Hi Philip

Just searched the archives and found your message. I had the same problem,
and submitted a patch, not long ago. I also have another 64 bit related
patch. Both are included below
--
Karsten Spang
Senior Software Developer, Ph.D.
Belle Systems A/S
Tel.:   +45 59 44 25 00
Fax.:   +45 59 44 25 88
E-mail: [EMAIL PROTECTED]
Web:    http://www.bellesystems.com/
Defining the Future of IP Services


*** rsa_gen.c.dist      Sat Feb  5 15:17:30 2000
--- rsa_gen.c   Mon May 29 15:19:31 2000
***************
*** 95,101 ****
         * unsigned long can be larger */
        for (i=0; i<sizeof(unsigned long)*8; i++)
                {
!               if (e_value & (1<<i))
                        BN_set_bit(rsa->e,i);
                }
  #else
--- 95,101 ----
         * unsigned long can be larger */
        for (i=0; i<sizeof(unsigned long)*8; i++)
                {
!               if (e_value & (1UL<<i))
                        BN_set_bit(rsa->e,i);
                }
  #else



*** s3_clnt.c.dist      Mon Mar 27 23:28:27 2000
--- s3_clnt.c   Thu May 25 13:36:57 2000
***************
*** 466,472 ****
                p=s->s3->client_random;
                Time=time(NULL);                        /* Time */
                l2n(Time,p);
!               RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-sizeof(Time));
  
                /* Do the message type and length last */
                d=p= &(buf[4]);
--- 466,472 ----
                p=s->s3->client_random;
                Time=time(NULL);                        /* Time */
                l2n(Time,p);
!               RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4);
  
                /* Do the message type and length last */
                d=p= &(buf[4]);
*** s3_srvr.c.dist      Mon Mar 27 23:28:28 2000
--- s3_srvr.c   Thu May 25 13:36:04 2000
***************
*** 837,843 ****
                p=s->s3->server_random;
                Time=time(NULL);                        /* Time */
                l2n(Time,p);
!               RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-sizeof(Time));
                /* Do the message type and length last */
                d=p= &(buf[4]);
  
--- 837,843 ----
                p=s->s3->server_random;
                Time=time(NULL);                        /* Time */
                l2n(Time,p);
!               RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4);
                /* Do the message type and length last */
                d=p= &(buf[4]);
  
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to