Date: Thu, 13 Dec 2001 20:15:58 -0800 From: Kris Kennaway <kris@FreeBSD.ORG> To: KAISER Laszlo <titanic@ovinet.hu> Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: SSL_connect fails Message-ID: <20011213201558.B84382@citusc17.usc.edu> In-Reply-To: <20011210104529.A8829@ovinet.hu>; from titanic@ovinet.hu on Mon, Dec 10, 2001 at 10:45:30AM %2B0100 References: <20011209184143.H12621@ovinet.hu> <20011210104529.A8829@ovinet.hu>
index | next in thread | previous in thread | raw e-mail
[-- Attachment #1 --] On Mon, Dec 10, 2001 at 10:45:30AM +0100, KAISER Laszlo wrote: > On Sun, Dec 09, 2001 at 06:41:43PM +0100, KAISER Laszlo wrote: > > I'm doing a port of a little OpenSSL program to FreeBSD from linux, but the > > code which works fine on linux fails on FreeBSD at SSL_connect(). > > This function allways returns with -1 and SSL_errno is 1. > > To answer myself; > > The problem was trivial. OpenSSL couldn't seed random generator for correct > entropy without /dev/urandom or without a specified file, therefore i had to > create a temporary file which consists of enough random numbers (1024). This > was problem on solaris port, too, but on BSD it caused by chroot > environment. OpenSSL got the filename consists of entropy from an > environment value named RANDFILE. > > Some notice: > I think an API hasn't consists of exit() calls and if i send a NULL > pointer to an API call, it couldn't SEGFAULT. OpenSSL does. I think it is > not a feature, or if it is, i'like to turn off. :/ Complain to the OpenSSL developers, not us. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE8GXz8Wry0BWjoQKURApKIAKCgkJzf4coH/DLrSQPjbA9X+MdbHwCdH8ly 3hJf0K95v5eO641BB8eHXYA= =08xF -----END PGP SIGNATURE-----home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011213201558.B84382>
