The rt.openssl.org can be accessed by guests with a username "guest" and password "guest". Andy provided a patch against the 1.0.1 release of openssl with these instructions (patch attached):
See if attached patch fixes the problem. In order to do that download 1.0.1 source from openssl.org and unpack. Then in source directory
The rt.openssl.org can be accessed by guests with a username "guest" and password "guest". Andy provided a patch against the 1.0.1 release of openssl with these instructions (patch attached):
See if attached patch fixes the problem. In order to do that download 1.0.1 source from openssl.org and unpack. Then in source directory
patch -p0 < /some/where/ vpaes-x86. diff; PATH=`pwd` ssh failinghost;
./config shared;
make;
env LD_LIBRARY_
Later on he mentions that the official solution (covering both x86 and x64) is at http:// cvs.openssl. org/chngview? cn=22317.