A D0 2D DC 1C 83 .n../2.i..Z.-... 9CF0: 7B 5C E8 BB F1 4D D1 A5 1F 86 65 FC 7E D1 88 B3 {\...M....e..... 9D00: 72 EA 83 59 22 3D 42 E8 44 01 BC BD 40 86 97 2E r..Y"=B.D...@... 9D10: 3F 5F 4D 07 AC 14 FB 64 A0 82 02 8E 30 82 02 8A ?_M....d....0... 9D20: 30 82 02 86 30 82 01 EF A0 03 02 01 02 02 02 02 0...0........... 9D30: 0D 30 0D 06 09 2A 86 48 86 F7 0D 01 01 05 05 00 .0...*.H........ 9D40: 30 6E 31 0B 30 09 06 03 55 04 06 13 02 55 53 31 0n1.0...U....US1 9D50: 13 30 11 06 03 55 04 08 13 0A 43 61 6C 69 66 6F .0...U....Califo 9D60: 72 6E 69 61 31 16 30 14 06 03 55 04 07 13 0D 4D rnia1.0...U....M 9D70: 6F 75 6E 74 61 69 6E 20 56 69 65 77 31 12 30 10 ountain View1.0. 9D80: 06 03 55 04 0A 13 09 42 4F 47 55 53 20 4E 53 53 ..U....BOGUS NSS 9D90: 31 1E 30 1C 06 03 55 04 03 13 15 4E 53 53 20 49 1.0...U....NSS I 9DA0: 4F 50 52 20 54 65 73 74 20 43 41 20 33 36 38 34 OPR Test CA 3684 9DB0: 30 20 17 0D 30 37 30 31 31 32 30 30 35 39 32 37 0 ..070112005927 9DC0: 5A 18 0F 32 30 35 36 31 32 31 32 30 30 35 39 32 Z..2056121200592 9DD0: 37 5A 30 81 A0 31 0B 30 09 06 03 55 04 06 13 02 7Z0..1.0...U.... 9DE0: 55 53 31 13 30 11 06 03 55 04 08 13 0A 43 61 6C US1.0...U....Cal 9DF0: 69 66 6F 72 6E 69 61 31 16 30 14 06 03 55 04 07 ifornia1.0...U.. 9E00: 13 0D 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 31 ..Mountain View1 9E10: 12 30 10 06 03 55 04 0A 13 09 42 4F 47 55 53 20 .0...U....BOGUS 9E20: 4E 53 53 31 31 30 2F 06 09 2A 86 48 86 F7 0D 01 NSS110/..*.H.... 9E30: 09 01 16 22 6F 63 73 70 54 72 75 73 74 65 64 52 ..."ocspTrustedR 9E40: 65 73 70 6F 6E 64 65 72 2D 72 73 61 40 62 6F 67 esponder-rsa@bog 9E50: 75 73 2E 63 6F 6D 31 1D 30 1B 06 03 55 04 03 13 us.com1.0...U... 9E60: 14 6F 63 73 70 54 72 75 73 74 65 64 52 65 73 70 .ocspTrustedResp 9E70: 6F 6E 64 65 72 30 81 9F 30 0D 06 09 2A 86 48 86 onder0..0...*.H. 9E80: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0.... 9E90: 81 00 BF 64 20 3E 5F 8F C8 A7 F9 28 B8 D9 F2 CF ...d >_....(.... 9EA0: F2 B5 40 ED A9 EE A5 13 7F 62 D8 8C 39 BC 97 C0 ..@......b..9... 9EB0: 23 B5 1D 56 DF A3 E4 EF C8 77 33 DC 6A AC A2 54 #..V.....w3.j..T 9EC0: CB 4F 60 DC FD 21 42 10 5B E8 24 30 47 B0 FA 15 .O`..!B.[.$0G... 9ED0: BC 49 CA 2C B8 04 68 1C D5 22 EC 56 BD 5F 89 DB .I.,..h..".V._.. 9EE0: 85 C5 7B 1C 3C 88 E2 85 C2 FD 7D BE 82 76 11 F2 ..{.<.....}..v.. 9EF0: C7 7F DF AC 24 93 1C E1 10 D9 7C F7 EA 9B 72 E6 ....$.....|...r. 9F00: 2E 6F FE CE F0 A0 1E 70 60 C0 A8 F9 1D 6A E3 38 .o.....p`....j.8 9F10: F1 6F 02 03 01 00 01 30 0D 06 09 2A 86 48 86 F7 .o.....0...*.H.. 9F20: 0D 01 01 05 05 00 03 81 81 00 B6 97 C5 57 17 3D .............W.= 9F30: FE 16 CE BF A1 6C B3 D3 E1 B3 72 60 D6 0E 73 6E .....l....r`..sn 9F40: 54 BA 05 DB 2B 21 92 CA F0 8C 32 51 EE 75 48 3D T...+!....2Q.uH= 9F50: D1 D6 BB CE 94 8A 0B 76 CB C0 D0 B7 65 1B B5 E1 .......v....e... 9F60: 20 92 66 EF 74 8A F7 C7 20 E7 6D 1D E9 69 5B 92 .f.t... .m..i[. 9F70: FC 10 5C 40 44 C0 96 F4 00 4B 6E 54 0E 47 ED 37 ..\@D....KnT.G.7 9F80: 13 7F AB 6A E4 80 C2 BB 2F 6B 72 F7 FD F6 61 93 ...j..../kr...a. 9F90: B2 F5 CE 95 D0 6D A0 65 46 BF 33 86 73 AC BD AB .....m.eF.3.s... 9FA0: 7F 4A 80 B8 13 97 37 61 4C 98 .J....7aL. Check of certificate "ocspTRTestUser516-rsa" failed. Reason: Peer's Certificate has been revoked. Checking for memory leaks... Actual leaks report (actual leaks: 7 total size: 235 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x81ea908 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] 0xab115d79 [5] 0xab1155f4 [6] 0xab115fb0 [7] 0xab114e09 [8] 0xab10e7a8 [9] 0xab1070ef [10] pk11_FindObjectByTemplate() at 0x80b000c [11] PK11_InitSlot() at 0x80bdbf0 [12] SECMOD_LoadPKCS11Module() at 0x80a645f [13] SECMOD_LoadModule() at 0x80b3303 [14] SECMOD_LoadModule() at 0x80b335a [15] nss_Init() at 0x807360f [16] NSS_Init() at 0x80737c8 Memory Leak (mel): Found leaked block of size 38 bytes at address 0x81f7770 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f75c [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 36 bytes at address 0x81d2a78 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PL_CreateOptState() at 0xc1902287 [3] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 25 bytes at address 0x81d4870 At time of allocation, the call stack was: [1] PR_Malloc() at 0xbf1124cc [2] PORT_Strdup() at 0x80ffbc3 [3] CERT_SetOCSPDefaultResponder() at 0x808f768 [4] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 20 bytes at address 0x81d2a48 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PL_CreateOptState() at 0xc1902277 [4] main() at 0x8070d84 Memory Leak (mel): Found leaked block of size 16 bytes at address 0x81edfe0 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f88b [5] main() at 0x80719c4 Memory Leak (mel): Found leaked block of size 12 bytes at address 0x81edf68 At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PORT_ZAlloc() at 0x80ffb00 [4] CERT_SetOCSPDefaultResponder() at 0x808f87b [5] main() at 0x80719c4 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 82 total size: 3291 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (25.28% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 512 bytes at address 0x81d1740 (15.56% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] _PR_InitTPD() at 0xbf110caf [4] _PR_ImplicitInitialization() at 0xbf119ef9 [5] PR_GetSpecialFD() at 0xbf125a4b [6] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 448 bytes (13.61% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc920900 [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 8 blocks totaling 192 bytes (5.83% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] ExpandMonitorCache() at 0xbf1104bf [5] _PR_InitCMon() at 0xbf110723 [6] _PR_ImplicitInitialization() at 0xbf119f2d [7] PR_GetSpecialFD() at 0xbf125a4b [8] main() at 0x8070d68 Block in use (biu): Found block of size 128 bytes at address 0x81d1c78 (3.89% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110488 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d29c8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 104 bytes at address 0x81d2be8 (3.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242ef [4] OCSP_InitGlobal() at 0x808a983 [5] nss_Init() at 0x8073352 [6] NSS_Init() at 0x80737c8 [7] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x8201ef8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] nss_InitLock() at 0x80f8016 [5] CERT_LockCertTrust() at 0x80dcef6 [6] CERT_GetCertTrust() at 0x80e5826 [7] pkix_pl_Pk11CertStore_CheckTrust() at 0x8154b32 [8] PKIX_PL_Cert_IsCertTrusted() at 0x81720e7 [9] pkix_Build_VerifyCertificate() at 0x81039f0 [10] pkix_BuildForwardDepthFirstSearch() at 0x81068a6 [11] pkix_Build_InitiateBuildChain() at 0x810b075 [12] PKIX_BuildChain() at 0x810bb9a [13] cert_VerifyCertChainPkix() at 0x809768f [14] cert_VerifyCertChain() at 0x8092622 [15] CERT_VerifyCertificate() at 0x8092e9c [16] CERT_VerifyCertificateNow() at 0x8093bc7 Block in use (biu): Found block of size 88 bytes at address 0x81f4820 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] PKIX_PL_Initialize() at 0x8123839 [5] PKIX_Initialize() at 0x810127c [6] nss_Init() at 0x807372f [7] NSS_Init() at 0x80737c8 [8] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d3aa8 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] InitializeArenas() at 0xc0500a60 [5] PR_CallOnce() at 0xbf11a9b3 [6] PL_ArenaAllocate() at 0xc0500b29 [7] PORT_ArenaAlloc() at 0x80ffd74 [8] secmod_NewModule() at 0x80b2728 [9] SECMOD_CreateModule() at 0x80b27d4 [10] SECMOD_LoadModule() at 0x80b32a1 [11] nss_Init() at 0x807360f [12] NSS_Init() at 0x80737c8 [13] main() at 0x807187c Block in use (biu): Found block of size 88 bytes at address 0x81d1c08 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_InitCMon() at 0xbf110714 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 88 bytes at address 0x81d2928 (2.67% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewLock() at 0xbf123bc1 [4] _PR_UnixInit() at 0xbf12d7c1 [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found 7 blocks totaling 78 bytes (2.37% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920c25 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 64 bytes at address 0x81fdae0 (1.94% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] fgetnetconfig() at 0xbc920b4e [3] getnetlist() at 0xbc9208ec [4] setnetconfig() at 0xbc91452d [5] __rpc_getconfip() at 0xbc94806f [6] gethostbyname_r() at 0xbc92eba2 [7] PR_GetHostByName() at 0xbf11b71a [8] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [9] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [10] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [11] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [12] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [13] CERT_CheckOCSPStatus() at 0x808e92a [14] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 48 bytes (1.46% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920bf3 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found 7 blocks totaling 43 bytes (1.31% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] gettoken() at 0xbc920e16 [3] fgetnetconfig() at 0xbc920b1e [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 36 bytes at address 0x81ea588 (1.09% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xbc9208cb [2] setnetconfig() at 0xbc91452d [3] __rpc_getconfip() at 0xbc94806f [4] gethostbyname_r() at 0xbc92eba2 [5] PR_GetHostByName() at 0xbf11b71a [6] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [7] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [8] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [9] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [10] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [11] CERT_CheckOCSPStatus() at 0x808e92a [12] main() at 0x8071ba1 Block in use (biu): Found 3 blocks totaling 33 bytes (1.00% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xb794b313 [2] getlookups() at 0xbc92107f [3] fgetnetconfig() at 0xbc920c61 [4] getnetlist() at 0xbc920900 [5] setnetconfig() at 0xbc91452d [6] __rpc_getconfip() at 0xbc94806f [7] gethostbyname_r() at 0xbc92eba2 [8] PR_GetHostByName() at 0xbf11b71a [9] pkix_pl_Socket_CreateByHostAndPort() at 0x8159a5a [10] pkix_HttpCertStore_FindSocketConnection() at 0x814682b [11] pkix_pl_HttpDefaultClient_RequestCreateFcn() at 0x81499ba [12] ocsp_GetEncodedOCSPResponseFromRequest() at 0x808d42f [13] ocsp_GetOCSPStatusFromNetwork() at 0x808eaae [14] CERT_CheckOCSPStatus() at 0x808e92a [15] main() at 0x8071ba1 Block in use (biu): Found block of size 32 bytes at address 0x81d2290 (0.97% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] ExpandMonitorCache() at 0xbf110613 [4] _PR_InitCMon() at 0xbf110723 [5] _PR_ImplicitInitialization() at 0xbf119f2d [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 Block in use (biu): Found block of size 24 bytes at address 0x81d2998 (0.73% of total) At time of allocation, the call stack was: [1] calloc() at 0xb79308a0 [2] PR_Calloc() at 0xbf11253e [3] PR_NewMonitor() at 0xbf1242dd [4] _PR_UnixInit() at 0xbf12d7cc [5] _PR_ImplicitInitialization() at 0xbf119f7e [6] PR_GetSpecialFD() at 0xbf125a4b [7] main() at 0x8070d68 execution completed, exit code is 0 memleak.sh: iopr-dochinups.red.iplanet.com produced a returncode of 1, expected is 0 FAILED ================================================ Done testing ocsp interoperability with dochinups.red.iplanet.com TinderboxPrint:OPT Lk bytes: 8638 TinderboxPrint:OPT Lk blocks: 115