you have to look at the exit code.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
A
We are testing our application (that uses OpenSSL for FTPS) to check the
memory leak over time(continuous FTPS upload is performed for about 12
hours).
We observed that the memory consumed by the process is reduced(about 3MB)
after 6 mins.
Kindly let us know if it is related to the SSL session time
I tried openssl 1.0.1h where it checks for fips_mode() and prevents deadlock.
However without fips_mode still we are hitting deadlock. When can we expect
ssleay_rand_bytes() which doesn't use a CRYPTO_LOCK_RAND lock?
--
View this message in context:
http://openssl.6102.n7.nabble.com/Deadlock-in
On Tue, Jul 29, 2014, Konstantin Shemyak wrote:
> Hello everyone,
>
> I cannot read data from stdin - like this:
>
> BIO *in = BIO_new_fp(stdin, BIO_NOCLOSE);
> BIO *out = BIO_new_fp(stdout, BIO_NOCLOSE);
>
> PKCS7 *signed_data = PKCS7_sign(NULL, NULL, NULL, in,
> PKCS7_NOATTR | PKCS7
Hello everyone,
I cannot read data from stdin - like this:
BIO *in = BIO_new_fp(stdin, BIO_NOCLOSE);
BIO *out = BIO_new_fp(stdout, BIO_NOCLOSE);
PKCS7 *signed_data = PKCS7_sign(NULL, NULL, NULL, in,
PKCS7_NOATTR | PKCS7_DETACHED | PKCS7_PARTIAL);
PKCS7_sign_add_signer(signed_data, s