On Thu, Feb 15, 2001 at 06:42:54PM -0700, Benjamin Collar wrote:
> I'm writing to both openssl-users and net-snmp-users because I'm not sure
> where the bug really lies, but here's the deal:
> 
> I've compiled net-snmp latest stable and openssl latest stable with -g
> using gcc on AIX 4.2.1. All net-snmp apps segfault instantly. This will
> cease to happen if I don't use openssl.
> 
[not understandable stuff deleted.]

> [using memory image in core]
> 
> Segmentation fault in RAND_bytes at 0xd0c7e644
> 0xd0c7e644 (RAND_bytes+0x8) 800c0000        lwz   r0,0x0(r12)

While you have compiled with "-g" you still did not extract the
line number information. Did you strip (ld -s option) the executable?
If you have compiled with debugging support and not stripped,
you should receive a backtrace with line numbers in it.

> hahah, what the heck does all that mean??? I know RAND_bytes is in
> openssl, but all the stabstring stuff? I dunno.

Having said the above: the code in RAND_bytes does only access locations
allocated as static arrays, so I would be most surprised to see the problem
in RAND_bytes.
There is just one exception and that is the memory to which the random
bytes are written.

Please make sure that "buf" is pointing to a correct memory location and
is large enough to hold the number "num" of bytes requested.
As the software is nice enough to SEGV you can run it under the control
of the debugger and it should even jump to the offending location in
the source.

Sincere regards,
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
BTU Cottbus               http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik                  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus              Fax. +49 355 69-4153
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to