[openssl-dev] openssl 1.0.2 SNAPSHOT issue that exists since 20160521

The Doctor doctor at doctor.nl2k.ab.ca
Tue May 24 14:24:12 UTC 2016


On Tue, May 24, 2016 at 12:26:02PM +0200, Richard Levitte wrote:
> In message <20160524070954.GA17442 at doctor.nl2k.ab.ca> on Tue, 24 May 2016 01:09:55 -0600, The Doctor <doctor at doctor.nl2k.ab.ca> said:
> 
> doctor> On Mon, May 23, 2016 at 10:10:46AM +0200, Richard Levitte wrote:
> doctor> > In message <20160523070428.GA17582 at doctor.nl2k.ab.ca> on Mon, 23 May 2016 01:04:29 -0600, The Doctor <doctor at doctor.nl2k.ab.ca> said:
> doctor> > 
> doctor> > doctor> On Sun, May 22, 2016 at 06:34:26AM -0600, The Doctor wrote:
> doctor> > doctor> > 
> doctor> > doctor> > when executing
> doctor> > doctor> > 
> doctor> > doctor> > ../apps/openssl x509 -sha1 -CAcreateserial -in reqCA.ss -days 30 -req -out certCA.ss -signkey keyCA.ss -extfile CAss.cnf -extensions v3_ca 
> doctor> > doctor> > 
> doctor> > doctor> > during the test phase, it looks as if the test hangs.
> doctor> > doctor> > 
> doctor> > doctor> > Please look into this.
> doctor> > doctor> > 
> doctor> > doctor> 
> doctor> > doctor> 
> doctor> > doctor> This issue now exists in 20160523 .
> doctor> > doctor> 
> doctor> > doctor> Please look into this showstopper.
> doctor> > 
> doctor> > Can't reproduce.  I've tried on Linux (Debian bleeding edge) and
> doctor> > FreeBSD (8.4-RELEASE-p14).  However, I did it with the default config
> doctor> > (BSD-x86_64, which is what ./config gives me automagically, and no
> doctor> > extra options), please remind me of yours.
> doctor> >
> doctor> 
> doctor> All right,  what changed between 20160520 and 20160521 ?
> doctor> 
> doctor> Simple question.  That is the source of the showstopper.
> 
> I'm attaching the only change that I can think makes a difference.
> Try a 'patch -R -p1 < xopen_source.patch' and see if that changes
> anything.
> 
> I don't think we're going to back off from that change, so if you can
> help us figure out what goes wrong with it on your system and how to
> improve the change, that's be great.
> 
> Cheers,
> Richard
> 
> -- 
> Richard Levitte         levitte at openssl.org
> OpenSSL Project         http://www.openssl.org/~levitte/

> commit e10b54ca32280d9fec20085f404dcdcf2217c90e
> Author: Andy Polyakov <appro at openssl.org>
> Date:   Mon May 16 16:44:33 2016 +0200
> 
>     rand/randfile.c: remove _XOPEN_SOURCE definition.
>     
>     Defintions of macros similar to _XOPEN_SOURCE belong in command line
>     or in worst case prior first #include directive in source. As for
>     macros is was allegedly controlling. One can argue that we are
>     probably better off demanding S_IS* macros but there are systems
>     that just don't comply, hence this compromise solution...
>     
>     Reviewed-by: Rich Salz <rsalz at openssl.org>
>     (cherry picked from commit 2e6d7799ffc47604d06e0465afeb84b91aff8006)
> 
> diff --git a/crypto/rand/randfile.c b/crypto/rand/randfile.c
> index 9537c56..76bdb9a 100644
> --- a/crypto/rand/randfile.c
> +++ b/crypto/rand/randfile.c
> @@ -56,11 +56,6 @@
>   * [including the GNU Public Licence.]
>   */
>  
> -/* We need to define this to get macros like S_IFBLK and S_IFCHR */
> -#if !defined(OPENSSL_SYS_VXWORKS)
> -# define _XOPEN_SOURCE 500
> -#endif
> -
>  #include <errno.h>
>  #include <stdio.h>
>  #include <stdlib.h>
> @@ -80,6 +75,29 @@
>  #ifndef OPENSSL_NO_POSIX_IO
>  # include <sys/stat.h>
>  # include <fcntl.h>
> +/*
> + * Following should not be needed, and we could have been stricter
> + * and demand S_IS*. But some systems just don't comply... Formally
> + * below macros are "anatomically incorrect", because normally they
> + * would look like ((m) & MASK == TYPE), but since MASK availability
> + * is as questionable, we settle for this poor-man fallback...
> + */
> +# if !defined(S_ISBLK)
> +#  if defined(_S_IFBLK)
> +#   define S_ISBLK(m) ((m) & _S_IFBLK)
> +#  elif defined(S_IFBLK)
> +#   define S_ISBLK(m) ((m) & S_IFBLK)
> +#  elif defined(_WIN32)
> +#   define S_ISBLK(m) 0 /* no concept of block devices on Windows */
> +#  endif
> +# endif
> +# if !defined(S_ISCHR)
> +#  if defined(_S_IFCHR)
> +#   define S_ISCHR(m) ((m) & _S_IFCHR)
> +#  elif defined(S_IFCHR)
> +#   define S_ISCHR(m) ((m) & S_IFCHR)
> +#  endif
> +# endif
>  #endif
>  
>  #ifdef _WIN32
> @@ -151,8 +169,8 @@ int RAND_load_file(const char *file, long bytes)
>  #endif
>      if (in == NULL)
>          goto err;
> -#if defined(S_IFBLK) && defined(S_IFCHR) && !defined(OPENSSL_NO_POSIX_IO)
> -    if (sb.st_mode & (S_IFBLK | S_IFCHR)) {
> +#if defined(S_ISBLK) && defined(S_ISCHR) && !defined(OPENSSL_NO_POSIX_IO)
> +    if (S_ISBLK(sb.st_mode) || S_ISCHR(sb.st_mode)) {
>          /*
>           * this file is a device. we don't want read an infinite number of
>           * bytes from a random device, nor do we want to use buffered I/O

The patch worked.  What is next?
-- 
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist rising! 
http://www.fullyfollow.me/rootnl2k  Look at Psalms 14 and 53 on Atheism
Abuse a man unjustly, and you will make friends for him.  -Edgar Watson Howe


More information about the openssl-dev mailing list