Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 19 May 2007 15:04:41 -0500
From:      Larry Rosenman <ler@lerctr.org>
To:        Alexander Kabaev <kabaev@gmail.com>
Cc:        freebsd-current@freebsd.org
Subject:   Re: PINE: SIG 6
Message-ID:  <B86D4453-6748-4AA2-BCB6-ED3D622DFFE0@lerctr.org>
In-Reply-To: <8F80AFD4-C83E-413F-8158-CFD27453AE87@lerctr.org>
References:  <299DD8FD-0E7A-4E3D-9902-2C7FE45AA7BC@lerctr.org> <20070519141503.07e94a36@kan.dnsalias.net> <E3B706CD-FBD7-45A3-B3D3-1AB8BE2DA2A3@lerctr.org> <20070519143105.65072348@kan.dnsalias.net> <9F2A10A0-2B58-4BE4-8DD0-9D7811B6BCE6@lerctr.org> <20070519155919.453081a5@kan.dnsalias.net> <8F80AFD4-C83E-413F-8158-CFD27453AE87@lerctr.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On May 19, 2007, at 3:02 PM, Larry Rosenman wrote:

> 		
> On May 19, 2007, at 2:59 PM, Alexander Kabaev wrote:
>
>> Now, you need to know contents of s, s->session, session- 
>> >sess_cert and
>> s->session->sess_cert->peer_dh_tmp from frame #7.
>>
>> I have no time do to the debugging over email and I am not really
>> interested until someone else traces this to GCC problem.
>>
>> The email from Pieter de Goeje seems to indicate that libssl code
>> seems to be at fault.
>>
>> -- 
>> Alexander Kabaev
>
> 1) I can give access to the machine/core
> 2) I'm not an expert.
>
> Here is what you asked for:
> gdb) fr 7
> #7  0x0000000800d4374d in ssl3_send_client_key_exchange  
> (s=0x80154e180)
>     at /usr/src/secure/lib/libssl/../../../crypto/openssl/ssl/ 
> s3_clnt.c:1845
> 1845                            if (s->session->sess_cert- 
> >peer_dh_tmp != NULL)
> (gdb) print s->session->sess_cert->peer_dh_tmp
> $1 = (DH *) 0x8014341e0
> (gdb) print *$1
> $2 = {pad = 0, version = 0, p = 0x80152b800, g = 0x80152b860,  
> length = 0,
>   pub_key = 0x80152bdc0, priv_key = 0x0, flags = 1, method_mont_p =  
> 0x0, q = 0x0,
>   j = 0x0, seed = 0x0, seedlen = 0, counter = 0x0, references = 1,  
> ex_data = {
>     sk = 0x0, dummy = -1515870811}, meth = 0x8010d63e0, engine = 0x0}
> (gdb)
>
>
> I can give shell/sudo access to any developer that wants to look  
> into this.
>
> If libssl is at fault, who/what do I need to do?
>
> LER
>

Here are the other prints:
(gdb) print s->session
$3 = (SSL_SESSION *) 0x80143aa00
(gdb) print *$3
$4 = {ssl_version = 769, key_arg_length = 0, key_arg = "\000\000\000 
\000\000\000\000",
   master_key_length = 0, master_key = '\0' <repeats 47 times>,  
session_id_length = 32,
   session_id = "D\032?Q&4a\212_q??????N#\177?<?$?H\fu?[?\237\"",  
sid_ctx_length = 0,
   sid_ctx = '\0' <repeats 31 times>, not_resumable = 0, sess_cert =  
0x80152c1c0,
   peer = 0x801437560, verify_result = 19, references = 1, timeout =  
7200,
   time = 1179603504, compress_meth = 0, cipher = 0x0, cipher_id = 0,  
ciphers = 0x0,
   ex_data = {sk = 0x0, dummy = 0}, prev = 0x0, next = 0x0}
(gdb) print s->session->sess_cert
$5 = (struct sess_cert_st *) 0x80152c1c0
(gdb) print *$5
$6 = {cert_chain = 0x80152aac0, peer_cert_type = 0, peer_key =  
0x80152c1d8,
   peer_pkeys = {{x509 = 0x801437560, privatekey = 0x0}, {x509 = 0x0,
       privatekey = 0x0}, {x509 = 0x0, privatekey = 0x0}, {x509 = 0x0,
       privatekey = 0x0}, {x509 = 0x0, privatekey = 0x0}, {x509 = 0x0,
       privatekey = 0x0}}, peer_rsa_tmp = 0x0, peer_dh_tmp =  
0x8014341e0,
   peer_ecdh_tmp = 0x0, references = 1}
(gdb)

>
> -- 
> Larry Rosenman                     http://www.lerctr.org/~ler
> Phone: +1 512-248-2683                 E-Mail: ler@lerctr.org
> US Mail: 430 Valona Loop, Round Rock, TX 78681-3893
>
>
>

-- 
Larry Rosenman                     http://www.lerctr.org/~ler
Phone: +1 512-248-2683                 E-Mail: ler@lerctr.org
US Mail: 430 Valona Loop, Round Rock, TX 78681-3893






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?B86D4453-6748-4AA2-BCB6-ED3D622DFFE0>