Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Dec 2001 20:15:58 -0800
From:      Kris Kennaway <kris@FreeBSD.ORG>
To:        KAISER Laszlo <titanic@ovinet.hu>
Cc:        freebsd-hackers@FreeBSD.ORG
Subject:   Re: SSL_connect fails
Message-ID:  <20011213201558.B84382@citusc17.usc.edu>
In-Reply-To: <20011210104529.A8829@ovinet.hu>; from titanic@ovinet.hu on Mon, Dec 10, 2001 at 10:45:30AM %2B0100
References:  <20011209184143.H12621@ovinet.hu> <20011210104529.A8829@ovinet.hu>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]
On Mon, Dec 10, 2001 at 10:45:30AM +0100, KAISER Laszlo wrote:
> On Sun, Dec 09, 2001 at 06:41:43PM +0100, KAISER Laszlo wrote:
> > I'm doing a port of a little OpenSSL program to FreeBSD from linux, but the
> > code which works fine on linux fails on FreeBSD at SSL_connect().
> > This function allways returns with -1 and SSL_errno is 1.
> 
> To answer myself;
> 
> The problem was trivial. OpenSSL couldn't seed random generator for correct
> entropy without /dev/urandom or without a specified file, therefore i had to
> create a temporary file which consists of enough random numbers (1024). This
> was problem on solaris port, too, but on BSD it caused by chroot
> environment. OpenSSL got the filename consists of entropy from an
> environment value named RANDFILE.
> 
> Some notice:
> I think an API hasn't consists of exit() calls and if i send a NULL
> pointer to an API call, it couldn't SEGFAULT. OpenSSL does. I think it is
> not a feature, or if it is, i'like to turn off. :/

Complain to the OpenSSL developers, not us.

Kris

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE8GXz8Wry0BWjoQKURApKIAKCgkJzf4coH/DLrSQPjbA9X+MdbHwCdH8ly
3hJf0K95v5eO641BB8eHXYA=
=08xF
-----END PGP SIGNATURE-----
home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011213201558.B84382>