On 12/17/2013 03:17 AM, Claus Assmann wrote:
Can you please try putting a breakpoint on sha1_block_data_order_ssse3,
and checking what the value of %rsp is at the start of the function?
Breakpoint 5, sha1_block_data_order_ssse3 () at sha1-x86_64.s:1295
1295 pushq %rbx
Current language: auto; currently asm
(gdb) p $rsp
$15 = (void *) 0x8007360a0
[looks ok]
Actually, it doesn'ton function entry, %rsp must be congruent 8 modulo
16. Could you do the same thing (breakpoint and look at %rsp) for the
callers up the call stack?
Do you link dynamically or statically? What's your GCC version?
--
Florian Weimer / Red Hat Product Security Team
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager majord...@openssl.org