http://bugzilla.opensuse.org/show_bug.cgi?id=1207555
http://bugzilla.opensuse.org/show_bug.cgi?id=1207555#c2
Luca Beltrame changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |lbeltrame@kde.org
See Also| |https://github.com/transmis
| |sion/transmission/issues/47
| |16
--- Comment #2 from Luca Beltrame ---
As far as I know, transmission uses RC4 as cipher algorithm (cf
https://github.com/termux/termux-packages/issues/10814#issuecomment-11573200...).
However, this is not enabled by default in openSSL 3.
This means that as soon as transmission starts, tries to load it, does not find
it and promptly crashes:
Thread 3 "transmission-da" received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x7ffff66a66c0 (LWP 19992)]
0x00007ffff799180f in EVP_CIPHER_CTX_set_key_length (c=c@entry=0x0,
keylen=keylen@entry=20) at crypto/evp/evp_enc.c:994
Downloading 0.05 MB source file
/usr/src/debug/openssl-3.0.7/crypto/evp/evp_enc.c
994 if (c->cipher->prov != NULL) {
(gdb) print c
$1 = (EVP_CIPHER_CTX *) 0x0
As detailed in the linked thread, the legacy provider (where RC4 is) should be
enabled in openSSL 3 by adding
[legacy_provider]
activate = 1
I'm not sure if there's an issue upstream for transmission regarding this.
--
You are receiving this mail because:
You are on the CC list for the bug.