Moin Moritz, [ ObContext: http://bugs.debian.org/335977 ]
On Tue, 08 Nov 2005, Moritz Naumann wrote: > Hi again, > > a friend has investigated this further and sent me this report: > > > __malloc_initialize_hook should probably not be called - which would > > mean that there is something wrong with libcrypto.so. > > > > If you look at > > int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c) > > on http://cvs.openssl.org/getfile/openssl/crypto/evp/evp_enc.c?v=1.42.2.1 > > (never mind the version, look for "int EVP_CIPHER_CTX_cleanup" on this > > page), you won't find a reference to anything like 'malloc' (*). So it > > seems to me like some function call does not end up where it should. I'd > > bet on a build problem with this library. > > > > That means if you'd download openssl 0.9.8, compile it and install > > libcrypto (with libopenssl, just to be sure :-) yourself, I assume it > > would work without any changes to the code. > > > > (*): AFAIK, the __init_malloc_hook should be called exactly _once_ for a > > process, at the first malloc _or_ free call. But as there shouldn't be > > any free without a malloc I'd assume that __init_malloc_hook has been > > called already, thus the call to __init_malloc_hook is a bogus call. > > Hope this helps in diagnosing this further. > > Moritz > Is Tor 0.1.0.16 still broken with your openssl? What about 0.1.1.x? Did we ever change anything with that or did the problem go away? -- PGP signed and encrypted | .''`. ** Debian GNU/Linux ** messages preferred. | : :' : The universal | `. `' Operating System http://www.palfrader.org/ | `- http://www.debian.org/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]