Moin Moritz,

[ ObContext: http://bugs.debian.org/335977 ]

On Tue, 08 Nov 2005, Moritz Naumann wrote:

> Hi again,
> 
> a friend has investigated this further and sent me this report:
> 
> > __malloc_initialize_hook should probably not be called - which would
> > mean that there is something wrong with libcrypto.so.
> > 
> > If you look at
> > int EVP_CIPHER_CTX_cleanup(EVP_CIPHER_CTX *c)
> > on http://cvs.openssl.org/getfile/openssl/crypto/evp/evp_enc.c?v=1.42.2.1
> > (never mind the version, look for "int EVP_CIPHER_CTX_cleanup" on this
> > page), you won't find a reference to anything like 'malloc' (*). So it
> > seems to me like some function call does not end up where it should. I'd
> > bet on a build problem with this library.
> > 
> > That means if you'd download openssl 0.9.8, compile it and install
> > libcrypto (with libopenssl, just to be sure :-) yourself, I assume it
> > would work without any changes to the code.
> > 
> > (*): AFAIK, the __init_malloc_hook should be called exactly _once_ for a
> > process, at the first malloc _or_ free call. But as there shouldn't be
> > any free without a malloc I'd assume that __init_malloc_hook has been
> > called already, thus the call to __init_malloc_hook is a bogus call.
> 
> Hope this helps in diagnosing this further.
> 
> Moritz
> 

Is Tor 0.1.0.16 still broken with your openssl?  What about 0.1.1.x?
Did we ever change anything with that or did the problem go away?

-- 
 PGP signed and encrypted  |  .''`.  ** Debian GNU/Linux **
    messages preferred.    | : :' :      The  universal
                           | `. `'      Operating System
 http://www.palfrader.org/ |   `-    http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to