This is a collection of reports about email delivery
process concerning a message you originated:

<smtp ipebio15.ise.pw.edu.pl [EMAIL PROTECTED] 1284>: ...\
        expired after 3 days, problem was:
        smtp; 500 (connect to ipebio15.ise.pw.edu.pl 
[194.29.161.106|25|194.29.160.2|43992]: Connection timed out)

Following is a copy of MESSAGE/DELIVERY-STATUS format section below.
It is copied here in case your email client is unable to show it to you.
The information here below is in  Internet Standard  format designed to
assist automatic, and accurate presentation and usage of said information.
In case you need human assistance from the Postmaster(s) of the system which
sent you this report, please include this information in your question!

        Virtually Yours,
                Automatic Email delivery Software

Reporting-MTA: dns; elektron.elka.pw.edu.pl
Arrival-Date: Thu, 19 Jul 2001 20:09:13 +0200

Original-Recipient: rfc822;[EMAIL PROTECTED]
Final-Recipient: RFC822;[EMAIL PROTECTED]
Action: failed
Status: 5.4.1 (TCP/IP-connection failure)
Diagnostic-Code: smtp; 500 (connect to ipebio15.ise.pw.edu.pl 
[194.29.161.106|25|194.29.160.2|43992]: Connection timed out)
Remote-MTA: dns; ipebio15.ise.pw.edu.pl (194.29.161.106|25|194.29.160.2|43992)
Last-Attempt-Date: Mon, 23 Jul 2001 06:54:38 +0200

Reporting-MTA: dns; elektron.elka.pw.edu.pl
Arrival-Date: Thu, 19 Jul 2001 20:09:13 +0200

Original-Recipient: rfc822;[EMAIL PROTECTED]
Final-Recipient: RFC822;[EMAIL PROTECTED]
Action: failed
Status: 5.4.1 (TCP/IP-connection failure)
Diagnostic-Code: smtp; 500 (connect to ipebio15.ise.pw.edu.pl [194.29.161.106|25|194.29.160.2|43992]: Connection timed out)
Remote-MTA: dns; ipebio15.ise.pw.edu.pl (194.29.161.106|25|194.29.160.2|43992)
Last-Attempt-Date: Mon, 23 Jul 2001 06:54:38 +0200


On Thu, Jul 19, 2001 at 01:38:17PM -0400, Sundaram, Mani wrote:
> I am in the process of porting OpenSSL to our platform that does not support
> Unix sockets and does not have a /dev/urandom entropy device.
> I am able to get the prngd daemon(to generate random numbers) to run on the
> localhost at a desired port, but don't know how to 
> interface this with the OpenSSL functions that look for an egd socket in
> /var/run/egd-pool or /dev/egd-pool. 
> 
> Does anyone have an idea?

Hmm. The difference should not be that large. In general,
crypto/rand/rand_egd.c uses

        struct sockaddr_un addr;
        ...
        memset(&addr, 0, sizeof(addr));
        addr.sun_family = AF_UNIX;
        if (strlen(path) > sizeof(addr.sun_path))
                return (-1);
        strcpy(addr.sun_path,path);
        len = offsetof(struct sockaddr_un, sun_path) + strlen(path);
        fd = socket(AF_UNIX, SOCK_STREAM, 0);

to setup things. The thing needed would be something like

  struct sockaddr_in sockin;
  memset(&sockin, 0, sizeof(sockin));
  sockin.sin_family = AF_INET;
  sockin.sin_port = htons(port);
  sockin.sin_addr.s_addr = inet_addr("127.0.0.1");
  len = sizeof(sockin);
  fd = socket(AF_INET, SOCK_STREAM, 0);
  ...

So actually the change/extension to OpenSSL would be really small...
With a syntax like "tcp/localhost:port" one could even keep the API
unchanged...

Thinking about it, waiting for input...
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
BTU Cottbus               http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik                  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus              Fax. +49 355 69-4153
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]


Reply via email to