init.sh init: Testing PATH .:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 against LIB /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib Running tests for memleak TIMESTAMP memleak BEGIN: Tue Oct 2 06:36:28 PDT 2007 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: Creating a CA Certificate TestCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA -f ../tests.pw.21242 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA... Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA -o root.cert cert.sh: Creating a CA Certificate serverCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -f ../tests.pw.21242 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA... Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -o root.cert cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -o root.cert cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -o root.cert cert.sh: Creating a CA Certificate clientCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -f ../tests.pw.21242 cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA... Module "RootCerts" added to database. cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -o root.cert cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -o root.cert cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -o root.cert cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw.21242 -z ../tests_noise.21242 -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing biarritz.red.iplanet.com's Cert DB (ext.) -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -f ../tests.pw.21242 cert.sh: Loading root cert module to biarritz.red.iplanet.com's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server... Module "RootCerts" added to database. cert.sh: Generate Cert Request for biarritz.red.iplanet.com (ext) -------------------------- certutil -s "CN=biarritz.red.iplanet.com, E=biarritz.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign biarritz.red.iplanet.com's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -i req -o biarritz.red.iplanet.com.cert -f ../tests.pw.21242 cert.sh: Import biarritz.red.iplanet.com's Cert -t u,u,u (ext) -------------------------- certutil -A -n biarritz.red.iplanet.com -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -f ../tests.pw.21242 -i biarritz.red.iplanet.com.cert cert.sh: Import Client Root CA -t T,, for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/clientCA.ca.cert cert.sh: Generate EC Cert Request for biarritz.red.iplanet.com (ext) -------------------------- certutil -s "CN=biarritz.red.iplanet.com, E=biarritz.red.iplanet.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -k ec -q secp256r1 -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign biarritz.red.iplanet.com's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -i req -o biarritz.red.iplanet.com-ec.cert -f ../tests.pw.21242 cert.sh: Import biarritz.red.iplanet.com's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n biarritz.red.iplanet.com-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -f ../tests.pw.21242 -i biarritz.red.iplanet.com-ec.cert cert.sh: Import Client EC Root CA -t T,, for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/clientCA-ec.ca.cert cert.sh: Generate mixed EC Cert Request for biarritz.red.iplanet.com (ext) -------------------------- certutil -s "CN=biarritz.red.iplanet.com, E=biarritz.red.iplanet.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -k ec -q secp256r1 -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign biarritz.red.iplanet.com's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA -i req -o biarritz.red.iplanet.com-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import biarritz.red.iplanet.com's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n biarritz.red.iplanet.com-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -f ../tests.pw.21242 -i biarritz.red.iplanet.com-ecmixed.cert Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/chain-1-serverCA-ec.ca.cert cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/chain-2-serverCA-ec.ca.cert cert.sh: Import chain-2-serverCA CA -t u,u,u for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/chain-2-serverCA.ca.cert cert.sh: Import serverCA CA -t C,C,C for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/serverCA.ca.cert cert.sh: Import chain-1-serverCA CA -t u,u,u for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/chain-1-serverCA.ca.cert cert.sh: Import serverCA-ec CA -t C,C,C for biarritz.red.iplanet.com (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_server -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/serverCA-ec.ca.cert Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -f ../tests.pw.21242 cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client... Module "RootCerts" added to database. cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw.21242 cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -f ../tests.pw.21242 -i ExtendedSSLUser.cert cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/serverCA.ca.cert cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -k ec -q secp256r1 -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw.21242 cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -f ../tests.pw.21242 -i ExtendedSSLUser-ec.cert cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/serverCA/serverCA-ec.ca.cert cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -k ec -q secp256r1 -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -f ../tests.pw.21242 -i ExtendedSSLUser-ecmixed.cert Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/clientCA.ca.cert cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/chain-2-clientCA.ca.cert cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/chain-1-clientCA.ca.cert cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/chain-2-clientCA-ec.ca.cert cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/chain-1-clientCA-ec.ca.cert cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/ext_client -i /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/clientCA/clientCA-ec.ca.cert cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client... Module "RootCerts" added to database. cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -i ../CA/root.cert cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -i ../CA/ecroot.cert cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw.21242 cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 -i TestUser.cert cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw.21242 cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 -i TestUser-ec.cert cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client -f ../tests.pw.21242 -i TestUser-ecmixed.cert cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ biarritz.red.iplanet.com ------------------------------------ cert.sh: Initializing biarritz.red.iplanet.com's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 cert.sh: Loading root cert module to biarritz.red.iplanet.com's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server... Module "RootCerts" added to database. cert.sh: Import Root CA for biarritz.red.iplanet.com -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -i ../CA/root.cert cert.sh: Import EC Root CA for biarritz.red.iplanet.com -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -i ../CA/ecroot.cert cert.sh: Generate Cert Request for biarritz.red.iplanet.com -------------------------- certutil -s "CN=biarritz.red.iplanet.com, E=biarritz.red.iplanet.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign biarritz.red.iplanet.com's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o biarritz.red.iplanet.com.cert -f ../tests.pw.21242 cert.sh: Import biarritz.red.iplanet.com's Cert -------------------------- certutil -A -n biarritz.red.iplanet.com -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 -i biarritz.red.iplanet.com.cert cert.sh SUCCESS: biarritz.red.iplanet.com's Cert Created cert.sh: Generate EC Cert Request for biarritz.red.iplanet.com -------------------------- certutil -s "CN=biarritz.red.iplanet.com, E=biarritz.red.iplanet.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign biarritz.red.iplanet.com's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o biarritz.red.iplanet.com-ec.cert -f ../tests.pw.21242 cert.sh: Import biarritz.red.iplanet.com's EC Cert -------------------------- certutil -A -n biarritz.red.iplanet.com-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 -i biarritz.red.iplanet.com-ec.cert cert.sh SUCCESS: biarritz.red.iplanet.com's EC Cert Created cert.sh: Generate mixed EC Cert Request for biarritz.red.iplanet.com -------------------------- certutil -s "CN=biarritz.red.iplanet.com, E=biarritz.red.iplanet.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign biarritz.red.iplanet.com's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o biarritz.red.iplanet.com-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import biarritz.red.iplanet.com's mixed EC Cert -------------------------- certutil -A -n biarritz.red.iplanet.com-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server -f ../tests.pw.21242 -i biarritz.red.iplanet.com-ecmixed.cert cert.sh SUCCESS: biarritz.red.iplanet.com's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir... Module "RootCerts" added to database. cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -i ../CA/root.cert cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw.21242 cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 -i Alice.cert cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw.21242 cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 -i Alice-ec.cert cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/alicedir -f ../tests.pw.21242 -i Alice-ecmixed.cert cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir... Module "RootCerts" added to database. cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -i ../CA/root.cert cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw.21242 cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 -i Bob.cert cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw.21242 cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 -i Bob-ec.cert cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/bobdir -f ../tests.pw.21242 -i Bob-ecmixed.cert cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave... Module "RootCerts" added to database. cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -i ../CA/root.cert cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw.21242 cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 -i Dave.cert cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw.21242 cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 -i Dave-ec.cert cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/dave -f ../tests.pw.21242 -i Dave-ecmixed.cert cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve... Module "RootCerts" added to database. cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -i ../CA/root.cert cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -i ../CA/ecroot.cert cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw.21242 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 -i Eve.cert cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw.21242 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 -i Eve-ec.cert cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw.21242 -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eve -f ../tests.pw.21242 -i Eve-ecmixed.cert cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.21242 -i ../bobdir/Bob.cert cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.21242 -i ../dave/Dave.cert cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.21242 -i ../dave/Dave.cert cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.21242 -i ../eve/Eve.cert cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.21242 -i ../eve/Eve.cert cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.21242 -i ../bobdir/Bob-ec.cert cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t p,p,p -d ../alicedir -f ../tests.pw.21242 -i ../dave/Dave-ec.cert cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t p,p,p -d ../bobdir -f ../tests.pw.21242 -i ../dave/Dave-ec.cert cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/fips -f ../tests.fipspw.21242 cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/fips... Module "RootCerts" added to database. cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/fips... FIPS mode enabled. cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/fips -f ../tests.fipspw.21242 -k dsa -v 600 -m 500 -z ../tests_noise.21242 Generating key. This may take a few moments... cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves... Module "RootCerts" added to database. cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -i ../CA/ecroot.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 -------------------------- certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb163v1's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb163v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 -------------------------- certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb163v2's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb163v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 -------------------------- certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb163v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb163v3's EC Cert -------------------------- certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb163v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 -------------------------- certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb176v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb176v1's EC Cert -------------------------- certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb176v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 -------------------------- certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb208w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb208w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb208w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 -------------------------- certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb272w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb272w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb272w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 -------------------------- certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb304w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb304w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb304w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 -------------------------- certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2pnb368w1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2pnb368w1's EC Cert -------------------------- certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2pnb368w1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 -------------------------- certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb191v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb191v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 -------------------------- certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb191v2's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb191v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 -------------------------- certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb191v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb191v3's EC Cert -------------------------- certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb191v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 -------------------------- certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb239v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb239v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 -------------------------- certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb239v2's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb239v2-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 -------------------------- certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb239v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb239v3's EC Cert -------------------------- certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb239v3-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 -------------------------- certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb359v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb359v1's EC Cert -------------------------- certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb359v1-ec.cert cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 -------------------------- certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-c2tnb431r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-c2tnb431r1's EC Cert -------------------------- certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-c2tnb431r1-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb163 -------------------------- certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb163's EC Request -------------------------- certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistb163's EC Cert -------------------------- certutil -A -n Curve-nistb163-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistb163-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb233 -------------------------- certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb233's EC Request -------------------------- certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistb233's EC Cert -------------------------- certutil -A -n Curve-nistb233-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistb233-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb283 -------------------------- certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb283's EC Request -------------------------- certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistb283's EC Cert -------------------------- certutil -A -n Curve-nistb283-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistb283-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb409 -------------------------- certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb409's EC Request -------------------------- certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistb409's EC Cert -------------------------- certutil -A -n Curve-nistb409-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistb409-ec.cert cert.sh: Generate EC Cert Request for Curve-nistb571 -------------------------- certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistb571's EC Request -------------------------- certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistb571's EC Cert -------------------------- certutil -A -n Curve-nistb571-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistb571-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk163 -------------------------- certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk163's EC Request -------------------------- certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistk163's EC Cert -------------------------- certutil -A -n Curve-nistk163-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistk163-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk233 -------------------------- certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk233's EC Request -------------------------- certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistk233's EC Cert -------------------------- certutil -A -n Curve-nistk233-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistk233-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk283 -------------------------- certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk283's EC Request -------------------------- certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistk283's EC Cert -------------------------- certutil -A -n Curve-nistk283-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistk283-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk409 -------------------------- certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk409's EC Request -------------------------- certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistk409's EC Cert -------------------------- certutil -A -n Curve-nistk409-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistk409-ec.cert cert.sh: Generate EC Cert Request for Curve-nistk571 -------------------------- certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistk571's EC Request -------------------------- certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistk571's EC Cert -------------------------- certutil -A -n Curve-nistk571-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistk571-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp192 -------------------------- certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp192's EC Request -------------------------- certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistp192's EC Cert -------------------------- certutil -A -n Curve-nistp192-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistp192-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp224 -------------------------- certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp224's EC Request -------------------------- certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistp224's EC Cert -------------------------- certutil -A -n Curve-nistp224-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistp224-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistp256-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistp384-ec.cert cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-nistp521-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v1 -------------------------- certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-prime192v1's EC Cert -------------------------- certutil -A -n Curve-prime192v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-prime192v1-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v2 -------------------------- certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-prime192v2's EC Cert -------------------------- certutil -A -n Curve-prime192v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-prime192v2-ec.cert cert.sh: Generate EC Cert Request for Curve-prime192v3 -------------------------- certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime192v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-prime192v3's EC Cert -------------------------- certutil -A -n Curve-prime192v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-prime192v3-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v1 -------------------------- certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-prime239v1's EC Cert -------------------------- certutil -A -n Curve-prime239v1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-prime239v1-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v2 -------------------------- certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-prime239v2's EC Cert -------------------------- certutil -A -n Curve-prime239v2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-prime239v2-ec.cert cert.sh: Generate EC Cert Request for Curve-prime239v3 -------------------------- certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-prime239v3's EC Request -------------------------- certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-prime239v3's EC Cert -------------------------- certutil -A -n Curve-prime239v3-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-prime239v3-ec.cert cert.sh: Generate EC Cert Request for Curve-secp112r1 -------------------------- certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp112r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp112r1's EC Cert -------------------------- certutil -A -n Curve-secp112r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp112r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp112r2 -------------------------- certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp112r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp112r2's EC Cert -------------------------- certutil -A -n Curve-secp112r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp112r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp128r1 -------------------------- certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp128r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp128r1's EC Cert -------------------------- certutil -A -n Curve-secp128r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp128r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp128r2 -------------------------- certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp128r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp128r2's EC Cert -------------------------- certutil -A -n Curve-secp128r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp128r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160k1 -------------------------- certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp160k1's EC Cert -------------------------- certutil -A -n Curve-secp160k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp160k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160r1 -------------------------- certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp160r1's EC Cert -------------------------- certutil -A -n Curve-secp160r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp160r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp160r2 -------------------------- certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp160r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp160r2's EC Cert -------------------------- certutil -A -n Curve-secp160r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp160r2-ec.cert cert.sh: Generate EC Cert Request for Curve-secp192k1 -------------------------- certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp192k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp192k1's EC Cert -------------------------- certutil -A -n Curve-secp192k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp192k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp192r1 -------------------------- certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp192r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp192r1's EC Cert -------------------------- certutil -A -n Curve-secp192r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp192r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp224k1 -------------------------- certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp224k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp224k1's EC Cert -------------------------- certutil -A -n Curve-secp224k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp224k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp224r1 -------------------------- certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp224r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp224r1's EC Cert -------------------------- certutil -A -n Curve-secp224r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp224r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp256k1 -------------------------- certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp256k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp256k1's EC Cert -------------------------- certutil -A -n Curve-secp256k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp256k1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp256r1 -------------------------- certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp256r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp256r1's EC Cert -------------------------- certutil -A -n Curve-secp256r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp256r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp384r1 -------------------------- certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp384r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp384r1's EC Cert -------------------------- certutil -A -n Curve-secp384r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp384r1-ec.cert cert.sh: Generate EC Cert Request for Curve-secp521r1 -------------------------- certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-secp521r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-secp521r1's EC Cert -------------------------- certutil -A -n Curve-secp521r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-secp521r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect113r1 -------------------------- certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect113r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect113r1's EC Cert -------------------------- certutil -A -n Curve-sect113r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect113r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect113r2 -------------------------- certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect113r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect113r2's EC Cert -------------------------- certutil -A -n Curve-sect113r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect113r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect131r1 -------------------------- certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect131r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect131r1's EC Cert -------------------------- certutil -A -n Curve-sect131r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect131r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect131r2 -------------------------- certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect131r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect131r2's EC Cert -------------------------- certutil -A -n Curve-sect131r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect131r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163k1 -------------------------- certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect163k1's EC Cert -------------------------- certutil -A -n Curve-sect163k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect163k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163r1 -------------------------- certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect163r1's EC Cert -------------------------- certutil -A -n Curve-sect163r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect163r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect163r2 -------------------------- certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect163r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect163r2's EC Cert -------------------------- certutil -A -n Curve-sect163r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect163r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect193r1 -------------------------- certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect193r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect193r1's EC Cert -------------------------- certutil -A -n Curve-sect193r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect193r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect193r2 -------------------------- certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect193r2's EC Request -------------------------- certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect193r2's EC Cert -------------------------- certutil -A -n Curve-sect193r2-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect193r2-ec.cert cert.sh: Generate EC Cert Request for Curve-sect233k1 -------------------------- certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect233k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect233k1's EC Cert -------------------------- certutil -A -n Curve-sect233k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect233k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect233r1 -------------------------- certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect233r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect233r1's EC Cert -------------------------- certutil -A -n Curve-sect233r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect233r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect239k1 -------------------------- certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect239k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect239k1's EC Cert -------------------------- certutil -A -n Curve-sect239k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect239k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect283k1 -------------------------- certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect283k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect283k1's EC Cert -------------------------- certutil -A -n Curve-sect283k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect283k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect283r1 -------------------------- certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect283r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect283r1's EC Cert -------------------------- certutil -A -n Curve-sect283r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect283r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect409k1 -------------------------- certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect409k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect409k1's EC Cert -------------------------- certutil -A -n Curve-sect409k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect409k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect409r1 -------------------------- certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect409r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect409r1's EC Cert -------------------------- certutil -A -n Curve-sect409r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect409r1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect571k1 -------------------------- certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect571k1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect571k1's EC Cert -------------------------- certutil -A -n Curve-sect571k1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect571k1-ec.cert cert.sh: Generate EC Cert Request for Curve-sect571r1 -------------------------- certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign Curve-sect571r1's EC Request -------------------------- certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw.21242 cert.sh: Import Curve-sect571r1's EC Cert -------------------------- certutil -A -n Curve-sect571r1-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/eccurves -f ../tests.pw.21242 -i Curve-sect571r1-ec.cert cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so -dbdir /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions... Module "RootCerts" added to database. cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -i ../CA/root.cert cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw.21242 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -i ../CA/ecroot.cert cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw.21242 cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 -i TestExt.cert cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw.21242 cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 -i TestExt-ec.cert cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 -z ../tests_noise.21242 -o req Generating key. This may take a few moments... cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw.21242 cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -f ../tests.pw.21242 -i TestExt-ecmixed.cert cert.sh SUCCESS: TestExt's mixed EC Cert Created ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -2 Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? certutil options: y -1 n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -2 Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: Is this a critical extension [y/N]? certutil options: n -1 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -3 Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields, enter to omit: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil options: y 12341235123 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -3 Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields, enter to omit: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil options: y 3 test.com 214123 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -4 Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: Enter value for the CRL Issuer name: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter more value for the CRL distribution point extension [y/N] Is this a critical extension [y/N]? certutil options: 1 1 InstanceOfOtherName 2 rfc822Name 3 test.com 4 test@test.com 6 ediPArtyName 8 ipAddress 9 123451235 10 0 10 n n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -4 Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: Enter value for the CRL Issuer name: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter data: Select one of the following general name type: 1 - instance of other name 2 - rfc822Name 3 - dnsName 4 - x400Address 5 - directoryName 6 - ediPartyName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: Enter more value for the CRL distribution point extension [y/N] Is this a critical extension [y/N]? certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -5 Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 10 n ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -6 Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish Is this a critical extension [y/N]? certutil options: 0 1 2 3 4 5 6 10 y ################################################# certutil -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/cert_extensions -S -n TestExt -t u,u,u -o /tmp/cert -s CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw.21242 -z ../tests_noise.21242 -1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish Is this a critical extension [y/N]? certutil options: 1 2 3 4 5 6 10 n cert.sh: Skipping CRL Tests cert.sh cert.sh: finished cert.sh memleak.sh: DBX found: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx memleak.sh: Memory leak checking - server =============================== memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running server-32-libfreebl_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 24063) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_TraverseCertificates() at 0xac97d733 [11] NSSTrustDomain_TraverseCertificates() at 0xac9735a2 [12] PK11_TraverseSlotCerts() at 0xac9282f1 [13] CERT_GetSSLCACerts() at 0xac916d84 [14] serverCAListSetup() at 0xaf11d127 [15] PR_CallOnceWithArg() at 0xa8d1aa56 [16] SSL_ConfigSecureServer() at 0xaf11d465 Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_FindTrustForCertificate() at 0xac97cc3c [11] nssTrustDomain_FindTrustForCertificate() at 0xac973756 [12] fill_CERTCertificateFields() at 0xac978d21 [13] STAN_GetCERTCertificate() at 0xac97911d [14] convert_cert() at 0xac927957 [15] nssPKIObjectCollection_Traverse() at 0xac9770d7 [16] NSSTrustDomain_TraverseCertificates() at 0xac9735eb Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8170a38 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2430 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (34.24% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 512 bytes at address 0x80848b8 (21.07% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x80580b5 Block in use (biu): Found 8 blocks totaling 192 bytes (7.90% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 128 bytes at address 0x8084df0 (5.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 104 bytes at address 0x813cef0 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 104 bytes at address 0x8085b40 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085aa0 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085dc8 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitSymWrapKeysLock() at 0xaf10c6aa [6] SSL_ConfigServerSessionIDCache() at 0xaf12039b [7] main() at 0x8058865 Block in use (biu): Found block of size 88 bytes at address 0x8084d80 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x813dd58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x8058bfd Block in use (biu): Found block of size 88 bytes at address 0x8085d58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitClientSessionCacheLock() at 0xaf11b9b2 [6] SSL_ConfigServerSessionIDCache() at 0xaf120396 [7] main() at 0x8058865 Block in use (biu): Found block of size 32 bytes at address 0x8085408 (1.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 24 bytes at address 0x813cec0 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 24 bytes at address 0x8085b10 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 20 bytes at address 0x8085880 (0.82% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitLinker() at 0xa8d10dd8 [4] PR_Init() at 0xa8d19f69 [5] main() at 0x80580b5 Block in use (biu): Found block of size 12 bytes at address 0x80838b8 (0.49% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xa8d1230c [2] PR_ErrorInstallTable() at 0xa8d199d7 [3] nspr_InitializePRErrorTable() at 0xa8d195eb [4] PR_Init() at 0xa8d19f9c [5] main() at 0x80580b5 Block in use (biu): Found block of size 6 bytes at address 0x8084238 (0.25% of total) At time of allocation, the call stack was: [1] _strdup() at 0xa155018d [2] _PR_InitLinker() at 0xa8d10ded [3] PR_Init() at 0xa8d19f69 [4] main() at 0x80580b5 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is ON Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running server-32-libfreebl_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher B: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher C: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher D: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher E: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher F: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable strsclnt: SSL2 - 1 server certificates tested. memleak.sh: -------- Trying cipher :C001: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C002: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C003: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C004: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C005: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C006: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C007: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C008: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C009: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C00A: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C010: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C011: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C012: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C013: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher :C014: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher f: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher g: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher l: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher m: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -B -s -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 21366) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_TraverseCertificates() at 0xac97d733 [11] NSSTrustDomain_TraverseCertificates() at 0xac9735a2 [12] PK11_TraverseSlotCerts() at 0xac9282f1 [13] CERT_GetSSLCACerts() at 0xac916d84 [14] serverCAListSetup() at 0xaf11d127 [15] PR_CallOnceWithArg() at 0xa8d1aa56 [16] SSL_ConfigSecureServer() at 0xaf11d465 Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_FindTrustForCertificate() at 0xac97cc3c [11] nssTrustDomain_FindTrustForCertificate() at 0xac973756 [12] fill_CERTCertificateFields() at 0xac978d21 [13] STAN_GetCERTCertificate() at 0xac97911d [14] convert_cert() at 0xac927957 [15] nssPKIObjectCollection_Traverse() at 0xac9770d7 [16] NSSTrustDomain_TraverseCertificates() at 0xac9735eb Memory Leak (mel): Found leaked block of size 88 bytes at address 0x8170a38 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2430 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (34.24% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 512 bytes at address 0x80848b8 (21.07% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x80580b5 Block in use (biu): Found 8 blocks totaling 192 bytes (7.90% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 128 bytes at address 0x8084df0 (5.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 104 bytes at address 0x813cef0 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 104 bytes at address 0x8085b40 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085aa0 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085dc8 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitSymWrapKeysLock() at 0xaf10c6aa [6] SSL_ConfigServerSessionIDCache() at 0xaf12039b [7] main() at 0x8058865 Block in use (biu): Found block of size 88 bytes at address 0x8084d80 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x813dd58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x8058bfd Block in use (biu): Found block of size 88 bytes at address 0x8085d58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitClientSessionCacheLock() at 0xaf11b9b2 [6] SSL_ConfigServerSessionIDCache() at 0xaf120396 [7] main() at 0x8058865 Block in use (biu): Found block of size 32 bytes at address 0x8085408 (1.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 24 bytes at address 0x813cec0 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 24 bytes at address 0x8085b10 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 20 bytes at address 0x8085880 (0.82% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitLinker() at 0xa8d10dd8 [4] PR_Init() at 0xa8d19f69 [5] main() at 0x80580b5 Block in use (biu): Found block of size 12 bytes at address 0x80838b8 (0.49% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xa8d1230c [2] PR_ErrorInstallTable() at 0xa8d199d7 [3] nspr_InitializePRErrorTable() at 0xa8d195eb [4] PR_Init() at 0xa8d19f9c [5] main() at 0x80580b5 Block in use (biu): Found block of size 6 bytes at address 0x8084238 (0.25% of total) At time of allocation, the call stack was: [1] _strdup() at 0xa155018d [2] _PR_InitLinker() at 0xa8d10ded [3] PR_Init() at 0xa8d19f69 [4] main() at 0x80580b5 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... FIPS mode enabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is ON Running server-32-libfreebl_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/selfserv < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx memleak.sh: -------- DBX commands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_selfserv21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher d: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher e: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher i: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher j: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher k: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher n: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher v: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher y: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable memleak.sh: -------- Trying cipher z: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 (process id 18676) RTC: Enabling Error Checking... RTC: Running program... selfserv: normal termination Checking for memory leaks... Actual leaks report (actual leaks: 223 total size: 19624 bytes) Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_FindTrustForCertificate() at 0xac97cc3c [11] nssTrustDomain_FindTrustForCertificate() at 0xac973756 [12] fill_CERTCertificateFields() at 0xac978d21 [13] STAN_GetCERTCertificate() at 0xac97911d [14] convert_cert() at 0xac927957 [15] nssPKIObjectCollection_Traverse() at 0xac9770d7 [16] NSSTrustDomain_TraverseCertificates() at 0xac9735eb Memory Leak (mel): Found 111 leaked blocks with total size 9768 bytes At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] nssToken_TraverseCertificates() at 0xac97d733 [11] NSSTrustDomain_TraverseCertificates() at 0xac9735a2 [12] PK11_TraverseSlotCerts() at 0xac9282f1 [13] CERT_GetSSLCACerts() at 0xac916d84 [14] serverCAListSetup() at 0xaf11d127 [15] PR_CallOnceWithArg() at 0xa8d1aa56 [16] SSL_ConfigSecureServer() at 0xaf11d465 Memory Leak (mel): Found leaked block of size 88 bytes at address 0x815ff18 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 31 total size: 2430 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (34.24% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 512 bytes at address 0x80848b8 (21.07% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x80580b5 Block in use (biu): Found 8 blocks totaling 192 bytes (7.90% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x80580b5 Block in use (biu): Found block of size 128 bytes at address 0x8084df0 (5.27% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 104 bytes at address 0x813cef0 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 104 bytes at address 0x8085b40 (4.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085aa0 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x8085dc8 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitSymWrapKeysLock() at 0xaf10c6aa [6] SSL_ConfigServerSessionIDCache() at 0xaf12039b [7] main() at 0x8058865 Block in use (biu): Found block of size 88 bytes at address 0x8084d80 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 88 bytes at address 0x813dd58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x8058bfd Block in use (biu): Found block of size 88 bytes at address 0x8085d58 (3.62% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_InitClientSessionCacheLock() at 0xaf11b9b2 [6] SSL_ConfigServerSessionIDCache() at 0xaf120396 [7] main() at 0x8058865 Block in use (biu): Found block of size 32 bytes at address 0x8085408 (1.32% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x80580b5 Block in use (biu): Found block of size 24 bytes at address 0x813cec0 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x8058bfd Block in use (biu): Found block of size 24 bytes at address 0x8085b10 (0.99% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x80580b5 Block in use (biu): Found block of size 20 bytes at address 0x8085880 (0.82% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitLinker() at 0xa8d10dd8 [4] PR_Init() at 0xa8d19f69 [5] main() at 0x80580b5 Block in use (biu): Found block of size 12 bytes at address 0x80838b8 (0.49% of total) At time of allocation, the call stack was: [1] PR_Malloc() at 0xa8d1230c [2] PR_ErrorInstallTable() at 0xa8d199d7 [3] nspr_InitializePRErrorTable() at 0xa8d195eb [4] PR_Init() at 0xa8d19f9c [5] main() at 0x80580b5 Block in use (biu): Found block of size 6 bytes at address 0x8084238 (0.25% of total) At time of allocation, the call stack was: [1] _strdup() at 0xa155018d [2] _PR_InitLinker() at 0xa8d10ded [3] PR_Init() at 0xa8d19f69 [4] main() at 0x80580b5 execution completed, exit code is 0 memleak.sh: server-32-libfreebl_3-FIPS produced a returncode of 0, expected is 0 PASSED memleak.sh: Memory leak checking - client =============================== memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... FIPS mode disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running client-32-libfreebl_3-NORMAL PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com (process id 15962) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com (process id 15986) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com (process id 16010) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com (process id 16034) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com (process id 16058) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com (process id 16082) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com (process id 16107) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com (process id 16131) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com (process id 16155) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com (process id 16179) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com (process id 16203) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com (process id 16227) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com (process id 16251) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com (process id 16275) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com (process id 16299) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com (process id 16323) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com (process id 16347) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com (process id 16371) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com (process id 16395) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com (process id 16419) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com (process id 16443) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com (process id 16467) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com (process id 16491) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com (process id 16515) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com (process id 16539) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com (process id 16563) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com (process id 16587) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com (process id 16611) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com (process id 16635) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com (process id 16659) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com (process id 16683) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com (process id 16707) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com (process id 16731) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com (process id 16755) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com (process id 16779) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80c4a80 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_3-NORMAL produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is ON Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is OFF Running client-32-libfreebl_3-BYPASS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C A biarritz.red.iplanet.com (process id 12929) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher B under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C B biarritz.red.iplanet.com (process id 12953) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 0 memleak.sh: -------- Trying cipher C under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C C biarritz.red.iplanet.com (process id 12977) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher D under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C D biarritz.red.iplanet.com (process id 13001) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher E under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C E biarritz.red.iplanet.com (process id 13025) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher F under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C F biarritz.red.iplanet.com (process id 13049) RTC: Enabling Error Checking... RTC: Running program... strsclnt: SSL2 - 1 server certificates tested. Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C001 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C001 biarritz.red.iplanet.com (process id 13073) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C002 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C002 biarritz.red.iplanet.com (process id 13097) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C003 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C003 biarritz.red.iplanet.com (process id 13121) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C004 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C004 biarritz.red.iplanet.com (process id 13145) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C005 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C005 biarritz.red.iplanet.com (process id 13169) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C006 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C006 biarritz.red.iplanet.com (process id 13193) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C007 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C007 biarritz.red.iplanet.com (process id 13217) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C008 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C008 biarritz.red.iplanet.com (process id 13241) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C009 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C009 biarritz.red.iplanet.com (process id 13265) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C00A under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C00A biarritz.red.iplanet.com (process id 13289) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C010 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C010 biarritz.red.iplanet.com (process id 13313) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C011 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C011 biarritz.red.iplanet.com (process id 13337) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C012 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C012 biarritz.red.iplanet.com (process id 13361) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C013 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C013 biarritz.red.iplanet.com (process id 13385) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher :C014 under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C :C014 biarritz.red.iplanet.com (process id 13409) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com (process id 13433) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com (process id 13457) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c execution completed, exit code is 0 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com (process id 13481) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher f under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C f biarritz.red.iplanet.com (process id 13505) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher g under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C g biarritz.red.iplanet.com (process id 13529) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com (process id 13553) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com (process id 13577) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com (process id 13601) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher l under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C l biarritz.red.iplanet.com (process id 13625) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher m under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C m biarritz.red.iplanet.com (process id 13649) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 0 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com (process id 13673) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com (process id 13697) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com (process id 13721) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -B -s -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com (process id 13745) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80b77e0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b71e0 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80c10e8 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80c10a8 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 0 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_3-BYPASS produced a returncode of 0, expected is 0 PASSED memleak.sh: BYPASS is OFF Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... FIPS mode already disabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal PKCS #11 Module slots: 2 slots attached status: loaded slot: NSS Internal Cryptographic Services token: NSS Generic Crypto Services slot: NSS User Private Key and Certificate Services token: NSS Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... FIPS mode enabled. Using database directory /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak... Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: token: Builtin Object Token ----------------------------------------------------------- memleak.sh: FIPS is ON Running client-32-libfreebl_3-FIPS PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_LIBRARY_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Running selfserv: selfserv -D -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/server_memleak -n biarritz.red.iplanet.com -e biarritz.red.iplanet.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014cdefgijklmnvyz -t 5 memleak.sh: -------- Trying cipher c under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C c biarritz.red.iplanet.com (process id 10189) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher d under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C d biarritz.red.iplanet.com (process id 10213) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher e under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C e biarritz.red.iplanet.com (process id 10237) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher i under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C i biarritz.red.iplanet.com (process id 10261) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher j under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C j biarritz.red.iplanet.com (process id 10285) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher k under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C k biarritz.red.iplanet.com (process id 10309) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher n under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C n biarritz.red.iplanet.com (process id 10333) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher v under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C v biarritz.red.iplanet.com (process id 10357) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher y under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C y biarritz.red.iplanet.com (process id 10381) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6c88 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x80b2c38 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af330 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af2f0 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 24 bytes at address 0x8083c50 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 execution completed, exit code is 1 memleak.sh: -------- Trying cipher z under DBX: /usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64/dbx /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin/strsclnt < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx memleak.sh: -------- DBX comands (/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/run_strsclnt21242.dbx): dbxenv follow_fork_mode parent dbxenv rtc_mel_at_exit verbose dbxenv rtc_biu_at_exit verbose check -memuse -match 16 -frames 16 run -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. For information about new features see `help changes' To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc memuse checking - ON Running: strsclnt -q -p 8447 -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss -c 1000 -C z biarritz.red.iplanet.com (process id 10405) RTC: Enabling Error Checking... RTC: Running program... strsclnt: 0 cache hits; 9 cache misses, 0 cache not reusable Checking for memory leaks... Actual leaks report (actual leaks: 1 total size: 88 bytes) Memory Leak (mel): Found leaked block of size 88 bytes at address 0x80a6ca0 At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] 0x8e90fd85 [5] 0x8e90f60c [6] 0x8e90ffc0 [7] 0x8e90ee21 [8] 0x8e90e4d4 [9] 0x8e90756f [10] pk11_FindObjectByTemplate() at 0xac939b7c [11] PK11_InitSlot() at 0xac948730 [12] SECMOD_LoadPKCS11Module() at 0xac930021 [13] SECMOD_LoadModule() at 0xac93cc0b [14] SECMOD_LoadModule() at 0xac93cc62 [15] nss_Init() at 0xac90e8e5 [16] NSS_Initialize() at 0xac90eb85 Possible leaks report (possible leaks: 0 total size: 0 bytes) Checking for memory use... Blocks in use report (blocks in use: 79 total size: 3169 bytes) Block in use (biu): Found 8 blocks totaling 832 bytes (26.25% of total; avg block size 104) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 512 bytes at address 0x80827e0 (16.16% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] _PR_InitTPD() at 0xa8d10aeb [4] PR_Init() at 0xa8d19f21 [5] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 448 bytes (14.14% of total; avg block size 64) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 8 blocks totaling 192 bytes (6.06% of total; avg block size 24) At time of each allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] ExpandMonitorCache() at 0xa8d102cb [5] _PR_InitCMon() at 0xa8d1055f [6] PR_Init() at 0xa8d19f55 [7] main() at 0x8057d14 Block in use (biu): Found block of size 128 bytes at address 0x8082d18 (4.04% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d10294 [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 104 bytes at address 0x8083c80 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] OCSP_InitGlobal() at 0xac9110db [5] nss_Init() at 0xac90e537 [6] NSS_Initialize() at 0xac90eb85 [7] main() at 0x805814c Block in use (biu): Found block of size 104 bytes at address 0x8083a68 (3.28% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a23 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x8084ac8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] InitializeArenas() at 0xaa100a60 [5] PR_CallOnce() at 0xa8d1a7e1 [6] PL_ArenaAllocate() at 0xaa100b29 [7] PORT_ArenaAlloc() at 0xac96d6c4 [8] secmod_NewModule() at 0xac93c298 [9] SECMOD_CreateModule() at 0xac93c344 [10] SECMOD_LoadModule() at 0xac93cba9 [11] nss_Init() at 0xac90e8e5 [12] NSS_Initialize() at 0xac90eb85 [13] main() at 0x805814c Block in use (biu): Found block of size 88 bytes at address 0x8082ca8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_InitCMon() at 0xa8d10550 [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found block of size 88 bytes at address 0x80b2c50 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] __nss_InitLock() at 0xac96581e [5] ssl_LookupSID() at 0xaf11badb [6] ssl2_BeginClientHandshake() at 0xaf118fd6 [7] ssl_Do1stHandshake() at 0xaf11c303 [8] ssl_SecureSend() at 0xaf11e381 [9] ssl_Send() at 0xaf123808 [10] PR_Send() at 0xa8d0a582 [11] do_connects() at 0x8056552 [12] thread_wrapper() at 0x805507c [13] _pt_root() at 0xa8d2aa51 [14] _thr_setup() at 0xa159fd36 [15] _lwp_start() at 0xa15a0020 Block in use (biu): Found block of size 88 bytes at address 0x80839c8 (2.78% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewLock() at 0xa8d232f9 [4] _PR_UnixInit() at 0xa8d2cd11 [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 Block in use (biu): Found 7 blocks totaling 78 bytes (2.46% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d84 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 64 bytes at address 0x80af348 (2.02% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] fgetnetconfig() at 0xa6524cd6 [3] getnetlist() at 0xa6524b89 [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 48 bytes (1.51% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524d56 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found 7 blocks totaling 43 bytes (1.36% of total; avg block size 6) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] gettoken() at 0xa65255cf [3] fgetnetconfig() at 0xa6524ca7 [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 36 bytes at address 0x80af308 (1.14% of total) At time of allocation, the call stack was: [1] getnetlist() at 0xa6524b67 [2] setnetconfig() at 0xa65247f8 [3] __rpc_getconfip() at 0xa653d2b7 [4] getipnodebyname() at 0xa651c031 [5] get_addr() at 0xa5104669 [6] _getaddrinfo() at 0xa51042b6 [7] getaddrinfo() at 0xa510452e [8] PR_GetAddrInfoByName() at 0xa8d1c1c9 [9] client_main() at 0x80570e5 [10] main() at 0x8058209 Block in use (biu): Found 3 blocks totaling 33 bytes (1.04% of total; avg block size 11) At time of each allocation, the call stack was: [1] _strdup() at 0xa155018d [2] getlookups() at 0xa6525446 [3] fgetnetconfig() at 0xa6524dbe [4] getnetlist() at 0xa6524b9d [5] setnetconfig() at 0xa65247f8 [6] __rpc_getconfip() at 0xa653d2b7 [7] getipnodebyname() at 0xa651c031 [8] get_addr() at 0xa5104669 [9] _getaddrinfo() at 0xa51042b6 [10] getaddrinfo() at 0xa510452e [11] PR_GetAddrInfoByName() at 0xa8d1c1c9 [12] client_main() at 0x80570e5 [13] main() at 0x8058209 Block in use (biu): Found block of size 32 bytes at address 0x8083330 (1.01% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] ExpandMonitorCache() at 0xa8d1044e [4] _PR_InitCMon() at 0xa8d1055f [5] PR_Init() at 0xa8d19f55 [6] main() at 0x8057d14 Block in use (biu): Found 3 blocks totaling 24 bytes (0.76% of total; avg block size 8) At time of each allocation, the call stack was: [1] getlookups() at 0xa65253e6 [2] fgetnetconfig() at 0xa6524dbe [3] getnetlist() at 0xa6524b9d [4] setnetconfig() at 0xa65247f8 [5] __rpc_getconfip() at 0xa653d2b7 [6] getipnodebyname() at 0xa651c031 [7] get_addr() at 0xa5104669 [8] _getaddrinfo() at 0xa51042b6 [9] getaddrinfo() at 0xa510452e [10] PR_GetAddrInfoByName() at 0xa8d1c1c9 [11] client_main() at 0x80570e5 [12] main() at 0x8058209 Block in use (biu): Found block of size 24 bytes at address 0x8083a38 (0.76% of total) At time of allocation, the call stack was: [1] calloc() at 0xa1531853 [2] PR_Calloc() at 0xa8d1237e [3] PR_NewMonitor() at 0xa8d23a11 [4] _PR_UnixInit() at 0xa8d2cd1c [5] PR_Init() at 0xa8d19fa6 [6] main() at 0x8057d14 execution completed, exit code is 1 PATH=.:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/bin:/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/usr/ccs/bin:/tools/ns/bin:/usr/dist/pkgs/sunstudio_i386,v11.0/SUNWspro/prod/bin/amd64 LD_PATH=/share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/dist/SunOS5.10_i86pc_OPT.OBJ/lib:/usr/openwin/lib memleak.sh: -------- Stopping server: tstclnt -p 8447 -h biarritz.red.iplanet.com -c j -f -d /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/tests_results/security/biarritz.6/client_memleak -w nss < /share/builds/mccrel3/security/securityjes5/builds/20071001.1/wozzeck_Solaris8/mozilla/security/nss/tests/memleak/sslreq.dat subject DN: CN=biarritz.red.iplanet.com,E=biarritz.red.iplanet.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET /stop HTTP/1.0 EOF selfserv: normal termination memleak.sh: client-32-libfreebl_3-FIPS produced a returncode of 0, expected is 0 PASSED TinderboxPrint:OPT Lk bytes: 7304 TinderboxPrint:OPT Lk blocks: 83 TIMESTAMP memleak END: Tue Oct 2 07:01:55 PDT 2007