From owner-freebsd-current@FreeBSD.ORG Tue Mar 1 19:21:01 2011 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 02EF41065680 for ; Tue, 1 Mar 2011 19:21:01 +0000 (UTC) (envelope-from marius@alchemy.franken.de) Received: from alchemy.franken.de (alchemy.franken.de [194.94.249.214]) by mx1.freebsd.org (Postfix) with ESMTP id 8AC5C8FC08 for ; Tue, 1 Mar 2011 19:21:00 +0000 (UTC) Received: from alchemy.franken.de (localhost [127.0.0.1]) by alchemy.franken.de (8.14.4/8.14.4/ALCHEMY.FRANKEN.DE) with ESMTP id p21JKwTU047320; Tue, 1 Mar 2011 20:20:59 +0100 (CET) (envelope-from marius@alchemy.franken.de) Received: (from marius@localhost) by alchemy.franken.de (8.14.4/8.14.4/Submit) id p21JKwm5047319; Tue, 1 Mar 2011 20:20:58 +0100 (CET) (envelope-from marius) Date: Tue, 1 Mar 2011 20:20:58 +0100 From: Marius Strobl To: Alexandre Martins Message-ID: <20110301192058.GA44608@alchemy.franken.de> References: <20110228202307.GA33068@alchemy.franken.de> <201103011031.20422.alexandre.martins@netasq.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <201103011031.20422.alexandre.martins@netasq.com> User-Agent: Mutt/1.4.2.3i Cc: freebsd-current@freebsd.org Subject: Re: Fwd: OpenSSL 1.0.0d for Freebsd HEAD X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Mar 2011 19:21:01 -0000 On Tue, Mar 01, 2011 at 10:31:16AM +0100, Alexandre Martins wrote: > Dear, > > Have you extracted the tarball fo openssl source (1.0.0d) in crypto/openssl ? > Ah, I missed that, the last couple of mails in this thread were only talking about the patch :) With the tarball untared it actually builds and works on sparc64 as far as ssh(d) and HTTPS via fetch are concerned. The problem reports (programs getting killed with SIGILL probably due to an infinite recursion or some such) were about apache and unbound using an OpenSSL 1.0.0 port. I'm not sure whether their use of OpenSSL would make a difference or the port is broken. Marius