allocate bio_err before memory debugging is enabled to avoid memory leaks
authorBodo Möller <bodo@openssl.org>
Tue, 19 Nov 2002 11:56:05 +0000 (11:56 +0000)
committerBodo Möller <bodo@openssl.org>
Tue, 19 Nov 2002 11:56:05 +0000 (11:56 +0000)
(we can't release it before the CRYPTO_mem_leaks() call!)

Submitted by: Nils Larsch

ssl/ssltest.c

index 035a4d2deb71f0ec4a188fc9f59801a31ba18ef6..c60a8acddbc628a7868e863890d483d1a9026df1 100644 (file)
@@ -385,7 +385,9 @@ int main(int argc, char *argv[])
        verbose = 0;
        debug = 0;
        cipher = 0;
-       
+
+       bio_err=BIO_new_fp(stderr,BIO_NOCLOSE); 
+
        CRYPTO_set_locking_callback(lock_dbg_cb);
 
        /* enable memory leak checking unless explicitly disabled */
@@ -403,7 +405,6 @@ int main(int argc, char *argv[])
 
        RAND_seed(rnd_seed, sizeof rnd_seed);
 
-       bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
        bio_stdout=BIO_new_fp(stdout,BIO_NOCLOSE);
 
        argc--;