On Sun, Mar 13, 2005, robert j. wozny wrote:

> When the openssl command is run, it fail with error which states, that
> it was unable to get sufficient entropy.
> On Solaris 10, the open(2) call is made with an O_NOFOLLOW option.
> (which isn't exist in the previous version of Solaris).
> On Solaris 9 and 10, /dev/random and /dev/urandom are symbolic links:
>
> /dev/urandom -> ../devices/pseudo/[EMAIL PROTECTED]:urandom
>
> So, on Solaris 10, open(2) fails, because of O_NOFOLLOW option (don't
> follow links...).
>
> Workaround: remove O_NOFOLLOW from rand_unix.c and rebuild all rpms
> depending on OpenSSL. see attached patch.

Yes, the same change was applied to OpenSSL 0.9.8-dev on 13-Jan-2005,
too. I've taken it over into OpenPKG CURRENT and merged it into 2.3:
http://cvs.openpkg.org/chngview?cn=22567
Thanks for your feedback and support.

                                       Ralf S. Engelschall
                                       [EMAIL PROTECTED]
                                       www.engelschall.com

______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
Developer Communication List                   openpkg-dev@openpkg.org

Reply via email to