I am getting exception in crypto\bn\bn_mont.c:402
(v=bn_mul_add_words(rp,np,nl,(rp[0]*n0)&BN_MASK2);) while executing with
Rational purify.
Does it mean that you can confirm that the program works if not executed
with purify?
I think bn_mul_add_words called as assembly code from
crypto\bn\asm\bn_win32.asm.
Please see following stacktrace
[E] EXU: Unhandled exception {1 occurrence}
Exception code: 0xc0000005 [Error: access violation reading from
0x806c001d]
Exception address: ??? [ip=0x806C001D]
Filter: mainCRTStartup+0x929
[f:\vs70builds\3077\vc\crtbld\crt\src\crt0.c:270 ip=0x007E225D]
Exception location
RtlConvertUlongToLargeInteger+0x6a
[C:\WINDOWS\system32\ntdll.dll ip=0x7C9032A8]
RtlConvertUlongToLargeInteger+0x3c
[C:\WINDOWS\system32\ntdll.dll ip=0x7C90327A]
KiUserExceptionDispatcher+0xe [C:\WINDOWS\system32\ntdll.dll
ip=0x7C90E46A]
BN_from_montgomery+0x637
[e:\els_code\licensing\licensing_sdk\trunk\vxcrypto\crypto\bn\bn_mont.c:402
ip=0x007700C9]
Note that it points out the *line* with call to bn_mul_add_words, but
does not mention the latter in stack trace. But source code *line* in
question is not just call, there are handful of instructions around [to
be blamed]. So disassemble your binary and see what is the exact
instruction at ip=0x007700C9, as well as surrounding instructions. The
biggest question is how come exception address is ip=0x806C001D, which
is address in kernel space. I'm not implying that kernel code causes the
exception, question is how come it appears that way. A.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]