> [john_fitzgib...@yahoo.com - Sat Mar 31 07:50:09 2012]:
> 
> This is happening because of the following, (which looks like a bug),
> in ssl/d1_srvr.c, line 923:
> 
>                 Time=(unsigned long)time(NULL);                 /*
> Time */
>                 l2n(Time,p);
>                 RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-sizeof(Time));
> 
> 
> sizeof(Time) is 8 bytes in x86_84, but l2n() has only advanced the
> pointer 4 bytes.
> 
> 
> This leaves 4 bytes of uninitialized data exposed in the random bytes
> field for x68_64.
> 
> Unless l2n() can do something different on other platforms, line 923
> should be more explicit:
> 
>                 RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4);
> 

Fixed now, thanks for the report.

> With this fix, my "no-asm" 64bit DTLS test yields a pcap that matches
> the 32 bit build.
> 
> ... that isolates the problem to the 64 bit assember changes between
> 1.0.0 and 1.0.1,
> specifically, (it would seem), for SHA-1.
> 
> 

Andy has made some recent fixes to the AES code too which may be
relevant. Please check the next snapshot to see if you still have problems.

Steve.
-- 
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to