[openssl-dev] PR for OpenSSL FIPS

2015-07-28 Thread Misaki.Miyashita
Hi, I would like the same change as the following PR to be applied to the OpenSSL FIPS module: https://github.com/openssl/openssl/pull/342 How should I proceed in this case? Should I make a pull request for the openssl:OpenSSL-fips-2_0-dev branch? Thank you, -- misaki -- Oracle Solaris

Re: [openssl-dev] [openssl.org #3931] OpenSSL 1.0.2(c, d) hangs on Sun T3 in OPENSSL_cpuid_setup()

2015-07-09 Thread Misaki.Miyashita
Hi Rick, Can you run the truss(1) command when you run openssl version as follows? i.e. % truss -lf -u libcrypto:: -u libpkcs11:: -o /tmp/truss.out openssl version The output will tell you more information about the function calls made by the openssl(1) application. Thank you, -- misaki

[openssl-dev] [openssl.org #3841] Uninitialized memory causes segmentation fault

2015-05-08 Thread Misaki.Miyashita via RT
Hi, We encountered a segmentation fault in our engine code as EVP_CIPHER-cleanup() is called before EVP_CIPHER_CTX-cipher_data gets initialized by EVP_CIPHER-init(). This can be prevented if EVP_CIPHER_CTX-cipher_data is initialized with 0s after the allocation in EVP_CipherInit_ex().

Re: Error _armv7_tick openssl

2014-10-10 Thread Misaki.Miyashita
On 10/10/14 10:15, Andy Polyakov wrote: If I press ‘continue’, then also it give segmentation fault. It is not working normally, it exits with seg fault: saying illegal instruction. ??? Segmentation fault != illegal instruction. What does exits with seg fault saying illegal instruction mean?

Re: [openssl.org #3387] Bug Report with fixes: null pointer and uninitialised memory errors

2014-06-09 Thread Misaki.Miyashita
Thank you, Tim. 2. Error: Null pointer dereference (CWE 476) Read from null pointer rctx at line 114 of components/openssl/openssl-1.0.1/build/sparcv9-wanboot/crypto/ocsp/ocsp_ht.c in function 'OCSP_REQ_CTX_free'. Function OCSP_sendreq_new may return constant 'NULL'

Re: [openssl.org #3387] Bug Report with fixes: null pointer and uninitialised memory errors

2014-06-09 Thread Misaki.Miyashita via RT
Thank you, Tim. 2. Error: Null pointer dereference (CWE 476) Read from null pointer rctx at line 114 of components/openssl/openssl-1.0.1/build/sparcv9-wanboot/crypto/ocsp/ocsp_ht.c in function 'OCSP_REQ_CTX_free'. Function OCSP_sendreq_new may return constant

Re: [openssl.org #3202] Request to remove _sparcv9_random

2013-12-30 Thread Misaki.Miyashita
... The SPARC random instruction was never implemented and never will be implemented. http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=926725b3d7c1528f2dc116a48623c42264188277 http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e79d34c24b96943ae653dc93371bcae19021 As

Re: [openssl.org #3202] Request to remove _sparcv9_random

2013-12-30 Thread Misaki.Miyashita via RT
... The SPARC random instruction was never implemented and never will be implemented. http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=926725b3d7c1528f2dc116a48623c42264188277 http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e79d34c24b96943ae653dc93371bcae19021 As

Re: [openssl.org #3201] EVP_DigestUpdate crashes because of a NULL pointer

2013-12-27 Thread Misaki.Miyashita via RT
Hi Steve, Sorry for the late response. Thank you for looking into the bug. In our case, EVP_MD_CTX_copy() failure was caused by an application bug. A child process was trying to use the session from its parent process, and that caused an issue down in pkcs11 engine. The application will be

Re: [openssl.org #3201] EVP_DigestUpdate crashes because of a NULL pointer

2013-12-27 Thread Misaki.Miyashita
Hi Steve, Sorry for the late response. Thank you for looking into the bug. In our case, EVP_MD_CTX_copy() failure was caused by an application bug. A child process was trying to use the session from its parent process, and that caused an issue down in pkcs11 engine. The application will be

[openssl.org #3202] Request to remove _sparcv9_random

2013-12-19 Thread Misaki.Miyashita via RT
Hi, We don't have RNG instructions, and calling _sparcv9_random() causes SIGILL and debug tools (i.e. gdb and mdb) stops when libcrypto.so is loaded (at _init()). % mdb `which openssl` ::run mdb: stop on SIGILL mdb: target stopped at: libcrypto.so.1.0.0`_sparcv9_random+4: random%d8

[openssl.org #3201] EVP_DigestUpdate crashes because of a NULL pointer

2013-12-13 Thread Misaki.Miyashita via RT
Hello, We have encountered a Segmentation Fault while trying to send a SSL packet via Oracle VM agent. The Segmentation Fault occurred when EVP_MD_CTX_copy() failed in tls1_mac(). tls1_mac() doesn't check the return code of EVP_MD_CTX_copy() and keep going, which results in Segmentation Fault

Segfault seen with OpenLDAP: locking callback issue

2013-12-05 Thread Misaki.Miyashita
Hello, We have been testing OpenLDAP with the latest OpenSSL 1.0.1e, and we encountered a segfault issue. libldap calls CRYPTO_set_locking_callback( tlso_locking_cb) where tlso_locking_cb is a function pointer in libldap address space. The problem occurs when libldap gets unloaded while

Re: Unable to trust leaf Certificate

2013-08-05 Thread Misaki.Miyashita
Thanks for the quick response, Steve. On 08/03/13 11:27, Dr. Stephen Henson wrote: On Fri, Aug 02, 2013, Misaki.Miyashita wrote: Hello, We have a server where its ServerCert is signed by an intermediateCA, which is signed by a RootCA. Currently, OpenSSL seems to require RootCA

Re: Unable to trust leaf Certificate

2013-08-05 Thread Misaki.Miyashita
Try commenting out the next line: if (sk_X509_num(ctx-chain) == 1) The following code block checks for an exact match of the EE certificate, but it is currently only performed if there is only one certificate in the chain. Commenting out that lnie means it tries to match

Unable to trust leaf Certificate

2013-08-02 Thread Misaki.Miyashita
Hello, We have a server where its ServerCert is signed by an intermediateCA, which is signed by a RootCA. Currently, OpenSSL seems to require RootCA cert to be installed (in the certs dir) in order to connect to the server. We would like a feature where the leaf certificate (ServerCert) can be

[openssl.org #3087] OpenSSL 1.0.2: seg fault with AES_CBC

2013-07-03 Thread Misaki.Miyashita via RT
Hi We've been testing OpenSSL 1.0.2 AES-CBC, and we encountered a seg fault when the input length is less than a block size. Looking at e_aes.c, aes_cbc_cipher() doesn't have the length check seen in aes_ecb_cipher(). I patched aes_cbc_cipher() as follows, and that seems to fix the seg fault

Re: MONTMUL performance: t4 engine vs inlined t4

2013-06-21 Thread Misaki.Miyashita
Hi Andy, Thank you so much for looking into the issue with Ferenc! I'll incorporate the change into Solaris to verify the 20-30% performance improvement. The conservative approach sounds like the best approach at this point. Once the performance improvement is verified, can you commit the

Re: MONTMUL performance: t4 engine vs inlined t4

2013-05-31 Thread Misaki.Miyashita
Hi Andy, The measurement I sent yesterday for OpenSSL (with inlined T4 instruction support) was not quite accurate. Some of the T4 specific code you committed was not enabled when we tested, and I realized that__sparc__ was not defined on our system. Thus, I changed #if defined(__sparc__) to

Re: MONTMUL performance: t4 engine vs inlined t4

2013-05-30 Thread Misaki.Miyashita
Hi Andy, On 05/30/13 15:08, Ferenc Rakoczi wrote: Hi, Andy, Andy Polyakov wrote: First of all, RSA512 is essentially irrelevant and no attempt was made to optimize it. So let's just disregard RSA512 results (I have even removed them from above quoted part). Secondly note that our RSA