Looking at your call stack, it appears you're testing with FIPS mode
enabled. There's a lock in FIPS_selftest_failed() that's used to ensure
the crypto algorithms inside the FIPS boundary are not utilized until
after the POST has completed and passed. Unfortunately this lock remains
installed for
I was running a benchmark on a 28 core (56 hyper-threaded) server that is
running 84 threads in the process and I am seeing a lot of lock contention. I
saw a lot of lock contention in the calls to SSL_get_error() ssl3_accept(). I
am running RHEL 6.5 and openssl-1.0.1e-30.el6_6.7.x86_64. We ha
On 23/04/2015 01:27, Salz, Rich wrote:
I am currently using openssl 1.0.1e (compiling from source), and I was
wondering whether I needed to put in any patch files with it as well. Does
anybody know? Let's assume I can't just use a later version's tarball.
There are no patch files. Letter rele