Re: OpenSSL 3.0.0 beta1 link issues on Solaris 10

2021-07-25 Thread Dennis Clarke via openssl-users
On 7/25/21 20:16, Dr Paul Dale wrote:
> None of the core developers have access to Solaris machines, thus we
> rely on the community for reports and fixes for this kind of thing.

Well access can be easily arranged.

> We're happy to assist and can sometimes identify and fix the problem but
> we still require help testing.

Not a problem. I do understand. This is not exactly a common platform
anymore but the things just keep on running. And running.

> This would best be raised as an issue on GitHub
> [https://github.com/openssl/openssl/issues/new?assignees==issue%3A+bug+report=bug_report.md].
> This way it is tracked and resource time can be allocated to it --
> although in this case I suspect it will be the community that cracks it
> for us.
>

It will come back to me most likely. Fine.

> Since you seem to have figured out a work around, including details of
> what you needed to do would be very useful.  Putting them up as a pull
> request would be even better.

I am working my way through the process now and also making changes as I
go. Nothing too involved. For the most part this feels very much like
the situation with 1.1.1k and all the previous flavours. Just a few
tweaks needed. ALL of the perl scripts are mildly annoying but that is
also easy to fix with some sed/grep/awk foo.

I have the testsuite running now.

-- 
Dennis Clarke
RISC-V/SPARC/PPC/ARM/CISC
UNIX and Linux spoken
GreyBeard and suspenders optional


Re: OpenSSL 3.0.0 beta1 link issues on Solaris 10

2021-07-25 Thread Dr Paul Dale
None of the core developers have access to Solaris machines, thus we 
rely on the community for reports and fixes for this kind of thing. 
We're happy to assist and can sometimes identify and fix the problem but 
we still require help testing.


This would best be raised as an issue on GitHub 
[https://github.com/openssl/openssl/issues/new?assignees==issue%3A+bug+report=bug_report.md]. 
This way it is tracked and resource time can be allocated to it -- 
although in this case I suspect it will be the community that cracks it 
for us.


Since you seem to have figured out a work around, including details of 
what you needed to do would be very useful.  Putting them up as a pull 
request would be even better.



Paul Dale


On 26/7/21 7:14 am, Dennis Clarke via openssl-users wrote:

I am not sure what testing is happening with old Solaris 10 but I can
tell you there are still servers out there running. I had no issues with
the configuration stage but, as usual, I do need to make a few tweaks to
Configurations/10-main.conf. Merely to get a consistent set of CFLAGS
that I use for libraries that I may want to single step through. In any
case the link stage fails with a truely massive list of undefined
symbols and it seems as if the previous 1.1.1k libs are being found by
the build process. So I wrote a manual link script and specified the
build directory for the RUNPATH and the library search path however that
resulted in a pile of undefined symbols.

So then I went and deleted my previous 1.1.1k libs and the openssl
binary and tried the manual link once again with success.

Not sure if anyone else runs into this but I would hope that the
previous libs would not be located *before* the new current 3.0.0 libs
that are in the build directory.  Regardless I may need to simply start
over as the new libssl.so.3 seems to have a "NEEDED" libcrypto.so.1.1
and that can't be right.

Here is the result of perl configdata.pm --dump :

alpha$ /opt/bw/bin/perl configdata.pm --dump

Command line (with current working directory = .):

 /opt/bw/bin/perl ./Configure solaris64-sparcv9-cc no-asm
--prefix=/opt/bw shared no-hw no-engine -DPEDANTIC

Perl information:

 /opt/bw/bin/perl
 5.32.0 for sun4-solaris-64-ld

Enabled features:

 aria
 async
 autoalginit
 autoerrinit
 autoload-config
 bf
 blake2
 bulk
 cached-fetch
 camellia
 cast
 chacha
 cmac
 cmp
 cms
 comp
 ct
 deprecated
 des
 dgram
 dh
 dsa
 dso
 dtls
 ec
 ec2m
 ecdh
 ecdsa
 err
 filenames
 gost
 idea
 legacy
 md4
 mdc2
 module
 multiblock
 nextprotoneg
 ocb
 ocsp
 pic
 pinshared
 poly1305
 posix-io
 psk
 rc2
 rc4
 rdrand
 rfc3779
 rmd160
 scrypt
 secure-memory
 seed
 shared
 siphash
 siv
 sm2
 sm3
 sm4
 sock
 srp
 srtp
 sse2
 ssl
 ssl-trace
 static-engine
 stdio
 tests
 threads
 tls
 ts
 ui-console
 whirlpool
 tls1
 tls1-method
 tls1_1
 tls1_1-method
 tls1_2
 tls1_2-method
 tls1_3
 dtls1
 dtls1-method
 dtls1_2
 dtls1_2-method

Disabled features:

 acvp-tests  [default]OPENSSL_NO_ACVP_TESTS
 afalgeng[cascade]OPENSSL_NO_AFALGENG
 asan[default]OPENSSL_NO_ASAN
 asm [option] OPENSSL_NO_ASM
 buildtest-c++   [default]
 capieng [cascade]OPENSSL_NO_CAPIENG
 crypto-mdebug   [default]OPENSSL_NO_CRYPTO_MDEBUG
 devcryptoeng[default]OPENSSL_NO_DEVCRYPTOENG
 dynamic-engine  [cascade]
 ec_nistp_64_gcc_128 [default]OPENSSL_NO_EC_NISTP_64_GCC_128
 egd [default]OPENSSL_NO_EGD
 engine  [option] OPENSSL_NO_ENGINE (skip
engines, crypto/engine)
 external-tests  [default]OPENSSL_NO_EXTERNAL_TESTS
 fips[default]
 fips-securitychecks [cascade]OPENSSL_NO_FIPS_SECURITYCHECKS
 fuzz-afl[default]OPENSSL_NO_FUZZ_AFL
 fuzz-libfuzzer  [default]OPENSSL_NO_FUZZ_LIBFUZZER
 ktls[default]OPENSSL_NO_KTLS
 loadereng   [cascade]OPENSSL_NO_LOADERENG
 makedepend  [unavailable]
 md2 [default]OPENSSL_NO_MD2 (skip crypto/md2)
 msan[default]OPENSSL_NO_MSAN
 padlockeng  [cascade]OPENSSL_NO_PADLOCKENG
 rc5 [default]OPENSSL_NO_RC5 (skip crypto/rc5)
 sctp[default]OPENSSL_NO_SCTP
 trace   [default]OPENSSL_NO_TRACE
 ubsan   [default]OPENSSL_NO_UBSAN
 unit-test   [default]OPENSSL_NO_UNIT_TEST
 uplink