I just tried this against 1.0.2 and got a backtrace: #0 0x00007ffff7847c37 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:56 #1 0x00007ffff784b028 in __GI_abort () at abort.c:89 #2 0x0000000000401cfe in my_alloc (n=176) at a.c:4 #3 0x000000000044e525 in default_malloc_ex (num=176, file=0x5ca5ce "lhash.c", line=120) at mem.c:79 #4 0x000000000044ebb5 in CRYPTO_malloc (num=176, file=0x5ca5ce "lhash.c", line=120) at mem.c:330 #5 0x0000000000486d58 in lh_new (h=0x4515f7 <obj_name_LHASH_HASH>, c=0x451619 <obj_name_LHASH_COMP>) at lhash.c:120 #6 0x000000000045167e in OBJ_NAME_init () at o_names.c:61 #7 0x0000000000451a68 in OBJ_NAME_add (name=0x58bccb "DES-CBC", type=2, data=0x5cace0 <des_cbc> "\037") at o_names.c:185 #8 0x0000000000490a31 in EVP_add_cipher (c=0x5cace0 <des_cbc>) at names.c:74 #9 0x0000000000421d6e in SSL_library_init () at ssl_algs.c:68
-- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4559 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev