> [...@rfc1035.com - Sun Mar 28 14:59:50 2010]: > > Hi. I compiled the current ntp release on a recent-ish amd64 Linux > box. It links the libcrypto from 1.0.0beta. That was compiled and > installed earlier: a "make test" just before OpenSSL was installed > reported no errors. Here's the stack backtrace from gdb. > > Please let me know if you want further info to find the bug. > > gdb ntpd > GNU gdb (GDB; openSUSE 11.1) 6.8.50.20081120-cvs > Copyright (C) 2008 Free Software Foundation, Inc. > License GPLv3+: GNU GPL version 3 or later > <http://gnu.org/licenses/gpl.html > > > This is free software: you are free to change and redistribute it. > There is NO WARRANTY, to the extent permitted by law. Type "show > copying" > and "show warranty" for details. > This GDB was configured as "x86_64-suse-linux". > For bug reporting instructions, please see: > <http://bugs.opensuse.org/>... > (gdb) run -n -g > Starting program: /usr/src/local/ntp-4.2.6/ntpd/ntpd -n -g > [Thread debugging using libthread_db enabled] > > Program received signal SIGSEGV, Segmentation fault. > 0x00007ffff78bdeb9 in EVP_PKEY_CTX_free () from /usr/local/lib/ > libcrypto.so.1.0.0 > Current language: auto; currently asm > (gdb) bt > #0 0x00007ffff78bdeb9 in EVP_PKEY_CTX_free () from /usr/local/lib/ > libcrypto.so.1.0.0 > #1 0x00007ffff78b203f in EVP_MD_CTX_cleanup () from /usr/local/lib/ > libcrypto.so.1.0.0 > #2 0x00007ffff78b23e0 in EVP_DigestFinal () from /usr/local/lib/ > libcrypto.so.1.0.0 > #3 0x0000000000452499 in addr2refid (addr=0x6e7ac0) at > a_md5encrypt.c: > 135 > #4 0x000000000041069c in io_open_sockets () at ntp_io.c:843 > #5 0x00000000004078f2 in config_ntpd (ptree=0x6e76b0) at > ntp_config.c: > 3690 > #6 0x000000000040adf7 in getconfig (argc=0, argv=0x7fffffffe5c0) at > ntp_config.c:3876 > #7 0x000000000041430a in ntpdmain (argc=0, argv=0x7fffffffe5a8) at > ntpd.c:862 > #8 0x00007ffff7293586 in __libc_start_main () from /lib64/libc.so.6 > #9 0x0000000000405d79 in _start () at > ../sysdeps/x86_64/elf/start.S:113 > (gdb) quit > >
A possibility is that you are compiling the application against the OpenSSL 0.9.8 header files instead of the 1.0.0 ones. In particular I'd expect a crash in EVP_PKEY_CTX_free() under those circumstances as it would attempt to free up a garbage pointer. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org