On Wed, Apr 20, 2011 at 3:27 AM, Bernhard Thalmayr <bernhard.thalm...@painstakingminds.com> wrote: > Hi experts, it would be great if some could shed some light on the > following.... > > OpenAM web-agents are using NSS/NSPR for outbound connections. > > I get a core-dump of Apache http server when agent is doing outound > ssl-connection on Solaris 10 SPARC (32bit-apache httpd and nss) > > pstack shows me... > > bash-3.00# pstack httpd-core-nss-3.12.9-DBG | more > core 'httpd-core-nss-3.12.9-DBG' of 15276: /usr/apache2/bin/httpd -k > start > fe444b70 SSL_OptionGet (dde48, 1, ffbfe847, fffffff8, f9, ddfec) + 3d8 > fe6a2844 > __1cDsmiKConnectionMsecureSocket6MrknDstdMbasic_string4Ccn0CLchar_trai > ts4Cc__n0CJallocator4Cc____rk3bpnKPRFileDesc__9A_ (ffbff104, 177214, 177218, > fe7 > 5c9e9, dde48, fe7807b0) + 84 > > I've built NSS 3.12.9 with debug flags [... omitted...]
Since the NSS libraries are debug builds, please open the core file with gdb to get a better stack trace (that has function argument names and source file names and line numbers), and print the values of the relevant variables. SSL_OptionGet is a simple function. There are only a couple of places where it is likely to crash: http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/ssl/sslsock.c&rev=1.70&mark=755,809#754 It seems that the second argument passed to SSL_OptionGet is 1, which is SSL_SECURITY: http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/ssl/ssl.h&rev=1.41&mark=96#95 Wan-Teh -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto