opensssl 1.1.1g test failure(s)

Michael Tuexen michael.tuexen at lurchi.franken.de
Wed Apr 22 09:02:47 UTC 2020


> On 22. Apr 2020, at 10:38, Matt Caswell <matt at openssl.org> wrote:
> 
> 
> 
> On 21/04/2020 23:45, Michael Tuexen wrote:
>>> Looks like the failing call is here:
>>> 
>>>       if (setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY,
>>>                      (const void *)&on, sizeof(on)) != 0) {
>> Can you provide a pointer to the code?
> 
> Yes, its here:
> 
> https://github.com/openssl/openssl/blob/fa555aa8970260c3e198d91709b2d4b3e40f8fa8/crypto/bio/b_sock2.c#L267-L282
OK. Thanks.

Could it be that on == 0, when you do the setsockopt() call? Disabling IPV6_V6ONLY seems not to be supported
on OpenBSD:

From sys/netinet6/ip6_output.c:

			case IPV6_V6ONLY:
				/*
				 * make setsockopt(IPV6_V6ONLY)
				 * available only prior to bind(2).
				 * see ipng mailing list, Jun 22 2001.
				 */
				if (inp->inp_lport ||
				    !IN6_IS_ADDR_UNSPECIFIED(&inp->inp_laddr6)) {
					error = EINVAL;
					break;
				}
				/* No support for IPv4-mapped addresses. */
				if (!optval)
					error = EINVAL;
				else
					error = 0;
				break;


I don't see a bug in OpenBSD here, or a strange behaviour. OpenBSD just does not support mapped addresses.

Best regards
Michael
> 
> Matt



More information about the openssl-users mailing list