summaryrefslogtreecommitdiff
path: root/epan/dissectors/packet-ssl-utils.h
diff options
context:
space:
mode:
authorMichael Mann <mmann78@netscape.net>2015-01-11 19:48:54 -0500
committerMichael Mann <mmann78@netscape.net>2015-01-16 00:37:02 +0000
commite530c899406d2212fb7cb8821d083fb4871ff718 (patch)
tree9bb1ef43a4ed562dfb7a19c4db4ecd17926801a7 /epan/dissectors/packet-ssl-utils.h
parent7d43836b3ad54073a98926450ff0bca7bc34ddeb (diff)
downloadwireshark-e530c899406d2212fb7cb8821d083fb4871ff718.tar.gz
Replace se alloced memory in compare stat tap.
Also replaced comments mentioning se_alloc memory with wmem_file_scope, since it's more accurate. It seems that many of the TShark stat taps may be leaking memory, because the hash tables created by the taps don't get a chance to be freed. Somewhat academic since TShark exits shortly after displaying any stats, but a leak none the less. Change-Id: I8ceecbd00d65b3442dc02d720b39c2e15aa0c8a6 Reviewed-on: https://code.wireshark.org/review/6557 Reviewed-by: Evan Huus <eapache@gmail.com> Reviewed-by: Michael Mann <mmann78@netscape.net>
Diffstat (limited to 'epan/dissectors/packet-ssl-utils.h')
-rw-r--r--epan/dissectors/packet-ssl-utils.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/epan/dissectors/packet-ssl-utils.h b/epan/dissectors/packet-ssl-utils.h
index eefe6df722..a74f3b911c 100644
--- a/epan/dissectors/packet-ssl-utils.h
+++ b/epan/dissectors/packet-ssl-utils.h
@@ -540,7 +540,7 @@ extern guint
ssl_private_key_hash (gconstpointer v);
/* private key table entries have a scope 'larger' then packet capture,
- * so we can't relay on se_alloc** function */
+ * so we can't rely on wmem_file_scope function */
extern void
ssl_private_key_free(gpointer id, gpointer key, gpointer dummy _U_);