[openssl-dev] Fwd: latest OpenSSL causes OpenSMTPD to segv
Viktor Dukhovni
openssl-users at dukhovni.org
Mon Feb 1 22:52:57 UTC 2016
On Mon, Feb 01, 2016 at 08:56:16PM +0000, Salz, Rich wrote:
> > This impact all users who upgrade to OpenSSL 1.0.2f and will cause smtpd
> > to crash as soon as the RSA engine is used (ie: whenever there's crypto)
>
> It would be interesting to see what they think was wrong.
>
> Our intent is to NOT change API's across letter releases.
The only thing I see that's plausibly pertinent is:
commit 6656ba7152dfe4bba865e327dd362ea08544aa80
Author: Dr. Stephen Henson <steve at openssl.org>
Date: Sun Dec 20 18:18:43 2015 +0000
Don't check RSA_FLAG_SIGN_VER.
Reviewed-by: Richard Levitte <levitte at openssl.org>
diff --git a/crypto/rsa/rsa_sign.c b/crypto/rsa/rsa_sign.c
index 82ca832..ed63a1d 100644
--- a/crypto/rsa/rsa_sign.c
+++ b/crypto/rsa/rsa_sign.c
@@ -84,7 +84,7 @@ int RSA_sign(int type, const unsigned char *m, unsigned int m_len,
return 0;
}
#endif
- if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_sign) {
+ if (rsa->meth->rsa_sign) {
return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa);
}
/* Special case: SSL signature, just check the length */
@@ -293,7 +293,7 @@ int RSA_verify(int dtype, const unsigned char *m, unsigned int m_len,
const unsigned char *sigbuf, unsigned int siglen, RSA *rsa)
{
- if ((rsa->flags & RSA_FLAG_SIGN_VER) && rsa->meth->rsa_verify) {
+ if (rsa->meth->rsa_verify) {
return rsa->meth->rsa_verify(dtype, m, m_len, sigbuf, siglen, rsa);
}
--
Viktor.
More information about the openssl-dev
mailing list