On Sun, Mar 13, 2005, robert j. wozny wrote: > When the openssl command is run, it fail with error which states, that > it was unable to get sufficient entropy. > On Solaris 10, the open(2) call is made with an O_NOFOLLOW option. > (which isn't exist in the previous version of Solaris). > On Solaris 9 and 10, /dev/random and /dev/urandom are symbolic links: > > /dev/urandom -> ../devices/pseudo/[EMAIL PROTECTED]:urandom > > So, on Solaris 10, open(2) fails, because of O_NOFOLLOW option (don't > follow links...). > > Workaround: remove O_NOFOLLOW from rand_unix.c and rebuild all rpms > depending on OpenSSL. see attached patch.
Yes, the same change was applied to OpenSSL 0.9.8-dev on 13-Jan-2005, too. I've taken it over into OpenPKG CURRENT and merged it into 2.3: http://cvs.openpkg.org/chngview?cn=22567 Thanks for your feedback and support. Ralf S. Engelschall [EMAIL PROTECTED] www.engelschall.com ______________________________________________________________________ The OpenPKG Project www.openpkg.org Developer Communication List openpkg-dev@openpkg.org