https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=232969

--- Comment #12 from trond.endres...@ximalas.info ---
(In reply to Matthias Apitz from comment #11)
uname -a
FreeBSD FQDN 12.0-STABLE FreeBSD 12.0-STABLE #0 r342575: Fri Dec 28 19:16:59
CET 2018     root@FQDN:/usr/obj/usr/src/amd64.amd64/sys/E5530  amd64

strings /usr/lib/libssl.a | grep OpenSSL
OpenSSL 1.1.1a-freebsd  20 Nov 2018

nm /usr/lib/libssl.a | grep SSL_load_error_strings
[nothing found]

On inspection of /usr/include/openssl/ssl.h, I came across this, around line
1595:

# if OPENSSL_API_COMPAT < 0x10100000L
#  define SSL_load_error_strings() \
    OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS \
                     | OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL)
# endif

nm .../VirtualBox-5.2.22/out/freebsd.amd64/release/obj/rdesktop-vrdp/tcp.o

                 U __error
                 U __inet_addr
                 U __stdoutp
                 U close
                 U connect
                 U ERR_print_errors_fp
                 U error
                 U EVP_PKEY_free
0000000000000058 b g_in
                 U g_network_error
0000000000000000 b g_out
                 U g_reconnect_loop
00000000000000a0 b g_run_ui
0000000000000050 b g_sock
0000000000000048 b g_ssl
00000000000000a8 b g_ssl_ctx
00000000000000a4 b g_ssl_initialized
0000000000000000 D g_tcp_port_rdp
                 U g_user_quit
                 U gethostbyname
                 U getpeername
                 U getsockname
                 U getsockopt
                 U i2d_PublicKey
                 U OPENSSL_init_ssl
                 U recv
                 U select
                 U send
                 U setsockopt
                 U socket
                 U sprintf
                 U SSL_connect
                 U SSL_CTX_free
                 U SSL_CTX_new
                 U SSL_CTX_set_options
                 U SSL_free
                 U SSL_get_error
                 U SSL_get_peer_certificate
                 U SSL_get_shutdown
                 U SSL_new
                 U SSL_pending
                 U SSL_read
                 U SSL_set_fd
                 U SSL_shutdown
                 U SSL_write
                 U strerror
0000000000000710 T tcp_connect
00000000000008e0 T tcp_disconnect
0000000000000950 T tcp_get_address
00000000000000b0 b tcp_get_address.ipaddr
0000000000000000 T tcp_init
00000000000009c0 T tcp_is_connected
0000000000000260 T tcp_recv
0000000000000a00 T tcp_reset_state
0000000000000a80 T tcp_run_ui
0000000000000060 T tcp_send
00000000000004e0 T tcp_tls_connect
0000000000000620 T tcp_tls_get_server_pubkey
                 U TLSv1_client_method
                 U ui_select
                 U X509_free
                 U X509_get_pubkey
                 U xfree
                 U xmalloc
                 U xrealloc

I have a hypothesis that my global ccache might be fooling me, although I made
sure to really empty my ccache after upgrading base from 11.2 to 12.0 back in
late October. I'll rename my existing ccache, create a new one, and see how
that goes. I haven't removed security/openssl from my LiveSystem since
net/rdesktop needs it, but that should not affect synth and its chroots.
rdesktop and OpenSSL from ports might go away once I'm familiar with
net/remmina.

Some months ago I was struck by a mishap where Subversion left some subtrees
untouched because I had edited some files here and there. Since then I always
run svn up --accept=theirs-full --non-interactive /usr/ports to get rid of my
own conflicting changes and ensuring the entire ports tree is always correct.
The only change I have in effect are some changes to Mk/bsd.gecko.mk to allow
for the use of ccache and a couple of extra patchfiles for ports-mgmt/synth,
and all those changes should be benign.

-- 
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
freebsd-emulation@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-emulation
To unsubscribe, send any mail to "freebsd-emulation-unsubscr...@freebsd.org"

Reply via email to