I am getting exception in crypto\bn\bn_mont.c:402 (v=bn_mul_add_words(rp,np,nl,(rp[0]*n0)&BN_MASK2);) while executing with Rational purify.

Does it mean that you can confirm that the program works if not executed with purify?

I think bn_mul_add_words called as assembly code from crypto\bn\asm\bn_win32.asm.

Please see following stacktrace

[E] EXU: Unhandled exception  {1 occurrence}

Exception code: 0xc0000005 [Error: access violation reading from 0x806c001d]

        Exception address: ???            [ip=0x806C001D]

Filter: mainCRTStartup+0x929 [f:\vs70builds\3077\vc\crtbld\crt\src\crt0.c:270 ip=0x007E225D]

        Exception location

RtlConvertUlongToLargeInteger+0x6a [C:\WINDOWS\system32\ntdll.dll ip=0x7C9032A8]

RtlConvertUlongToLargeInteger+0x3c [C:\WINDOWS\system32\ntdll.dll ip=0x7C90327A]

KiUserExceptionDispatcher+0xe [C:\WINDOWS\system32\ntdll.dll ip=0x7C90E46A]

BN_from_montgomery+0x637 [e:\els_code\licensing\licensing_sdk\trunk\vxcrypto\crypto\bn\bn_mont.c:402 ip=0x007700C9]

Note that it points out the *line* with call to bn_mul_add_words, but does not mention the latter in stack trace. But source code *line* in question is not just call, there are handful of instructions around [to be blamed]. So disassemble your binary and see what is the exact instruction at ip=0x007700C9, as well as surrounding instructions. The biggest question is how come exception address is ip=0x806C001D, which is address in kernel space. I'm not implying that kernel code causes the exception, question is how come it appears that way. A.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to