I tried openssl 1.0.1h where it checks for fips_mode() and prevents deadlock.
However without fips_mode still we are hitting deadlock. When can we expect
ssleay_rand_bytes() which doesn't use a CRYPTO_LOCK_RAND lock?



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Deadlock-in-multi-threaded-OpenSSL-FIPS-2-0-tp21509p52373.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to