[Openssl 1.1.1n] application core dump while calling sk_X509_pop_free(s->verified_chain, X509_free);

Ma Zhenhua mazhh at outlook.com
Fri Mar 3 02:21:43 UTC 2023


Hi Team,

My application core dumps twice in the same procedure while pop and free s->verified_chain. I don't find possible cause until now. Any constructive advice is highly appreciated.

1.
(gdb) bt
0 0x00007f2239411a80 in je_large_prof_tctx_get () from /lib/libjemalloc.so.2
1 0x00007f22393befe4 in free () from /lib/libjemalloc.so.2
0000002 0x00007f223405b005 in CRYPTO_free (str=<optimized out>, file=<optimized out>, line=<optimized out>) at crypto/mem.c:316
3 0x00007f2233f652fd in asn1_string_embed_free (a=0x7f20520f0018, embed=4096) at crypto/asn1/asn1_lib.c:355
4 0x00007f2233f710cf in asn1_primitive_free (pval=<optimized out>, it=<optimized out>, embed=<optimized out>) at crypto/asn1/tasn_fre.c:204
5 0x00007f2233f71530 in asn1_template_free (pval=0x7f20767fc110, tt=tt at entry=0x7f22343b6730 <X509_seq_tt+80>) at crypto/asn1/tasn_fre.c:142
6 0x00007f2233f71386 in asn1_item_embed_free (pval=0x7f20767fc1b8, it=0x7f22343ad200 <X509_it>, embed=0) at crypto/asn1/tasn_fre.c:110
7 0x00007f2233f71475 in ASN1_item_free (val=<optimized out>, it=<optimized out>) at crypto/asn1/tasn_fre.c:20
8 0x00007f22340c7011 in OPENSSL_sk_pop_free (st=0x7f2051e1c860, func=0x7f22340e8250 <X509_free>) at crypto/stack/stack.c:368
9 0x00007f2231e9f45f in sk_X509_pop_free (freefunc=<optimized out>, sk=<optimized out>) at include/openssl/x509.h:99
10 SSL_free (s=0x7f20522b2800) at ssl/ssl_lib.c:1218
...

10 SSL_free (s=0x7f20522b2800) at ssl/ssl_lib.c:1218
Frame 10 is corresponding to the following code.
    sk_X509_pop_free(s->verified_chain, X509_free);

8 0x00007f22340c7011 in OPENSSL_sk_pop_free (st=0x7f2051e1c860, func=0x7f22340e8250 <X509_free>) at crypto/stack/stack.c:368
While frame 8 is the function to pop free the following field in SSL data structure.
    /* Verified chain of peer */
    STACK_OF(X509) *verified_chain;

And from the below gdb process, there're 4 X509 pointers in the stack and it encounters error while attempting to free the 3rd item.
(gdb) f 8
8 0x00007f22340c7011 in OPENSSL_sk_pop_free (st=0x7f2051e1c860, func=0x7f22340e8250 <X509_free>) at crypto/stack/stack.c:368
368 crypto/stack/stack.c: No such file or directory.
(gdb) p/a func
$3 = 0x7f22340e8250 <X509_free>
(gdb) p *st
$4 = {num = 4, data = 0x7f2051e1cb60, sorted = 0, num_alloc = 4, comp = 0x0}
(gdb) f 8
8 0x00007f22340c7011 in OPENSSL_sk_pop_free (st=0x7f2051e1c860, func=0x7f22340e8250 <X509_free>) at crypto/stack/stack.c:368
368 in crypto/stack/stack.c
(gdb) p i
$5 = 2
(gdb) p st->data[0]
$6 = (const void *) 0x7f2051dbfe00
(gdb) p st->data[1]
$7 = (const void *) 0x7f2051b1a700
(gdb) p st->data[2]
$8 = (const void *) 0x7f20520eff80
(gdb) p st->data[3]
$9 = (const void *) 0x7f20520f0e80
(gdb) x/4xg st->data
0x7f2051e1cb60: 0x00007f2051dbfe00 0x00007f2051b1a700
0x7f2051e1cb70: 0x00007f20520eff80 0x00007f20520f0e80

(gdb) p *((struct x509_st *)0x00007f2051dbfe00)
$14 = {cert_info = {version = 0x0, serialNumber = {length = 8, type = 2, data = 0x7f206c39c0e0 "\275\375\333\371\021\340\006J",
      flags = 128}, signature = {algorithm = 0x0, parameter = 0x0}, issuer = 0x0, validity = {notBefore = 0x0, notAfter = 0x0},
    subject = 0x0, key = 0x0, issuerUID = 0x0, subjectUID = 0x0, extensions = 0x0, enc = {enc = 0x0, len = 0, modified = 1}}, sig_alg = {
    algorithm = 0x0, parameter = 0x0}, signature = {length = 256, type = 3,
    data = 0x7f2052104200 "\270\334\001=\250KY:\312\031 \346x2\036\tg'^\276bh\020\232\301\247\r\270\017\375\314\355\274$\362\213\342\246\r\235\374\353\257\272S\311/\211L\245\331\371\021z\214\324\\\203\200\360,\347\375s\376\345\036\207\322\314\211\216\207\254\274\006\236\314\270o\027\215\370\316\266M\274^\211\023DR\251\306\364i\261\243{\351\ru\253B@\214\n\030\274\305^V'\207\024\372\274\310\303\220bXmG\241\331(\212\331\065\365\037\251%\260\366+\311\304`\\\211\267\367\327i\035+\315\311\210\277,\303[\205\340!\035\310\343\354}\330&\nd]\262\214\274\312\344|a{\340\031\\\264\356\244\317\005\263)3\"", flags = 136}, siginf = {mdnid = 672, pknid = 6, secbits = 128, flags = 3}, references = 0, ex_data = {
    sk = 0x0}, ex_pathlen = -1, ex_pcpathlen = -1, ex_flags = 263, ex_kusage = 160, ex_xkusage = 3, ex_nscert = 0, skid = 0x7f2051e11a80,
  akid = 0x7f2051e1bee0, policy_cache = 0x0, crldp = 0x7f2051e16a60, altname = 0x7f2051e11440, nc = 0x0, rfc3779_addr = 0x0,
  rfc3779_asid = 0x0, sha1_hash = "\037g[.\374\250\301\257\227\203\310\230\064\036\330\302\256\223\006\006", aux = 0x0, lock = 0x0,
  ex_cached = 1}
(gdb) p ((struct x509_st *)0x00007f2051dbfe00)->altname
$15 = (struct stack_st_GENERAL_NAME *) 0x7f2051e11440
(gdb) p *((struct stack_st_GENERAL_NAME *) 0x7f2051e11440)
No struct type named stack_st_GENERAL_NAME.
(gdb)
No struct type named stack_st_GENERAL_NAME.
(gdb) p *((struct x509_st *)0x00007f20520eff80)
$16 = {cert_info = {version = 0x7f2051ceddc0, serialNumber = {length = 3, type = 2, data = 0x7f206fb8f1f8 "\033\347\025\006", flags = 128},
    signature = {algorithm = 0x7f22343a26c0 <nid_objs+26720>, parameter = 0x7f206a22e7b0}, issuer = 0x7f20516c1790, validity = {
      notBefore = 0x7f2051cde820, notAfter = 0x7f2051d19f20}, subject = 0x7f2051742fa0, key = 0x7f2051cec3e0, issuerUID = 0x0,
    subjectUID = 0x0, extensions = 0x7f2051d2e0a0, enc = {
      enc = 0x7f2051fa9f80 "0\202\003e\240\003\002\001\002\002\003\033\347\025\060\r\006\t*\206H\206\367\r\001\001\v\005", len = 873,
      modified = 0}}, sig_alg = {algorithm = 0x7f22343a26c0 <nid_objs+26720>, parameter = 0x7f20704fd310}, signature = {length = 256,
    type = 3,
    data = 0x7f206fc1a000 "Y\vS\275\222\206\021\247${\355[1\317\035\037lp\305\270n\276N\273\366\276\227P\341\060\177\272(\\b\224\302\343~3\367\373Bv\205\333\225\034\214\"Xu\t\f\210eg9\n\026\t\305\240\070\227\244\305#\223?\264\030\246\001\006D\221\343\247i'\264Z%\177:\267\062\315\335\204\377*8)3\244\335g\262\205\376\241\210 \034P\211\310\334*\366B\003\067L\346\210\337\325\257$\362\261\303\337\314\265\354\340\231^\267IT <\224\030\f\307\034R\030I\244m\341\263X\v\311\330\354\331\256\034\062\216(p\r\342\376\246\027\236\204\017\275Wp\263Z\351\037\240\206S\273\357|\377i\v\340H\303\267\223\v\310\nT\304\254]\024g7"..., flags = 136}, siginf = {mdnid = 672, pknid = 6, secbits = 128, flags = 3}, references = 0,
  ex_data = {sk = 0x0}, ex_pathlen = -1, ex_pcpathlen = -1, ex_flags = 275, ex_kusage = 6, ex_xkusage = 0, ex_nscert = 0,
  skid = 0x7f2051e6cf20, akid = 0x7f2051f01fa0, policy_cache = 0x0, crldp = 0x7f2051f2ed60, altname = 0x0, nc = 0x0, rfc3779_addr = 0x0,
  rfc3779_asid = 0x0, sha1_hash = "4\v(\200\364F\374\300NY\355\063\365+=\b\326$)d", aux = 0x0, lock = 0x0, ex_cached = 1}

2.
Program terminated with signal SIGSEGV, Segmentation fault.
0 0x00007fdb3f8eea80 in je_large_prof_tctx_get () from /lib/libjemalloc.so.2
[Current thread is 1 (Thread 0x7fd8959fd700 (LWP 23415))]
(gdb) bt
0 0x00007fdb3f8eea80 in je_large_prof_tctx_get () from /lib/libjemalloc.so.2
1 0x00007fdb3f89bfe4 in free () from /lib/libjemalloc.so.2
0000002 0x00007fdb3a535005 in CRYPTO_free (str=<optimized out>, file=<optimized out>, line=<optimized out>) at crypto/mem.c:316
3 0x00007fdb3a44b3c5 in asn1_item_embed_free (pval=0x7fd8959fa1a8, it=0x7fdb3a887200 <X509_it>, embed=0) at crypto/asn1/tasn_fre.c:115
4 0x00007fdb3a44b475 in ASN1_item_free (val=<optimized out>, it=<optimized out>) at crypto/asn1/tasn_fre.c:20
5 0x00007fdb3a5a1011 in OPENSSL_sk_pop_free (st=0x7fd86c8e8120, func=0x7fdb3a5c2250 <X509_free>) at crypto/stack/stack.c:368
6 0x00007fdb3836a45f in sk_X509_pop_free (freefunc=<optimized out>, sk=<optimized out>) at include/openssl/x509.h:99
7 SSL_free (s=0x7fd86c45d800) at ssl/ssl_lib.c:1218
...
(gdb) f 7
7 SSL_free (s=0x7fd86c45d800) at ssl/ssl_lib.c:1218
1218 ssl/ssl_lib.c: No such file or directory.
(gdb) p s->verified_chain
$1 = (struct stack_st_X509 *) 0x7fd86c8e8120
(gdb) p *(s->verified_chain)
$2 = <incomplete type>
(gdb) p *((struct stack_st *)s->verified_chain)
$3 = {num = 4, data = 0x7fd86c8e8280, sorted = 0, num_alloc = 4, comp = 0x0}
(gdb) p ((struct stack_st *)s->verified_chain)->data[0]
$4 = (const void *) 0x7fd86983cb00
(gdb) p ((struct stack_st *)s->verified_chain)->data[1]
$5 = (const void *) 0x7fd869bd4180
(gdb) p ((struct stack_st *)s->verified_chain)->data[2]
$6 = (const void *) 0x7fd869bd4480
(gdb) p ((struct stack_st *)s->verified_chain)->data[3]
$7 = (const void *) 0x7fd86a803580
(gdb) x/4xg 0x7fd86c8e8280
0x7fd86c8e8280: 0x00007fd86983cb00 0x00007fd869bd4180
0x7fd86c8e8290: 0x00007fd869bd4480 0x00007fd86a803580
(gdb) p *(struct x509_st *)0x00007fd86983cb00
$8 = {cert_info = {version = 0x0, serialNumber = {length = 16, type = 2, data = 0x7fd86c8b5b00 "\017Ek\230\036\254\277\231\a", flags = 128},
    signature = {algorithm = 0x0, parameter = 0x0}, issuer = 0x0, validity = {notBefore = 0x0, notAfter = 0x0}, subject = 0x0, key = 0x0,
    issuerUID = 0x0, subjectUID = 0x0, extensions = 0x0, enc = {enc = 0x0, len = 0, modified = 1}}, sig_alg = {algorithm = 0x0,
    parameter = 0x0}, signature = {length = 256, type = 3,
    data = 0x7fd86c68eb00 "0\301\376\350\016\365\023K\301\374j\347\350\003\063%\211\365\347,\004\023/+\361e\310\272:\353\023\341\005_",
    flags = 136}, siginf = {mdnid = 672, pknid = 6, secbits = 128, flags = 3}, references = 0, ex_data = {sk = 0x0}, ex_pathlen = -1,
  ex_pcpathlen = -1, ex_flags = 263, ex_kusage = 160, ex_xkusage = 3, ex_nscert = 0, skid = 0x7fd86c8d6360, akid = 0x7fd86c8e8840,
  policy_cache = 0x0, crldp = 0x7fd86c8e85e0, altname = 0x7fd86c8e8860, nc = 0x0, rfc3779_addr = 0x0, rfc3779_asid = 0x0,
  sha1_hash = "\356e\023%I\024dlJr\337_\246\004X\235\066\377\003\256", aux = 0x0, lock = 0x0, ex_cached = 1}
(gdb) p *(struct x509_st *)0x00007fd869bd4180
$9 = {cert_info = {version = 0x0, serialNumber = {length = 19, type = 2,
      data = 0x7fd86c8b6500 "\as\022\070\v\235f\210\243;\036\331\277\234\315\246\216\016\017", flags = 128}, signature = {algorithm = 0x0,
      parameter = 0x0}, issuer = 0x0, validity = {notBefore = 0x0, notAfter = 0x0}, subject = 0x0, key = 0x0, issuerUID = 0x0,
    subjectUID = 0x0, extensions = 0x0, enc = {enc = 0x0, len = 0, modified = 1}}, sig_alg = {algorithm = 0x0, parameter = 0x0},
  signature = {length = 256, type = 3, data = 0x7fd86c68ef00 "\255", flags = 136}, siginf = {mdnid = 672, pknid = 6, secbits = 128,
    flags = 3}, references = 0, ex_data = {sk = 0x0}, ex_pathlen = 0, ex_pcpathlen = -1, ex_flags = 279, ex_kusage = 134, ex_xkusage = 3,
  ex_nscert = 0, skid = 0x7fd86c8e8140, akid = 0x7fd86c8d6f20, policy_cache = 0x0, crldp = 0x7fd86c8e8080, altname = 0x0, nc = 0x0,
  rfc3779_addr = 0x0, rfc3779_asid = 0x0, sha1_hash = "*\331t\247u\367<\275\273\330\365\254:I%_\250\373\037\214", aux = 0x0, lock = 0x0,
  ex_cached = 1}
(gdb) p *(struct x509_st *)0x00007fd869bd4480
$10 = {cert_info = {version = 0x7fd86c8bb800, serialNumber = {length = 19, type = 2,
      data = 0x7fd86c8b6e40 "\006\177\224J*'\315\363\372\302\256+\001\371\b\356\271\304\306", flags = 128}, signature = {
      algorithm = 0x7fdb3a87c6c0 <nid_objs+26720>, parameter = 0x7fd8884f7f40}, issuer = 0x7fd873a25190, validity = {
      notBefore = 0x7fd86c8bb180, notAfter = 0x7fd86c8b6fe0}, subject = 0x7fd873a251c0, key = 0x7fd86c8bb780, issuerUID = 0x0,
    subjectUID = 0x0, extensions = 0x7fd86c8b6dc0, enc = {
      enc = 0x7fd8878e8c00 "0\202\003z\240\003\002\001\002\002\023\006\177\224J*'\315\363\372\302\256+\001\371\b\356\271\304\306\060\r\006\t*\206H\206\367\r\001\001\v\005", len = 894, modified = 0}}, sig_alg = {algorithm = 0x7fdb3a87c6c0 <nid_objs+26720>,
    parameter = 0x7fd887848200}, signature = {length = 256, type = 3, data = 0x7fd86c6c3b00 "b7B\\\274\020\265>\213,\351\f\233lE\342\a",
    flags = 136}, siginf = {mdnid = 672, pknid = 6, secbits = 128, flags = 3}, references = 1, ex_data = {sk = 0x0}, ex_pathlen = -1,
  ex_pcpathlen = -1, ex_flags = 275, ex_kusage = 134, ex_xkusage = 0, ex_nscert = 0, skid = 0x7fd86c8e8a60, akid = 0x7fd86c8e8b40,
  policy_cache = 0x0, crldp = 0x7fd86c8e8c00, altname = 0x0, nc = 0x0, rfc3779_addr = 0x0, rfc3779_asid = 0x0,
  sha1_hash = "\006\262Y'\304*r\026\061\301\357\331C\036d\217\246.\036\071", aux = 0x0, lock = 0x7fd873a25100, ex_cached = 1}
(gdb) p *(struct x509_st *)0x00007fd86a803580
$11 = {cert_info = {version = 0x7fd86c8d6080, serialNumber = {length = 8, type = 2, data = 0x7fd887848260 "\247\016JL4\202\267\177",
      flags = 128}, signature = {algorithm = 0x7fdb3a87c6c0 <nid_objs+26720>, parameter = 0x7fd887848280}, issuer = 0x7fd873ab4510,
    validity = {notBefore = 0x7fd86c8bbbe0, notAfter = 0x7fd86c8d6820}, subject = 0x7fd873ab4660, key = 0x7fd86c8bbf40, issuerUID = 0x0,
    subjectUID = 0x0, extensions = 0x7fd86c8d6c60, enc = {enc = 0x7fd8878eaf00 "0\202\003]\240\003\002\001\002\002\t", len = 865,
      modified = 0}}, sig_alg = {algorithm = 0x7fdb3a87c6c0 <nid_objs+26720>, parameter = 0x7fd8878483f0}, signature = {length = 256,
    type = 3,
    data = 0x7fd86c735600 "#\035\343\212W\312}\351\027yL\361\036U\375\314Sn>G\017\337\306U\362\262\004\066\355\200\037S\304]4(k\276\307U\374g\352\313?\177\220\262\063\315\033X\020\202\002\370\370/\365\023`\324\005\316\361\201\b\301\335\247u\227O\030\271m\336\367\223\221\b\272~@,\355\301\352\273v\236\063\006w\035\r\b\177S\335\033d\253\202'\361i\325M^\256\364\241\303u\247XD-\362<p\230\254\272i\266\225w\177\017\061^,\374\240\207:Gi\360y_\364\024T\244\225^\021x\022`'\316\237\302w\377#Sw]\272\377\352Y\347\333\317\257\222\226\357$\232\065\020z\234\221\306\016}\231\366?\031\337\365rT\341\025\251\aY{\203\277"..., flags = 136}, siginf = {mdnid = 672, pknid = 6, secbits = 128, flags = 3}, references = 1,
  ex_data = {sk = 0x0}, ex_pathlen = -1, ex_pcpathlen = -1, ex_flags = 275, ex_kusage = 134, ex_xkusage = 0, ex_nscert = 0,
  skid = 0x7fd86c8e8de0, akid = 0x7fd86c8e8e20, policy_cache = 0x0, crldp = 0x7fd86c8e8ea0, altname = 0x0, nc = 0x0, rfc3779_addr = 0x0,
  rfc3779_asid = 0x0, sha1_hash = "\236\231\244\212\231`\261I&\273\177;\002\342-\242\260\253r\200", aux = 0x0, lock = 0x7fd873ab40c0,
  ex_cached = 1}
(gdb) p *(struct X509_name_st *)0x7fd873a25190
$12 = {entries = 0x7fd86c8bb500, modified = 0, bytes = 0x7fd86c8b6a20,
  canon_enc = 0x7fd88c383ca0 "1\v0\t\006\003U\004\006\f\002us1\020\060\016\006\003U\004\b\f\aarizona1\023\060\021\006\003U\004\a\f\nscottsdale1%0#\006\003U\004\n\f\034starfield technologies, inc.1;09\006\003U\004\003\f2starfield services root certificate authority - g2",
  canon_enclen = 152}
(gdb) p *(struct X509_name_st *)0x7fd873a251c0
$13 = {entries = 0x7fd86c8bb760, modified = 0, bytes = 0x7fd86c8bb820,
  canon_enc = 0x7fd88bb2c9c0 "1\v0\t\006\003U\004\006\f\002us1\017\060\r\006\003U\004\n\f\006amazon1\031\060\027\006\003U\004\003\f\020amazon root ca 1\310\262\213\330\177", canon_enclen = 57}
(gdb) p *(struct X509_name_st *)0x7fd873ab4510
$14 = {entries = 0x7fd86c8bbe20, modified = 0, bytes = 0x7fd86c8bbc20,
  canon_enc = 0x7fd873925250 "1\v0\t\006\003U\004\006\f\002us1%0#\006\003U\004\n\f\034starfield technologies, inc.1200\006\003U\004\v\f)starfield class 2 certification authority537.36", canon_enclen = 104}
(gdb) p *(struct X509_name_st *)0x7fd873ab4660
$15 = {entries = 0x7fd86c8d6840, modified = 0, bytes = 0x7fd86c8d6100,
  canon_enc = 0x7fd88c3842e0 "1\v0\t\006\003U\004\006\f\002us1\020\060\016\006\003U\004\b\f\aarizona1\023\060\021\006\003U\004\a\f\nscottsdale1%0#\006\003U\004\n\f\034starfield technologies, inc.1;09\006\003U\004\003\f2starfield services root certificate authority - g2",
  canon_enclen = 152}
(gdb) f 5
5 0x00007fdb3a5a1011 in OPENSSL_sk_pop_free (st=0x7fd86c8e8120, func=0x7fdb3a5c2250 <X509_free>) at crypto/stack/stack.c:368
368 crypto/stack/stack.c: No such file or directory.
(gdb) p i
$16 = 1
(gdb) p st->data[i]
$17 = (const void *) 0x7fd869bd4180
(gdb) bt
0 0x00007fdb3f8eea80 in je_large_prof_tctx_get () from /lib/libjemalloc.so.2
1 0x00007fdb3f89bfe4 in free () from /lib/libjemalloc.so.2
0000002 0x00007fdb3a535005 in CRYPTO_free (str=<optimized out>, file=<optimized out>, line=<optimized out>) at crypto/mem.c:316
3 0x00007fdb3a44b3c5 in asn1_item_embed_free (pval=0x7fd8959fa1a8, it=0x7fdb3a887200 <X509_it>, embed=0) at crypto/asn1/tasn_fre.c:115
4 0x00007fdb3a44b475 in ASN1_item_free (val=<optimized out>, it=<optimized out>) at crypto/asn1/tasn_fre.c:20
5 0x00007fdb3a5a1011 in OPENSSL_sk_pop_free (st=0x7fd86c8e8120, func=0x7fdb3a5c2250 <X509_free>) at crypto/stack/stack.c:368
6 0x00007fdb3836a45f in sk_X509_pop_free (freefunc=<optimized out>, sk=<optimized out>) at include/openssl/x509.h:99
7 SSL_free (s=0x7fd86c45d800) at ssl/ssl_lib.c:1218
8 0x000055f28fcd9765 in ssl_free (ssl=0x7fd86c45d800) at ./ssl/ssl_conn.c:665
9 0x000055f28fa4cf7b in conn_free (conn=conn at entry=0x7fd88ccb9bc0) at ./core/connection.c:1541
10 0x000055f28fa4ad62 in conn_eh_finsend (fd=<optimized out>, e=<optimized out>, arg=0x7fd88ccb9c78) at ./core/connection.c:1456
11 0x000055f28fa9b2c0 in fd_epoll_poll (fe=0x7fd88ccea000, ntask=0, work_index=1, clock=clock at entry=0x7fd8959fa588) at ./core/fd_epoll.c:324
12 0x000055f28fae39fd in _worker_loop (ti=ti at entry=0x7fdb349e6470) at ./core/worker.c:2346
13 0x000055f28fae3dc8 in worker_run (arg=0x7fdb349e6470) at ./core/worker.c:2465
14 0x00007fdb3f7adf27 in start_thread () from /lib/libpthread.so.0
15 0x00007fdb382411df in clone () from /lib/libc.so.6
(gdb) f 3
3 0x00007fdb3a44b3c5 in asn1_item_embed_free (pval=0x7fd8959fa1a8, it=0x7fdb3a887200 <X509_it>, embed=0) at crypto/asn1/tasn_fre.c:115
115 crypto/asn1/tasn_fre.c: No such file or directory.
(gdb) p *pval
$18 = (ASN1_VALUE *) 0x7fd869bd4180
(gdb) p **pval
$19 = <incomplete type>
(gdb) p *it
$20 = {itype = 1 '\001', utype = 16, templates = 0x7fdb3a8906e0 <X509_seq_tt>, tcount = 3, funcs = 0x7fdb3a887240 <X509_aux>, size = 352,
  sname = 0x7fdb3a6161c2 "ORE_add_crl"}
(gdb) p it->itype
$21 = 1 '\001'
(gdb) p asn1_cb
$22 = <optimized out>
(gdb) p *((struct ASN1_AUX_st *)0x7fdb3a887240)
$23 = {app_data = 0x0, flags = 1, ref_offset = 192, ref_lock = 336, asn1_cb = 0x7fdb3a5c1fb0 <x509_cb>, enc_offset = 0}
(gdb) p i
$24 = <optimized out>
(gdb) p pval
$25 = (ASN1_VALUE **) 0x7fd8959fa1a8
(gdb) p *pval
$26 = (ASN1_VALUE *) 0x7fd869bd4180
(gdb) x 0x7fdb3a887240
0x7fdb3a887240 <X509_aux>: 0x0000000000000000
(gdb) x/1xg *pval
0x7fd869bd4180: 0x0000000000000000
(gdb) x 0x7fd869bd4180
0x7fd869bd4180: 0x0000000000000000
(gdb) x/16xg *pval
0x7fd869bd4180: 0x0000000000000000 0x0000000200000013
0x7fd869bd4190: 0x00007fd86c8b6500 0x0000000000000080
0x7fd869bd41a0: 0x0000000000000000 0x0000000000000000
0x7fd869bd41b0: 0x0000000000000000 0x0000000000000000
0x7fd869bd41c0: 0x0000000000000000 0x0000000000000000
0x7fd869bd41d0: 0x0000000000000000 0x0000000000000000
0x7fd869bd41e0: 0x0000000000000000 0x0000000000000000
0x7fd869bd41f0: 0x0000000000000000 0x0000000000000000
(gdb) x/16ag *pval
0x7fd869bd4180: 0x0 0x200000013
0x7fd869bd4190: 0x7fd86c8b6500 0x80
0x7fd869bd41a0: 0x0 0x0
0x7fd869bd41b0: 0x0 0x0
0x7fd869bd41c0: 0x0 0x0
0x7fd869bd41d0: 0x0 0x0
0x7fd869bd41e0: 0x0 0x0
0x7fd869bd41f0: 0x0 0x0
(gdb) x/16aw *pval
0x7fd869bd4180: 0x0 0x0 0x13 0x2
0x7fd869bd4190: 0x6c8b6500 0x7fd8 0x80 0x0
0x7fd869bd41a0: 0x0 0x0 0x0 0x0
0x7fd869bd41b0: 0x0 0x0 0x0 0x0
(gdb)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20230303/8fe493a0/attachment-0001.htm>


More information about the openssl-users mailing list