> -----Original Message-----
> From: owner-openssl-...@openssl.org [mailto:owner-openssl-
> d...@openssl.org] On Behalf Of Andy Polyakov
> Sent: Tuesday, July 24, 2012 2:56 PM
> To: openssl-dev@openssl.org
> Subject: Re: Core dump in RSA_check_key

Thanks for taking a look at this one, Andy.

[...]
> Question was not about kernel, but about *program* suffering from
> crash.

[...]
 
> > OpenSSL version: 1.0.0g-fips.
> 
> I'd agree with Stephen that you should try something that we actually
> stand behind [or turn to party responsible for 1.0.0g-fips]. Provided
> that it's unlikely to be problem with assembler code [see below], there
> is chance that you'll be able to reproduce problem with pure C debug
> build, one that wouldn't show "optimized out" values. So that this
> should be next step, i.e. try to reproduce it with build that would
> allow to accurately examine complete back-trace.
This is the one currently present on production system. So I can't change it.

[...]
> 
> As %r9 is larger than r10% there is only one possibility: length
> argument was 0 or "negative". It's unlikely to be 0, because caller,
> HASH_UPDATE in md32_common.h, ensures that, so it ought to be
> "negative". "Negative" is in quotes, because length is treated as
> unsigned and looking at sign is not really appropriate. Well, one can
> argue that presence of sign is definitely wrong because there are no
> processors that offer that large *physically* addressable memory, but
> from formal programming viewpoint it would be inappropriate to examine
> sign bit. But the original statement that it must be result of
> corruption elsewhere holds true.

That is true. On my own system I have openssl-1.0.0b, and on debugging I found 
other program introducing corruption in memory.
And it would surface in this module. So 'corruption elsewhere' is true.
Thanks for your help.

--
Thanks,
Nilesh 
 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to