| Summary: | --with-random=[FILE] no longer available | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | erik welch <erik.welch> |
| Component: | Build system | Assignee: | OpenSSH Bugzilla mailing list <openssh-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | normal | ||
| Priority: | P2 | ||
| Version: | -current | ||
| Hardware: | SPARC | ||
| OS: | Solaris | ||
|
Description
erik welch
2002-03-08 10:07:05 AEDT
The best fix is to rebuild OpenSSL with support for /dev/random built-in. That way all libcrypto-using apps will automatically pick up support for it. As a workaround you can do this: cat << EOF >> ssh-rand-helper.devrandom #!/bin/sh dd if=/dev/random bs=48 count=1 2>/dev/null EOF ./configure [options] --with-rand-helper make cp ssh-rand-helper.devrandom ssh-rand-helper make install INSTALL document had been updated. Correct way of handling /dev/random under Solaris is to recompile OpenSSL to support it. Or use the example Damien gave. Mass change of RESOLVED bugs to CLOSED |