On Mon, Jul 23, 2012, Tayade, Nilesh wrote:

> > -----Original Message-----
> > From: owner-openssl-...@openssl.org [mailto:owner-openssl-
> > d...@openssl.org] On Behalf Of Andy Polyakov
> > Sent: Tuesday, June 26, 2012 6:46 PM
> > To: openssl-dev@openssl.org
> > Subject: Re: Core dump in RSA_check_key
> > 
> > >> I am seeing a core dump in RSA_check_key() function. The backtrace
> > is
> > >> as below.
> > 
> > What OS? Which OpenSSL version? Is it correct assumption that it's
> > custom/own program? Can you reproduce the problem with openssl utility,
> > with 'openssl rsa -in file.pem -check -noout')? Can you reproduce it
> > with 'openssl genrsa 2048 | openssl -check -noout'? Then there is big
> > question if sha1-x86_64.s:2240 is reliable. To answer that question you
> > have run 'disassemble' at gdb prompt and proceed till you see failed
> > instruction (marked with => or something) and write it down. What's
> > 'info reg' at that point? If we are talking about this segment:
> Sorry to get back after a long while. I am seeing this on Linux with custom 
> kernel.
> OpenSSL version: 1.0.0g-fips.
> 

That's an non-standard version of OpenSSL. There is no official "1.0.0g-fips".

See if you can repeat that with a standard version of OpenSSL.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to