I tried openssl 1.0.1h where it checks for fips_mode() and prevents deadlock. However without fips_mode still we are hitting deadlock. When can we expect ssleay_rand_bytes() which doesn't use a CRYPTO_LOCK_RAND lock?
-- View this message in context: http://openssl.6102.n7.nabble.com/Deadlock-in-multi-threaded-OpenSSL-FIPS-2-0-tp21509p52373.html Sent from the OpenSSL - User mailing list archive at Nabble.com. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org