Hello,

I'm the author of siege.  That program is dumping core on Red Hat
systems in the following function: X509_get_subject_name  

Here's the function which calls it:

BOOLEAN
SSL_initialize(CONN *C)
{
#ifdef HAVE_SSL
  int  serr;
  char *str;

  C->ssl    = NULL;
  C->ctx    = NULL;
  C->method = NULL;
  C->cert   = NULL;

  SSL_load_error_strings();
  SSLeay_add_ssl_algorithms();
  C->method = SSLv2_client_method();
  C->ctx    = SSL_CTX_new(C->method);
  C->ssl    = SSL_new(C->ctx);
  SSL_set_fd(C->ssl, C->sock);
  serr = SSL_connect(C->ssl);
  C->cert   = SSL_get_peer_certificate(C->ssl);
  str       = X509_NAME_oneline(X509_get_subject_name(C->cert), 0, 0);
  if(my.debug){printf("X509 subject: %s\n", str); fflush(stdout); }
  str       = X509_NAME_oneline(X509_get_issuer_name(C->cert), 0, 0);
  if(my.debug){printf("X509 issuer:  %s\n", str); fflush(stdout); }
  X509_free(C->cert);
  return TRUE;
#else
  return FALSE;
#endif/*HAVE_SSL*/
}

Any thoughts?


-- 
#include <stdio.h>
int main(){int a[]={74,117,115,116,32,97,110,111,116,104,101,114,32, \
67,32,104,97,99,107,101,114,10,0}; int *b=a;while(*b>0)putchar(*b++);}
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to