Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-17 Thread John Unsworth
Good call.

I built with just solaris-sparcv9-cc and that works fine. Adding -xcode=pic32 
introduces the problems. I need that flag because I am adding the openssl 
static library into my shared library.

John.

-Original Message-
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Carson Gaspar
Sent: 16 April 2015 21:33
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

As a counter-example, I just built OpenSSL 1.0.2a 32-bit on SPARC and 
'make test' is just fine.

Host: Sun Fire v490
Compiler: Solaris Studio 12.2
OS: Solaris 10 u9
Configure args: solaris-sparcv9-cc

So I suspect the OP is suffering from some local issue.

-- 
Carson
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-16 Thread John Unsworth
This is from 1.0.1m openssl s_client:

TLSv1/SSLv3, Cipher is AES256-GCM-SHA384

1.0.2 make test built with asm gets this far

../util/shlib_wrap.sh ./destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test
../util/shlib_wrap.sh ./ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
../util/shlib_wrap.sh ./shatest
test 1 ok
test 2 ok
test 3 ok
../util/shlib_wrap.sh ./sha1test
make[1]: *** [test_sha] Segmentation Fault (core dumped)

1.0.2 make test built with no-asm gets this far:

../util/shlib_wrap.sh ./destest
Doing cbcm
Doing ecb
Doing ede ecb
Doing cbc
Doing desx cbc
Doing ede cbc
Doing pcbc
Doing cfb8 cfb16 cfb32 cfb48 cfb64 cfb64() ede_cfb64() done
Doing ofb
Doing ofb64
Doing ede_ofb64
Doing cbc_cksum
Doing quad_cksum
input word alignment test 0 1 2 3
output word alignment test 0 1 2 3
fast crypt test
../util/shlib_wrap.sh ./ideatest
ecb idea ok
cbc idea ok
cfb64 idea ok
../util/shlib_wrap.sh ./shatest
test 1 ok
test 2 ok
test 3 ok
../util/shlib_wrap.sh ./sha1test
test 1 ok
test 2 ok
test 3 ok
../util/shlib_wrap.sh ./sha256t
Testing SHA-256 ... passed.
Testing SHA-224 ... passed.
../util/shlib_wrap.sh ./sha512t
Testing SHA-512 ... passed.
Testing SHA-384 ... passed.
../util/shlib_wrap.sh ./md4test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
../util/shlib_wrap.sh ./md5test
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
../util/shlib_wrap.sh ./hmactest
test 0 ok
test 1 ok
test 2 ok
test 3 ok
../util/shlib_wrap.sh ./md2test
No MD2 support
../util/shlib_wrap.sh ./mdc2test
pad1 - ok
pad2 - ok
../util/shlib_wrap.sh ./wp_test
Testing Whirlpool . passed.
../util/shlib_wrap.sh ./rmdtest
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test 6 ok
test 7 ok
test 8 ok
../util/shlib_wrap.sh ./rc2test
ecb RC2 ok
../util/shlib_wrap.sh ./rc4test
test 0 ok
test 1 ok
test 2 ok
test 3 ok
test 4 ok
test 5 ok
test end processing done
test multi-call done
bulk test ok
../util/shlib_wrap.sh ./rc5test
No RC5 support
../util/shlib_wrap.sh ./bftest
testing blowfish in raw ecb mode
testing blowfish in ecb mode
testing blowfish set_key
testing blowfish in cbc mode
testing blowfish in cfb64 mode
testing blowfish in ofb64
../util/shlib_wrap.sh ./casttest
ecb cast5 ok
This test will take some time123456789ABCDEF ok
../util/shlib_wrap.sh ./randtest
test 1 done
test 2 done
test 3 done
test 4 done
starting big number library test, could take a while...
test BN_add
test BN_sub
test BN_lshift1
test BN_lshift (fixed)
test BN_lshift
test BN_rshift1
test BN_rshift
test BN_sqr
Square test failed!
make[1]: *** [test_bn] Error 1
make[1]: Leaving directory 
`/export/home/metabld/META_OpenSSL/openssl-1.0.2/test'
make: *** [tests] Error 2

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 21:09
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

This appears to be a different problem than the crash in SHA.  Since you're 
seeing a bad record mac, it appears the TLS handshake has made it through the 
ChangeCipherSpec message.  Do you know which cipher suite is being negotiated?  
If it's AES, it may be worth trying a 3DES cipher suite.  If the issue is in 
the AES layer, one of the 3DES cipher suites should work.

By the way, have you run a 'make test' after building OpenSSL?  Are all the 
test suites passing?  If not, which one is failing?

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-16 Thread Carson Gaspar
As a counter-example, I just built OpenSSL 1.0.2a 32-bit on SPARC and 
'make test' is just fine.


Host: Sun Fire v490
Compiler: Solaris Studio 12.2
OS: Solaris 10 u9
Configure args: solaris-sparcv9-cc

So I suspect the OP is suffering from some local issue.

--
Carson

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-16 Thread Viktor Dukhovni
On Thu, Apr 16, 2015 at 01:54:08PM -0700, Carson Gaspar wrote:

 I pushed an update to a test script in the master branch that uses
 the POSIX export syntax, and perhaps folks still using SunOS 5.10
 might be unhappy if that breaks (when 1.1.x comes out).
 
 /bin/sh is non-POSIX on Solaris 5.10. One must use /usr/xpg4/bin/sh (or ksh,
 bash, etc.) if one expects 'export foo=bar' to work.

So I guess we'll have to modify that test script, on the assumption
that SunOS 5.10 (Solaris 10) might have OpenSSL 1.1.0 users when
that comes later out.

-- 
Viktor.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-16 Thread Carson Gaspar

On 4/16/15 1:49 PM, Viktor Dukhovni wrote:


Somewhat (Solaris) related question:

 * Do you have access to  any SunOS 5.10 systems?

 * If you do, can you check whether /bin/sh supports
   the POSIX export built-in syntax:

export NAME=value

   or does one have to write (in some order):

NAME=value; export NAME

I pushed an update to a test script in the master branch that uses
the POSIX export syntax, and perhaps folks still using SunOS 5.10
might be unhappy if that breaks (when 1.1.x comes out).


/bin/sh is non-POSIX on Solaris 5.10. One must use /usr/xpg4/bin/sh (or 
ksh, bash, etc.) if one expects 'export foo=bar' to work.


--
Carson

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-16 Thread Viktor Dukhovni
On Thu, Apr 16, 2015 at 01:33:16PM -0700, Carson Gaspar wrote:

 As a counter-example, I just built OpenSSL 1.0.2a 32-bit on SPARC and 'make
 test' is just fine.

Somewhat (Solaris) related question:

* Do you have access to  any SunOS 5.10 systems?

* If you do, can you check whether /bin/sh supports
  the POSIX export built-in syntax:

export NAME=value

  or does one have to write (in some order):

NAME=value; export NAME

I pushed an update to a test script in the master branch that uses
the POSIX export syntax, and perhaps folks still using SunOS 5.10
might be unhappy if that breaks (when 1.1.x comes out).

-- 
Viktor.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
Do you see the same stack trace when simply using the random number
generator:

./openssl rand 64

What if you simply use SHA1:

./openssl sha1 somefile



On 04/14/2015 12:17 PM, John Unsworth wrote:

 Is no-one interested at all about this problem? Or do I need to send
 it to another place?

  

 Regards,

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
 Behalf Of *John Unsworth
 *Sent:* 10 April 2015 14:54
 *To:* openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is
 broken

  

 I have compiled 1.0.1m in the same way and that works fine using asm.

  

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
 Behalf Of *John Unsworth
 *Sent:* 10 April 2015 12:21
 *To:* openssl-users@openssl.org
 *Subject:* [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

  

 I have an application that runs quite happily using OpenSSL 1.0.1h on
 Solaris 32 bit. I want to upgrade but both 1.0.2 and 1.0.2a cause
 problems.

  

 1 When building 1.0.2 using

  

 ./Configure solaris-sparcv9-cc no-shared -m32 -xcode=pic32
 -xldscope=hidden

  

 openssl s_client crashes on start:

  

 -bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250

 Segmentation Fault (core dumped)

 -bash-3.00$ pstack core

 core 'core' of 468: ./openssl s_client -connect eos.es.cpth.ie:4250

 000e9ce8 sha1_block_data_order (2ed490, 2ed4ec, 4, ffbfebc0, ffbfebc4,
 44) + 8

 00226140 ssleay_rand_add (ffbfecbc, 1, 20, ffbfeb94, 0, 14) + 530

 00227028 RAND_poll (4, ffbfeca8, ffbfecc8, ffbfecc8, 2c0630, 2c0624) + 38c

 00226be0 ssleay_rand_status (c734, 0, 2b9f5c, 2c05ac, 2a0e50, 13000) + 138

 00065eb4 app_RAND_load_file (ffbfefc0, 2d5218, 1, 2800, 0, 1) + 88

 0004d784 s_client_main (0, c00, 0, c00, 2b4adc, 2f4380) + 5c94

 0001328c do_cmd   (2eb4c8, 3, ffbffa88, 2b4738, 13e64, 2b3e78) + b8

 00012f08 main (4, ffbffa84, 2eb4c8, 2a, 2b3e78, 2b4adc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3e78) + 108

  

 2 So I then rebuilt adding no-asm flag. It manages to connect but
 negotiation fails with an error:

  

 4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert bad
 record mac:s3_pkt.c:1456:SSL alert number 20

 4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake
 failure:s23_lib.c:177:

  

 This is against the server that is still running 1.0.1h and can be
 successfully connected with openssl built with 1.0.1h.

  

 Note that the 64 bit build seems to work perfectly. Unfortunately for
 historical reasons we need to use the 32 bit version.

  

 The 32 bit builds that we use on Windows and Linux also work
 perfectly. Is it something to do with byte order?

  

 Regards,

 John.

  

  



 ___
 openssl-users mailing list
 To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Unsworth
Thanks for the suggestion. I rebuilt with gcc and get just the same problem.

Regards,
John.

-Original Message-
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Jeffrey Walton
Sent: 15 April 2015 12:59
To: OpenSSL Users List
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

On Tue, Apr 14, 2015 at 12:17 PM, John Unsworth
john.unswo...@owmessaging.com wrote:
 Is no-one interested at all about this problem? Or do I need to send it to
 another place?


Can you try with a different compiler? Is Clang available to you? (If
not, I can provide you with a script or recipe to build it).

Here's what one person was just saying about Sun's compiler on another
list. He maintains another crypto-toolkit:

 ... ghastly C compilers (or, in Sun's case, a non-C compiler that pretended
 to be a compiler so you had to use all sorts of trickery to determine whether
 there was a real compiler present or not).

Otherwise, Rich's suggestion sounds like it might be the best that you
can hope for.

Jeff
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Unsworth
core 'core' of 24243:   ./openssl rand 64
000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018, ffbfe01c, 44) + 8
00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530
00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650, 2c0644) + 38c
00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70, 13000) + 138
00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88
00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8
0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) + b8
00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98, 2b4afc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 13:31
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

Do you see the same stack trace when simply using the random number generator:

./openssl rand 64

What if you simply use SHA1:

./openssl sha1 somefile


On 04/14/2015 12:17 PM, John Unsworth wrote:
Is no-one interested at all about this problem? Or do I need to send it to 
another place?

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 14:54
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have compiled 1.0.1m in the same way and that works fine using asm.

John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 12:21
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have an application that runs quite happily using OpenSSL 1.0.1h on Solaris 
32 bit. I want to upgrade but both 1.0.2 and 1.0.2a cause problems.

1 When building 1.0.2 using

./Configure solaris-sparcv9-cc no-shared -m32 -xcode=pic32 -xldscope=hidden

openssl s_client crashes on start:

-bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250
Segmentation Fault (core dumped)
-bash-3.00$ pstack core
core 'core' of 468: ./openssl s_client -connect eos.es.cpth.ie:4250
000e9ce8 sha1_block_data_order (2ed490, 2ed4ec, 4, ffbfebc0, ffbfebc4, 44) + 8
00226140 ssleay_rand_add (ffbfecbc, 1, 20, ffbfeb94, 0, 14) + 530
00227028 RAND_poll (4, ffbfeca8, ffbfecc8, ffbfecc8, 2c0630, 2c0624) + 38c
00226be0 ssleay_rand_status (c734, 0, 2b9f5c, 2c05ac, 2a0e50, 13000) + 138
00065eb4 app_RAND_load_file (ffbfefc0, 2d5218, 1, 2800, 0, 1) + 88
0004d784 s_client_main (0, c00, 0, c00, 2b4adc, 2f4380) + 5c94
0001328c do_cmd   (2eb4c8, 3, ffbffa88, 2b4738, 13e64, 2b3e78) + b8
00012f08 main (4, ffbffa84, 2eb4c8, 2a, 2b3e78, 2b4adc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e78) + 108

2 So I then rebuilt adding no-asm flag. It manages to connect but negotiation 
fails with an error:

4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert bad record 
mac:s3_pkt.c:1456:SSL alert number 20
4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake 
failure:s23_lib.c:177:

This is against the server that is still running 1.0.1h and can be successfully 
connected with openssl built with 1.0.1h.

Note that the 64 bit build seems to work perfectly. Unfortunately for 
historical reasons we need to use the 32 bit version.

The 32 bit builds that we use on Windows and Linux also work perfectly. Is it 
something to do with byte order?

Regards,
John.






___

openssl-users mailing list

To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
How about the ./openssl sha1 command?  Does that bomb too?

It might be interesting to copy crypto/sha/asm/sha1-sparcv9.pl from the
1.0.1 source into the 1.0.2 source.  Then clean, configure, compile and
try again.  There were changes to this file between 1.0.1 and 1.0.2. 
Perhaps a bug was introduced.  I'm assuming this script generates the
SHA source for your target platform. 



On 04/15/2015 09:56 AM, John Unsworth wrote:

 core 'core' of 24243:   ./openssl rand 64

 000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018, ffbfe01c,
 44) + 8

 00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530

 00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650, 2c0644) + 38c

 00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70, 13000) + 138

 00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88

 00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8

 0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) + b8

 00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98, 2b4afc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

  

 Regards,

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
 Behalf Of *John Foley
 *Sent:* 15 April 2015 13:31
 *To:* openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is
 broken

  

 Do you see the same stack trace when simply using the random number
 generator:

 ./openssl rand 64

 What if you simply use SHA1:

 ./openssl sha1 somefile


 On 04/14/2015 12:17 PM, John Unsworth wrote:

 Is no-one interested at all about this problem? Or do I need to
 send it to another place?

  

 Regards,

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org]
 *On Behalf Of *John Unsworth
 *Sent:* 10 April 2015 14:54
 *To:* openssl-users@openssl.org mailto:openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build
 is broken

  

 I have compiled 1.0.1m in the same way and that works fine using asm.

  

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org]
 *On Behalf Of *John Unsworth
 *Sent:* 10 April 2015 12:21
 *To:* openssl-users@openssl.org mailto:openssl-users@openssl.org
 *Subject:* [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is
 broken

  

 I have an application that runs quite happily using OpenSSL 1.0.1h
 on Solaris 32 bit. I want to upgrade but both 1.0.2 and 1.0.2a
 cause problems.

  

 1 When building 1.0.2 using

  

 ./Configure solaris-sparcv9-cc no-shared -m32 -xcode=pic32
 -xldscope=hidden

  

 openssl s_client crashes on start:

  

 -bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250

 Segmentation Fault (core dumped)

 -bash-3.00$ pstack core

 core 'core' of 468: ./openssl s_client -connect
 eos.es.cpth.ie:4250

 000e9ce8 sha1_block_data_order (2ed490, 2ed4ec, 4, ffbfebc0,
 ffbfebc4, 44) + 8

 00226140 ssleay_rand_add (ffbfecbc, 1, 20, ffbfeb94, 0, 14) + 530

 00227028 RAND_poll (4, ffbfeca8, ffbfecc8, ffbfecc8, 2c0630,
 2c0624) + 38c

 00226be0 ssleay_rand_status (c734, 0, 2b9f5c, 2c05ac, 2a0e50,
 13000) + 138

 00065eb4 app_RAND_load_file (ffbfefc0, 2d5218, 1, 2800, 0, 1) + 88

 0004d784 s_client_main (0, c00, 0, c00, 2b4adc, 2f4380) + 5c94

 0001328c do_cmd   (2eb4c8, 3, ffbffa88, 2b4738, 13e64, 2b3e78) + b8

 00012f08 main (4, ffbffa84, 2eb4c8, 2a, 2b3e78, 2b4adc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3e78) + 108

  

 2 So I then rebuilt adding no-asm flag. It manages to connect but
 negotiation fails with an error:

  

 4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert
 bad record mac:s3_pkt.c:1456:SSL alert number 20

 4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake
 failure:s23_lib.c:177:

  

 This is against the server that is still running 1.0.1h and can be
 successfully connected with openssl built with 1.0.1h.

  

 Note that the 64 bit build seems to work perfectly. Unfortunately
 for historical reasons we need to use the 32 bit version.

  

 The 32 bit builds that we use on Windows and Linux also work
 perfectly. Is it something to do with byte order?

  

 Regards,

 John.

  

  




 ___

 openssl-users mailing list

 To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

  



 ___
 openssl-users mailing list
 To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Unsworth
That seems to have fixed the crash.

-bash-3.00$ ./openssl rand 64
zÔòMÉÜOvá¯@ét†Å­EÙ^±Q!þ\‰b_¨ëYŸÁµiT-n߇ñ¬“B+Õ9kx©î%hRÈz-bash-3.00$

Not sure about the output though.

However negotiation causes a core:

-bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250
CONNECTED(0004)
depth=0 CN = jusworth-lt4.eu.cp.net
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = jusworth-lt4.eu.cp.net
verify error:num=21:unable to verify the first certificate
verify return:1
Segmentation Fault (core dumped)
-bash-3.00$ pstack core
core 'core' of 12587:   ./openssl s_client -connect eos.es.cpth.ie:4250
000ed408 sha512_block_data_order (30e538, 30c050, 71a, 30e588, 30c050, 
64f98fa7) + 8
0009fb30 ssl3_digest_cached_records (2f8ae0, 6, 2f8ea0, 14, 100, 2f8ea0) + 1cc
000980ec ssl3_get_certificate_request (2f8ae0, 2f8ea0, 2f8ea0, 10, a42e0, 
2f8ae0) + 90
00093ad8 ssl3_connect (2f8ae0, 0, 1180, 1000, 1130, ) + 6c0
000aa2b8 ssl23_get_server_hello (2f8ae0, 16, 3, 3, 2f8ea0, 301638) + 648
000a9198 ssl23_connect (2f8ae0, 0, 3000, 2b4d64, 2b3d78, 1) + 588
000aa60c ssl23_write (2f8ae0, 2f0270, 0, 3000, ff247c94, a8c10) + 4c
0004ee64 s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374
0001328c do_cmd   (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8
00012f08 main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3d78) + 108

Regards,
John

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 15:10
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

How about the ./openssl sha1 command?  Does that bomb too?

It might be interesting to copy crypto/sha/asm/sha1-sparcv9.pl from the 1.0.1 
source into the 1.0.2 source.  Then clean, configure, compile and try again.  
There were changes to this file between 1.0.1 and 1.0.2.  Perhaps a bug was 
introduced.  I'm assuming this script generates the SHA source for your target 
platform.


On 04/15/2015 09:56 AM, John Unsworth wrote:
core 'core' of 24243:   ./openssl rand 64
000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018, ffbfe01c, 44) + 8
00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530
00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650, 2c0644) + 38c
00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70, 13000) + 138
00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88
00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8
0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) + b8
00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98, 2b4afc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 13:31
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

Do you see the same stack trace when simply using the random number generator:

./openssl rand 64

What if you simply use SHA1:

./openssl sha1 somefile



On 04/14/2015 12:17 PM, John Unsworth wrote:
Is no-one interested at all about this problem? Or do I need to send it to 
another place?

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 14:54
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have compiled 1.0.1m in the same way and that works fine using asm.

John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 12:21
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have an application that runs quite happily using OpenSSL 1.0.1h on Solaris 
32 bit. I want to upgrade but both 1.0.2 and 1.0.2a cause problems.

1 When building 1.0.2 using

./Configure solaris-sparcv9-cc no-shared -m32 -xcode=pic32 -xldscope=hidden

openssl s_client crashes on start:

-bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250
Segmentation Fault (core dumped)
-bash-3.00$ pstack core
core 'core' of 468: ./openssl s_client -connect eos.es.cpth.ie:4250
000e9ce8 sha1_block_data_order (2ed490, 2ed4ec, 4, ffbfebc0, ffbfebc4, 44) + 8
00226140 ssleay_rand_add (ffbfecbc, 1, 20, ffbfeb94, 0, 14) + 530
00227028 RAND_poll (4, ffbfeca8, ffbfecc8, ffbfecc8, 2c0630, 2c0624) + 38c
00226be0 ssleay_rand_status (c734, 0, 2b9f5c, 2c05ac, 2a0e50, 13000) + 138
00065eb4 app_RAND_load_file (ffbfefc0, 2d5218, 1, 2800, 0, 1) + 88
0004d784 s_client_main (0, c00, 0, c00, 2b4adc, 2f4380) + 5c94
0001328c do_cmd   (2eb4c8, 3, ffbffa88, 2b4738, 13e64, 2b3e78) + b8
00012f08 main (4, ffbffa84, 2eb4c8, 2a, 2b3e78, 2b4adc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e78) + 108

2 So I then rebuilt

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
Looks like the crash is in SHA-512 this time, not SHA-1.  There's a
separate perl script to generate that assembly code.  Try the 1.0.1
version of sha512-sparcv9.pl.

The output from your rand command is valid.  You can use the -base64
option if you want something more readable.



On 04/15/2015 11:13 AM, John Unsworth wrote:

 That seems to have fixed the crash.

  

 -bash-3.00$ ./openssl rand 64

 zÔòMÉÜOvá¯@ét†Å�­EÙ^±Q!þ\‰b_¨ëYŸÁµiT-n߇ñ¬“B+Õ9kx©î%hRÈz-bash-3.00$

  

 Not sure about the output though.

  

 However negotiation causes a core:

  

 -bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250

 CONNECTED(0004)

 depth=0 CN = jusworth-lt4.eu.cp.net

 verify error:num=20:unable to get local issuer certificate

 verify return:1

 depth=0 CN = jusworth-lt4.eu.cp.net

 verify error:num=21:unable to verify the first certificate

 verify return:1

 Segmentation Fault (core dumped)

 -bash-3.00$ pstack core

 core 'core' of 12587:   ./openssl s_client -connect eos.es.cpth.ie:4250

 000ed408 sha512_block_data_order (30e538, 30c050, 71a, 30e588, 30c050,
 64f98fa7) + 8

 0009fb30 ssl3_digest_cached_records (2f8ae0, 6, 2f8ea0, 14, 100,
 2f8ea0) + 1cc

 000980ec ssl3_get_certificate_request (2f8ae0, 2f8ea0, 2f8ea0, 10,
 a42e0, 2f8ae0) + 90

 00093ad8 ssl3_connect (2f8ae0, 0, 1180, 1000, 1130, ) + 6c0

 000aa2b8 ssl23_get_server_hello (2f8ae0, 16, 3, 3, 2f8ea0, 301638) + 648

 000a9198 ssl23_connect (2f8ae0, 0, 3000, 2b4d64, 2b3d78, 1) + 588

 000aa60c ssl23_write (2f8ae0, 2f0270, 0, 3000, ff247c94, a8c10) + 4c

 0004ee64 s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374

 0001328c do_cmd   (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8

 00012f08 main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3d78) + 108

  

 Regards,

 John

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
 Behalf Of *John Foley
 *Sent:* 15 April 2015 15:10
 *To:* openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is
 broken

  

 How about the ./openssl sha1 command?  Does that bomb too?

 It might be interesting to copy crypto/sha/asm/sha1-sparcv9.pl from
 the 1.0.1 source into the 1.0.2 source.  Then clean, configure,
 compile and try again.  There were changes to this file between 1.0.1
 and 1.0.2.  Perhaps a bug was introduced.  I'm assuming this script
 generates the SHA source for your target platform. 


 On 04/15/2015 09:56 AM, John Unsworth wrote:

 core 'core' of 24243:   ./openssl rand 64

 000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018,
 ffbfe01c, 44) + 8

 00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530

 00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650,
 2c0644) + 38c

 00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70,
 13000) + 138

 00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88

 00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8

 0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) + b8

 00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98, 2b4afc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

  

 Regards,

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org]
 *On Behalf Of *John Foley
 *Sent:* 15 April 2015 13:31
 *To:* openssl-users@openssl.org mailto:openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build
 is broken

  

 Do you see the same stack trace when simply using the random
 number generator:

 ./openssl rand 64

 What if you simply use SHA1:

 ./openssl sha1 somefile



 On 04/14/2015 12:17 PM, John Unsworth wrote:

 Is no-one interested at all about this problem? Or do I need
 to send it to another place?

  

 Regards,

 John.

  

 *From:*openssl-users
 [mailto:openssl-users-boun...@openssl.org] *On Behalf Of *John
 Unsworth
 *Sent:* 10 April 2015 14:54
 *To:* openssl-users@openssl.org mailto:openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit
 build is broken

  

 I have compiled 1.0.1m in the same way and that works fine
 using asm.

  

 John.

  

 *From:*openssl-users
 [mailto:openssl-users-boun...@openssl.org] *On Behalf Of *John
 Unsworth
 *Sent:* 10 April 2015 12:21
 *To:* openssl-users@openssl.org mailto:openssl-users@openssl.org
 *Subject:* [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build
 is broken

  

 I have an application that runs quite happily using OpenSSL
 1.0.1h on Solaris 32 bit. I want to upgrade but both 1.0.2 and
 1.0.2a cause problems.

  

 1 When building 1.0.2 using

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Unsworth
Still exactly the same crash. And even if these assembly code problems can be 
fixed there is still the negotiation error after compiling with no-asm.

4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert bad record 
mac:s3_pkt.c:1456:SSL alert number 20
4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake 
failure:s23_lib.c:177:

John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 16:45
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

Looks like the crash is in SHA-512 this time, not SHA-1.  There's a separate 
perl script to generate that assembly code.  Try the 1.0.1 version of 
sha512-sparcv9.pl.

The output from your rand command is valid.  You can use the -base64 option if 
you want something more readable.


On 04/15/2015 11:13 AM, John Unsworth wrote:
That seems to have fixed the crash.

-bash-3.00$ ./openssl rand 64
zÔòMÉÜOvá¯@ét†Å­EÙ^±Q!þ\‰b_¨ëYŸÁµiT-n߇ñ¬“B+Õ9kx©î%hRÈz-bash-3.00$

Not sure about the output though.

However negotiation causes a core:

-bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250
CONNECTED(0004)
depth=0 CN = jusworth-lt4.eu.cp.net
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = jusworth-lt4.eu.cp.net
verify error:num=21:unable to verify the first certificate
verify return:1
Segmentation Fault (core dumped)
-bash-3.00$ pstack core
core 'core' of 12587:   ./openssl s_client -connect eos.es.cpth.ie:4250
000ed408 sha512_block_data_order (30e538, 30c050, 71a, 30e588, 30c050, 
64f98fa7) + 8
0009fb30 ssl3_digest_cached_records (2f8ae0, 6, 2f8ea0, 14, 100, 2f8ea0) + 1cc
000980ec ssl3_get_certificate_request (2f8ae0, 2f8ea0, 2f8ea0, 10, a42e0, 
2f8ae0) + 90
00093ad8 ssl3_connect (2f8ae0, 0, 1180, 1000, 1130, ) + 6c0
000aa2b8 ssl23_get_server_hello (2f8ae0, 16, 3, 3, 2f8ea0, 301638) + 648
000a9198 ssl23_connect (2f8ae0, 0, 3000, 2b4d64, 2b3d78, 1) + 588
000aa60c ssl23_write (2f8ae0, 2f0270, 0, 3000, ff247c94, a8c10) + 4c
0004ee64 s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374
0001328c do_cmd   (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8
00012f08 main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3d78) + 108

Regards,
John

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 15:10
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

How about the ./openssl sha1 command?  Does that bomb too?

It might be interesting to copy crypto/sha/asm/sha1-sparcv9.pl from the 1.0.1 
source into the 1.0.2 source.  Then clean, configure, compile and try again.  
There were changes to this file between 1.0.1 and 1.0.2.  Perhaps a bug was 
introduced.  I'm assuming this script generates the SHA source for your target 
platform.



On 04/15/2015 09:56 AM, John Unsworth wrote:
core 'core' of 24243:   ./openssl rand 64
000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018, ffbfe01c, 44) + 8
00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530
00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650, 2c0644) + 38c
00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70, 13000) + 138
00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88
00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8
0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) + b8
00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98, 2b4afc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 13:31
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

Do you see the same stack trace when simply using the random number generator:

./openssl rand 64

What if you simply use SHA1:

./openssl sha1 somefile




On 04/14/2015 12:17 PM, John Unsworth wrote:
Is no-one interested at all about this problem? Or do I need to send it to 
another place?

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 14:54
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have compiled 1.0.1m in the same way and that works fine using asm.

John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 12:21
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have an application that runs quite happily using OpenSSL 1.0.1h on Solaris 
32 bit. I want to upgrade but both 1.0.2 and 1.0.2a cause problems.

1 When building

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread Carson Gaspar

On 4/15/15 4:59 AM, Jeffrey Walton wrote:


Can you try with a different compiler? Is Clang available to you? (If
not, I can provide you with a script or recipe to build it).

Here's what one person was just saying about Sun's compiler on another
list. He maintains another crypto-toolkit:


... ghastly C compilers (or, in Sun's case, a non-C compiler that pretended
to be a compiler so you had to use all sorts of trickery to determine whether
there was a real compiler present or not).


Libel. Once Upon a Time, Sun shipped something called /usr/ucb/cc which 
was an abomination, but wouldn't be in any sane user's PATH. Oracle 
ships gcc (which compiles a language called gcc, which only vaguely 
resembles C, because the authors don't believe in the C standards), and 
also has the Solaris Studio compiler suite, which is an excellent C 
compiler (but doesn't know all of the bizarre dialects of gcc, e.g. 'a 
?: b' *shudder*).


The real issue is usually inline assembly being in GNU format, which is 
incompatible with all others. Oracle's /usr/ccs/bin/as doesn't always 
understand all the GNUisms.


But none of this is relevant to the OP's issue.

--
Carson


___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Unsworth
Bug opened.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Salz, Rich
Sent: 14 April 2015 17:41
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

You could mail it to RT and then it will at least be logged and not forgotten.

But no response within four days isn't surprising.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Foley
This appears to be a different problem than the crash in SHA.  Since
you're seeing a bad record mac, it appears the TLS handshake has made
it through the ChangeCipherSpec message.  Do you know which cipher suite
is being negotiated?  If it's AES, it may be worth trying a 3DES cipher
suite.  If the issue is in the AES layer, one of the 3DES cipher suites
should work.

By the way, have you run a 'make test' after building OpenSSL?  Are all
the test suites passing?  If not, which one is failing?



On 04/15/2015 12:26 PM, John Unsworth wrote:

 Still exactly the same crash. And even if these assembly code problems
 can be fixed there is still the negotiation error after compiling with
 no-asm.

  

 4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert bad
 record mac:s3_pkt.c:1456:SSL alert number 20

 4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake
 failure:s23_lib.c:177:

  

 John.

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org] *On
 Behalf Of *John Foley
 *Sent:* 15 April 2015 16:45
 *To:* openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is
 broken

  

 Looks like the crash is in SHA-512 this time, not SHA-1.  There's a
 separate perl script to generate that assembly code.  Try the 1.0.1
 version of sha512-sparcv9.pl.

 The output from your rand command is valid.  You can use the -base64
 option if you want something more readable.


 On 04/15/2015 11:13 AM, John Unsworth wrote:

 That seems to have fixed the crash.

  

 -bash-3.00$ ./openssl rand 64

 zÔòMÉÜOvá¯@ét†Å�­EÙ^±Q!þ\‰b_¨ëYŸÁµiT-n߇ñ¬“B+Õ9kx©î%hRÈz-bash-3.00$

  

 Not sure about the output though.

  

 However negotiation causes a core:

  

 -bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250

 CONNECTED(0004)

 depth=0 CN = jusworth-lt4.eu.cp.net

 verify error:num=20:unable to get local issuer certificate

 verify return:1

 depth=0 CN = jusworth-lt4.eu.cp.net

 verify error:num=21:unable to verify the first certificate

 verify return:1

 Segmentation Fault (core dumped)

 -bash-3.00$ pstack core

 core 'core' of 12587:   ./openssl s_client -connect
 eos.es.cpth.ie:4250

 000ed408 sha512_block_data_order (30e538, 30c050, 71a, 30e588,
 30c050, 64f98fa7) + 8

 0009fb30 ssl3_digest_cached_records (2f8ae0, 6, 2f8ea0, 14, 100,
 2f8ea0) + 1cc

 000980ec ssl3_get_certificate_request (2f8ae0, 2f8ea0, 2f8ea0, 10,
 a42e0, 2f8ae0) + 90

 00093ad8 ssl3_connect (2f8ae0, 0, 1180, 1000, 1130, ) + 6c0

 000aa2b8 ssl23_get_server_hello (2f8ae0, 16, 3, 3, 2f8ea0, 301638)
 + 648

 000a9198 ssl23_connect (2f8ae0, 0, 3000, 2b4d64, 2b3d78, 1) + 588

 000aa60c ssl23_write (2f8ae0, 2f0270, 0, 3000, ff247c94, a8c10) + 4c

 0004ee64 s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374

 0001328c do_cmd   (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8

 00012f08 main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3d78) + 108

  

 Regards,

 John

  

 *From:*openssl-users [mailto:openssl-users-boun...@openssl.org]
 *On Behalf Of *John Foley
 *Sent:* 15 April 2015 15:10
 *To:* openssl-users@openssl.org mailto:openssl-users@openssl.org
 *Subject:* Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build
 is broken

  

 How about the ./openssl sha1 command?  Does that bomb too?

 It might be interesting to copy crypto/sha/asm/sha1-sparcv9.pl
 from the 1.0.1 source into the 1.0.2 source.  Then clean,
 configure, compile and try again.  There were changes to this file
 between 1.0.1 and 1.0.2.  Perhaps a bug was introduced.  I'm
 assuming this script generates the SHA source for your target
 platform. 



 On 04/15/2015 09:56 AM, John Unsworth wrote:

 core 'core' of 24243:   ./openssl rand 64

 000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018,
 ffbfe01c, 44) + 8

 00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530

 00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650,
 2c0644) + 38c

 00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70,
 13000) + 138

 00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88

 00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8

 0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98)
 + b8

 00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98,
 2b4afc) + 3a4

 00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

  

 Regards,

 John.

  

 *From:*openssl-users
 [mailto:openssl-users-boun...@openssl.org] *On Behalf Of *John
 Foley
 *Sent:* 15 April 2015 13:31
 *To:* openssl-users@openssl.org mailto:openssl

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread Michael Wojcik
 From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
 Of Carson Gaspar
 Sent: Wednesday, April 15, 2015 14:40
 To: openssl-users@openssl.org
 Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken
 
 On 4/15/15 4:59 AM, Jeffrey Walton wrote:
 
  Here's what one person was just saying about Sun's compiler on another
  list. He maintains another crypto-toolkit:
 
  ... ghastly C compilers (or, in Sun's case, a non-C compiler that pretended
  to be a compiler so you had to use all sorts of trickery to determine
 whether
  there was a real compiler present or not).
 
 Libel. Once Upon a Time, Sun shipped something called /usr/ucb/cc which
 was an abomination, but wouldn't be in any sane user's PATH. Oracle
 ships gcc (which compiles a language called gcc, which only vaguely
 resembles C, because the authors don't believe in the C standards), and
 also has the Solaris Studio compiler suite, which is an excellent C
 compiler (but doesn't know all of the bizarre dialects of gcc, e.g. 'a
 ?: b' *shudder*).
 
 The real issue is usually inline assembly being in GNU format, which is
 incompatible with all others. Oracle's /usr/ccs/bin/as doesn't always
 understand all the GNUisms.

Thanks. I had resisted posting something similar. I was particularly irked by 
the context-less, hearsay claim that the Solaris C compiler isn't a conforming 
implementation. Oh yeah? How not?

Usually when I see someone complain about a C implementation, it's because they 
haven't bothered to check ISO 9899 and find out what C actually is.

I'll also note that I've been writing C code for numerous platforms (MS-DOS, 
all the incarnations of Windows, many UNIX variants, OS/400, z/OS...) for 
decades, and the Solaris compilers have *never* given me problems. That's more 
than I can say for the compilers from Microsoft, HP, and some other vendors. Or 
for GCC, even when beaten into OK, I'll try really hard to pretend to be C 
mode.

-- 
Michael Wojcik
Technology Specialist, Micro Focus



This message has been scanned for malware by Websense. www.websense.com
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-15 Thread John Unsworth
I can’t dictate what cipher suite our customers will use, all have to work. It 
seems to me that for the time being I will have to stay with the 1.0.1 builds.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 21:09
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

This appears to be a different problem than the crash in SHA.  Since you're 
seeing a bad record mac, it appears the TLS handshake has made it through the 
ChangeCipherSpec message.  Do you know which cipher suite is being negotiated?  
If it's AES, it may be worth trying a 3DES cipher suite.  If the issue is in 
the AES layer, one of the 3DES cipher suites should work.

By the way, have you run a 'make test' after building OpenSSL?  Are all the 
test suites passing?  If not, which one is failing?


On 04/15/2015 12:26 PM, John Unsworth wrote:
Still exactly the same crash. And even if these assembly code problems can be 
fixed there is still the negotiation error after compiling with no-asm.

4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert bad record 
mac:s3_pkt.c:1456:SSL alert number 20
4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake 
failure:s23_lib.c:177:

John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 16:45
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

Looks like the crash is in SHA-512 this time, not SHA-1.  There's a separate 
perl script to generate that assembly code.  Try the 1.0.1 version of 
sha512-sparcv9.pl.

The output from your rand command is valid.  You can use the -base64 option if 
you want something more readable.



On 04/15/2015 11:13 AM, John Unsworth wrote:
That seems to have fixed the crash.

-bash-3.00$ ./openssl rand 64
zÔòMÉÜOvá¯@ét†Å­EÙ^±Q!þ\‰b_¨ëYŸÁµiT-n߇ñ¬“B+Õ9kx©î%hRÈz-bash-3.00$

Not sure about the output though.

However negotiation causes a core:

-bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250
CONNECTED(0004)
depth=0 CN = jusworth-lt4.eu.cp.net
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = jusworth-lt4.eu.cp.net
verify error:num=21:unable to verify the first certificate
verify return:1
Segmentation Fault (core dumped)
-bash-3.00$ pstack core
core 'core' of 12587:   ./openssl s_client -connect eos.es.cpth.ie:4250
000ed408 sha512_block_data_order (30e538, 30c050, 71a, 30e588, 30c050, 
64f98fa7) + 8
0009fb30 ssl3_digest_cached_records (2f8ae0, 6, 2f8ea0, 14, 100, 2f8ea0) + 1cc
000980ec ssl3_get_certificate_request (2f8ae0, 2f8ea0, 2f8ea0, 10, a42e0, 
2f8ae0) + 90
00093ad8 ssl3_connect (2f8ae0, 0, 1180, 1000, 1130, ) + 6c0
000aa2b8 ssl23_get_server_hello (2f8ae0, 16, 3, 3, 2f8ea0, 301638) + 648
000a9198 ssl23_connect (2f8ae0, 0, 3000, 2b4d64, 2b3d78, 1) + 588
000aa60c ssl23_write (2f8ae0, 2f0270, 0, 3000, ff247c94, a8c10) + 4c
0004ee64 s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374
0001328c do_cmd   (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8
00012f08 main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3d78) + 108

Regards,
John

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 15:10
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

How about the ./openssl sha1 command?  Does that bomb too?

It might be interesting to copy crypto/sha/asm/sha1-sparcv9.pl from the 1.0.1 
source into the 1.0.2 source.  Then clean, configure, compile and try again.  
There were changes to this file between 1.0.1 and 1.0.2.  Perhaps a bug was 
introduced.  I'm assuming this script generates the SHA source for your target 
platform.




On 04/15/2015 09:56 AM, John Unsworth wrote:
core 'core' of 24243:   ./openssl rand 64
000e9ce8 sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018, ffbfe01c, 44) + 8
00226160 ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530
00227048 RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650, 2c0644) + 38c
00226c00 ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70, 13000) + 138
00065eb4 app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) + 88
00077cb8 rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8
0001328c do_cmd   (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) + b8
00012f08 main (3, ffbffadc, 2eb4e8, 2a, 2b3e98, 2b4afc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e98) + 108

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Foley
Sent: 15 April 2015 13:31
To: openssl-users@openssl.orgmailto:openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

Do you see the same stack trace when simply using the random number generator:

./openssl rand

Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-14 Thread John Unsworth
Is no-one interested at all about this problem? Or do I need to send it to 
another place?

Regards,
John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 14:54
To: openssl-users@openssl.org
Subject: Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have compiled 1.0.1m in the same way and that works fine using asm.

John.

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
John Unsworth
Sent: 10 April 2015 12:21
To: openssl-users@openssl.org
Subject: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

I have an application that runs quite happily using OpenSSL 1.0.1h on Solaris 
32 bit. I want to upgrade but both 1.0.2 and 1.0.2a cause problems.

1 When building 1.0.2 using

./Configure solaris-sparcv9-cc no-shared -m32 -xcode=pic32 -xldscope=hidden

openssl s_client crashes on start:

-bash-3.00$ ./openssl s_client -connect eos.es.cpth.ie:4250
Segmentation Fault (core dumped)
-bash-3.00$ pstack core
core 'core' of 468: ./openssl s_client -connect eos.es.cpth.ie:4250
000e9ce8 sha1_block_data_order (2ed490, 2ed4ec, 4, ffbfebc0, ffbfebc4, 44) + 8
00226140 ssleay_rand_add (ffbfecbc, 1, 20, ffbfeb94, 0, 14) + 530
00227028 RAND_poll (4, ffbfeca8, ffbfecc8, ffbfecc8, 2c0630, 2c0624) + 38c
00226be0 ssleay_rand_status (c734, 0, 2b9f5c, 2c05ac, 2a0e50, 13000) + 138
00065eb4 app_RAND_load_file (ffbfefc0, 2d5218, 1, 2800, 0, 1) + 88
0004d784 s_client_main (0, c00, 0, c00, 2b4adc, 2f4380) + 5c94
0001328c do_cmd   (2eb4c8, 3, ffbffa88, 2b4738, 13e64, 2b3e78) + b8
00012f08 main (4, ffbffa84, 2eb4c8, 2a, 2b3e78, 2b4adc) + 3a4
00012a08 _start   (0, 0, 0, 0, 0, 2b3e78) + 108

2 So I then rebuilt adding no-asm flag. It manages to connect but negotiation 
fails with an error:

4280581268:error:140943FC:SSL routines:ssl3_read_bytes:sslv3 alert bad record 
mac:s3_pkt.c:1456:SSL alert number 20
4280581268:error:140790E5:SSL routines:ssl23_write:ssl handshake 
failure:s23_lib.c:177:

This is against the server that is still running 1.0.1h and can be successfully 
connected with openssl built with 1.0.1h.

Note that the 64 bit build seems to work perfectly. Unfortunately for 
historical reasons we need to use the 32 bit version.

The 32 bit builds that we use on Windows and Linux also work perfectly. Is it 
something to do with byte order?

Regards,
John.


___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.2 Solaris 32 bit build is broken

2015-04-14 Thread Salz, Rich
You could mail it to RT and then it will at least be logged and not forgotten.

But no response within four days isn't surprising.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users