回复: openssl-users Digest, Vol 100, Issue 9

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks Viktor,

The crashed application doesn't call SSL_get0_verified_chain(). I'm not sure why the heap verified_chain is corrupted.

Besides, for the X509 object, if I call X509_free() twice no coredump is generated which is as expected. So my issue is still related with verified_chain heap.


发件人: openssl-users <openssl-users-bounces@xxxxxxxxxxx> 代表 openssl-users-request@xxxxxxxxxxx <openssl-users-request@xxxxxxxxxxx>
发送时间: 2023年3月3日 20:00
收件人: openssl-users@xxxxxxxxxxx <openssl-users@xxxxxxxxxxx>
主题: openssl-users Digest, Vol 100, Issue 9
 
Send openssl-users mailing list submissions to
        openssl-users@xxxxxxxxxxx

To subscribe or unsubscribe via the World Wide Web, visit
        https://mta.openssl.org/mailman/listinfo/openssl-users
or, via email, send a message with subject or body 'help' to
        openssl-users-request@xxxxxxxxxxx

You can reach the person managing the list at
        openssl-users-owner@xxxxxxxxxxx

When replying, please edit your Subject line so it is more specific
than "Re: Contents of openssl-users digest..."


Today's Topics:

   1. Re: [Openssl 1.1.1n] application core dump while calling
      sk_X509_pop_free(s->verified_chain, X509_free); (Viktor Dukhovni)
   2. OpenSSL 3.0.7 + Kernel Crypto API (Hareesh Das Ulleri)


----------------------------------------------------------------------

Message: 1
Date: Fri, 3 Mar 2023 00:49:26 -0500
From: Viktor Dukhovni <openssl-users@xxxxxxxxxxxx>
To: openssl-users@xxxxxxxxxxx
Subject: Re: [Openssl 1.1.1n] application core dump while calling
        sk_X509_pop_free(s->verified_chain, X509_free);
Message-ID: <ZAGKZhl1tA1O0c//@straasha.imrryr.org>
Content-Type: text/plain; charset=us-ascii

On Fri, Mar 03, 2023 at 02:21:43AM +0000, Ma Zhenhua wrote:

> My application core dumps twice in the same procedure while pop and
> free s->verified_chain. I don't find possible cause until now. Any
> constructive advice is highly appreciated.

You've corrupted the heap prior to that call, or, ignoring the
documentation, or previously freed the verified chain, which is owned by
SSL handle, and must not be freed by the application.

See SSL_get0_verified_chain(3).  OpenSSL's handling of this object is
correct.  You'll have to figure out where you went wrong.

--
    Viktor.


------------------------------

Message: 2
Date: Fri, 3 Mar 2023 08:47:59 +0000
From: Hareesh Das Ulleri <hareesh.ulleri@xxxxxxx>
To: "openssl-users@xxxxxxxxxxx" <openssl-users@xxxxxxxxxxx>
Subject: OpenSSL 3.0.7 + Kernel Crypto API
Message-ID: <07164a1ea09c45978876d04fadebcc4b@xxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset="us-ascii"

Hello OpenSSL users,

  Is it possible to integrate linux kernel 5.10 Crypto API module with OpenSSL 3.0.7 or above versions. If possible request to suggest any doc to start with if available.

  My requirement is to integrate a HW Cipher implementation (with or without OpenSSL custom provider). Is this possible ?

  Please let me know if anyone tried or knows this !

Thanks,
Hareesh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20230303/d354dc1b/attachment-0001.htm>

------------------------------

Subject: Digest Footer

_______________________________________________
openssl-users mailing list
openssl-users@xxxxxxxxxxx
https://mta.openssl.org/mailman/listinfo/openssl-users


------------------------------

End of openssl-users Digest, Vol 100, Issue 9
*********************************************

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux