From owner-freebsd-emulation@freebsd.org Sun Dec 30 12:39:28 2018 Return-Path: Delivered-To: freebsd-emulation@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 36964142610C for ; Sun, 30 Dec 2018 12:39:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id BC5C98426A for ; Sun, 30 Dec 2018 12:39:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 7FEB6142610B; Sun, 30 Dec 2018 12:39:27 +0000 (UTC) Delivered-To: emulation@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 45059142610A for ; Sun, 30 Dec 2018 12:39:27 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id DCFD184268 for ; Sun, 30 Dec 2018 12:39:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by freefall.freebsd.org (Postfix) id B26674678; Sun, 30 Dec 2018 12:39:26 +0000 (UTC) Delivered-To: vbox@localmail.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [96.47.72.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mx1.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by freefall.freebsd.org (Postfix) with ESMTPS id AE1604677 for ; Sun, 30 Dec 2018 12:39:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 619A484267 for ; Sun, 30 Dec 2018 12:39:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id A4D18B0E3 for ; Sun, 30 Dec 2018 12:39:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wBUCdPbm019615 for ; Sun, 30 Dec 2018 12:39:25 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wBUCdPwD019610 for vbox@FreeBSD.org; Sun, 30 Dec 2018 12:39:25 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: vbox@FreeBSD.org Subject: [Bug 232969] emulators/virtualbox-ose: link error while linking the RDP client Date: Sun, 30 Dec 2018 12:39:25 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: Trond.Endrestol@ximalas.info X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: vbox@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: DCFD184268 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-3.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-1.00)[-0.997,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-Mailman-Approved-At: Mon, 31 Dec 2018 11:28:08 +0000 X-BeenThere: freebsd-emulation@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development of Emulators of other operating systems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Dec 2018 12:39:28 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D232969 --- Comment #12 from Trond.Endrestol@ximalas.info --- (In reply to Matthias Apitz from comment #11) uname -a FreeBSD FQDN 12.0-STABLE FreeBSD 12.0-STABLE #0 r342575: Fri Dec 28 19:16:59 CET 2018 root@FQDN:/usr/obj/usr/src/amd64.amd64/sys/E5530 amd64 strings /usr/lib/libssl.a | grep OpenSSL OpenSSL 1.1.1a-freebsd 20 Nov 2018 nm /usr/lib/libssl.a | grep SSL_load_error_strings [nothing found] On inspection of /usr/include/openssl/ssl.h, I came across this, around line 1595: # if OPENSSL_API_COMPAT < 0x10100000L # define SSL_load_error_strings() \ OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS \ | OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL) # endif nm .../VirtualBox-5.2.22/out/freebsd.amd64/release/obj/rdesktop-vrdp/tcp.o U __error U __inet_addr U __stdoutp U close U connect U ERR_print_errors_fp U error U EVP_PKEY_free 0000000000000058 b g_in U g_network_error 0000000000000000 b g_out U g_reconnect_loop 00000000000000a0 b g_run_ui 0000000000000050 b g_sock 0000000000000048 b g_ssl 00000000000000a8 b g_ssl_ctx 00000000000000a4 b g_ssl_initialized 0000000000000000 D g_tcp_port_rdp U g_user_quit U gethostbyname U getpeername U getsockname U getsockopt U i2d_PublicKey U OPENSSL_init_ssl U recv U select U send U setsockopt U socket U sprintf U SSL_connect U SSL_CTX_free U SSL_CTX_new U SSL_CTX_set_options U SSL_free U SSL_get_error U SSL_get_peer_certificate U SSL_get_shutdown U SSL_new U SSL_pending U SSL_read U SSL_set_fd U SSL_shutdown U SSL_write U strerror 0000000000000710 T tcp_connect 00000000000008e0 T tcp_disconnect 0000000000000950 T tcp_get_address 00000000000000b0 b tcp_get_address.ipaddr 0000000000000000 T tcp_init 00000000000009c0 T tcp_is_connected 0000000000000260 T tcp_recv 0000000000000a00 T tcp_reset_state 0000000000000a80 T tcp_run_ui 0000000000000060 T tcp_send 00000000000004e0 T tcp_tls_connect 0000000000000620 T tcp_tls_get_server_pubkey U TLSv1_client_method U ui_select U X509_free U X509_get_pubkey U xfree U xmalloc U xrealloc I have a hypothesis that my global ccache might be fooling me, although I m= ade sure to really empty my ccache after upgrading base from 11.2 to 12.0 back = in late October. I'll rename my existing ccache, create a new one, and see how that goes. I haven't removed security/openssl from my LiveSystem since net/rdesktop needs it, but that should not affect synth and its chroots. rdesktop and OpenSSL from ports might go away once I'm familiar with net/remmina. Some months ago I was struck by a mishap where Subversion left some subtrees untouched because I had edited some files here and there. Since then I alwa= ys run svn up --accept=3Dtheirs-full --non-interactive /usr/ports to get rid o= f my own conflicting changes and ensuring the entire ports tree is always correc= t. The only change I have in effect are some changes to Mk/bsd.gecko.mk to all= ow for the use of ccache and a couple of extra patchfiles for ports-mgmt/synth, and all those changes should be benign. --=20 You are receiving this mail because: You are the assignee for the bug.=