https://bugzilla.mindrot.org/show_bug.cgi?id=3855

--- Comment #6 from Damien Miller <[email protected]> ---
(In reply to Adrian Jarc from comment #5)

> If WolfSSL changes how that works, their wolfCrypt module won't be
> FIPS certified anymore, and that does not help. So this is not an
> option.

No, what I mean is asking if there are any existing WolfSSL API calls
that can be made to prepare it for sandboxing.

> As for 2. point, can we get some pointers as how we could do that?

You'll need to identify the syscall that is failing. If you build
OpenSSH with the SANDBOX_SECCOMP_FILTER_DEBUG define set in
sandbox-seccomp-filter.c (don't use this in production) you'll get an
error message including the syscall number.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
_______________________________________________
openssh-bugs mailing list
[email protected]
https://lists.mindrot.org/mailman/listinfo/openssh-bugs

Reply via email to