On 12/17/2013 03:17 AM, Claus Assmann wrote:

Can you please try putting a breakpoint on sha1_block_data_order_ssse3,
and checking what the value of %rsp is at the start of the function?

Breakpoint 5, sha1_block_data_order_ssse3 () at sha1-x86_64.s:1295
1295    pushq   %rbx
Current language:  auto; currently asm
(gdb) p $rsp
$15 = (void *) 0x8007360a0
[looks ok]

Actually, it doesn'ton function entry, %rsp must be congruent 8 modulo 16. Could you do the same thing (breakpoint and look at %rsp) for the callers up the call stack?

Do you link dynamically or statically?  What's your GCC version?

--
Florian Weimer / Red Hat Product Security Team
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to