Hi, 

When the openssl command is run, it fail with error which states, that
it was unable to get sufficient entropy.
On Solaris 10, the open(2) call is made with an O_NOFOLLOW option.
(which isn't exist in the previous version of Solaris). 
On Solaris 9 and 10, /dev/random and /dev/urandom are symbolic links:

/dev/urandom -> ../devices/pseudo/[EMAIL PROTECTED]:urandom

So, on Solaris 10, open(2) fails, because of O_NOFOLLOW option (don't
follow links...). 

Workaround: remove O_NOFOLLOW from rand_unix.c and rebuild all rpms
depending on OpenSSL. see attached patch.

-- r.

--- crypto/rand/rand_unix.c.orig        2003-12-27 17:01:52.000000000 +0100
+++ crypto/rand/rand_unix.c     2005-03-13 14:03:22.939215000 +0100
@@ -172,9 +172,6 @@
                   our controlling tty */
                        |O_NOCTTY
 #endif
-#ifdef O_NOFOLLOW /* Fail if the file is a symbolic link */
-                       |O_NOFOLLOW
-#endif
                        )) >= 0)
                        {
                        struct timeval t = { 0, 10*1000 }; /* Spend 10ms on

Reply via email to