Date: Tue, 1 Mar 2011 20:20:58 +0100 From: Marius Strobl <marius@alchemy.franken.de> To: Alexandre Martins <alexandre.martins@netasq.com> Cc: freebsd-current@freebsd.org Subject: Re: Fwd: OpenSSL 1.0.0d for Freebsd HEAD Message-ID: <20110301192058.GA44608@alchemy.franken.de> In-Reply-To: <201103011031.20422.alexandre.martins@netasq.com> References: <20110228202307.GA33068@alchemy.franken.de> <DC57CECC-F5A0-4C0D-8C19-773A1463007D@netasq.com> <201103011031.20422.alexandre.martins@netasq.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Mar 01, 2011 at 10:31:16AM +0100, Alexandre Martins wrote: > Dear, > > Have you extracted the tarball fo openssl source (1.0.0d) in crypto/openssl ? > Ah, I missed that, the last couple of mails in this thread were only talking about the patch :) With the tarball untared it actually builds and works on sparc64 as far as ssh(d) and HTTPS via fetch are concerned. The problem reports (programs getting killed with SIGILL probably due to an infinite recursion or some such) were about apache and unbound using an OpenSSL 1.0.0 port. I'm not sure whether their use of OpenSSL would make a difference or the port is broken. Marius
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20110301192058.GA44608>