Wireshark-bugs: [Wireshark-bugs] [Bug 13019] SSL decryption memory leak when using large key log
Date: Sun, 16 Oct 2016 21:57:04 +0000

changed bug 13019


What Removed Added
Status UNCONFIRMED RESOLVED
Resolution --- DUPLICATE

Comment # 1 on bug 13019 from
The SSL key log file is loaded into a hashtable for efficient lookups,
otherwise the whole file has to be scanned for every new session which is
rather inefficient.

When you close the capture file, the memory should be released again. The 8MB
chunk size is indeed likely to be a property of the heap allocator.

Workaround: do not create such gigantic keylog files.

*** This bug has been marked as a duplicate of bug 12804 ***


You are receiving this mail because:
  • You are watching all bug changes.