DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=43717>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=43717 [EMAIL PROTECTED] changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|INVALID | ------- Additional Comments From [EMAIL PROTECTED] 2007-12-10 07:04 ------- What do you think about this patch? diff -Nur httpd-2.2.6.orig/modules/ssl/ssl_engine_rand.c httpd-2.2.6/modules/ssl/ssl_engine_rand.c --- httpd-2.2.6.orig/modules/ssl/ssl_engine_rand.c 2006-07-11 22:38:44.000000000 -0500 +++ httpd-2.2.6/modules/ssl/ssl_engine_rand.c 2007-10-01 17:28:24.000000000 -0500 @@ -127,9 +127,23 @@ ap_log_error(APLOG_MARK, APLOG_INFO, 0, s, "%sSeeding PRNG with %d bytes of entropy", prefix, nDone); +/* + * RAND_status() will generate segfaults when more than 1024 filedescriptors are + * open on OpenSSL versions before 0.9.8c and 0.9.7k + */ +#if SSL_LIBRARY_VERSION < 0x00908000 +#if SSL_LIBRARY_VERSION >= 0x009070b0 if (RAND_status() == 0) ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s, "%sPRNG still contains insufficient entropy!", prefix); +#endif +#else +#if SSL_LIBRARY_VERSION >= 0x00908030 + if (RAND_status() == 0) + ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s, + "%sPRNG still contains insufficient entropy!", prefix); +#endif +#endif return nDone; } -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
