Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 1 Mar 2011 20:20:58 +0100
From:      Marius Strobl <marius@alchemy.franken.de>
To:        Alexandre Martins <alexandre.martins@netasq.com>
Cc:        freebsd-current@freebsd.org
Subject:   Re: Fwd: OpenSSL 1.0.0d for Freebsd HEAD
Message-ID:  <20110301192058.GA44608@alchemy.franken.de>
In-Reply-To: <201103011031.20422.alexandre.martins@netasq.com>
References:  <20110228202307.GA33068@alchemy.franken.de> <DC57CECC-F5A0-4C0D-8C19-773A1463007D@netasq.com> <201103011031.20422.alexandre.martins@netasq.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Mar 01, 2011 at 10:31:16AM +0100, Alexandre Martins wrote:
> Dear,
> 
> Have you extracted the tarball fo openssl source (1.0.0d) in crypto/openssl ?
> 

Ah, I missed that, the last couple of mails in this thread were only
talking about the patch :)
With the tarball untared it actually builds and works on sparc64 as
far as ssh(d) and HTTPS via fetch are concerned. The problem reports
(programs getting killed with SIGILL probably due to an infinite
recursion or some such) were about apache and unbound using an
OpenSSL 1.0.0 port. I'm not sure whether their use of OpenSSL would
make a difference or the port is broken.

Marius




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20110301192058.GA44608>