Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

make pkg support FreeBSD base with privatessl #1328

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

allanjude
Copy link
Member

This allows pkg to find hidden "private" libssl and libcrypto on FreeBSD, as openssl is transitioned to being private.

checking for library containing SHA256_Init... no
checking for library containing SHA256_Init... (cached) no
configure: error: unable to find the libcrypto

The second time autoconf will use the cached negative result, and not locate the library by the alternative name
@swills
Copy link
Member

swills commented Nov 2, 2017

ok to test

@freebsd freebsd deleted a comment from moufjenkins Nov 22, 2017
@freebsd freebsd deleted a comment from moufjenkins Nov 22, 2017
@freebsd freebsd deleted a comment from moufjenkins Nov 22, 2017
@freebsd freebsd deleted a comment from moufjenkins Nov 22, 2017
@freebsd freebsd deleted a comment from moufjenkins Nov 22, 2017
@swills
Copy link
Member

swills commented Nov 22, 2017

If you re-base this to pull in the changes that I did to fix the travis-ci tests, I think it might pass the tests.

@moufjenkins
Copy link

Can one of the admins verify this patch?

@bapt
Copy link
Member

bapt commented Feb 21, 2020

are we still planning for a privatessl?

@fluffykhv
Copy link
Member

fluffykhv commented Feb 29, 2020

are we still planning for a privatessl?

It is a best way to resolve dll hell with ports ssl -- even if use staged open/libre ssl for static build, ld is always checks for functions presence in base libss/libcrypto :(

If anyone interested, privatessl patch revisited:
https://people.freebsd.org/~fluffy/-patches/freebsd_head_privatessl_2020-02-29-01.patch

@bapt
Copy link
Member

bapt commented Mar 1, 2020

@fluffykhv right but have you tested your approach with an exp-run? how do you deal with kerberos? are ports linked to base kerberos still working if it is linked to a base openssl?

@fluffykhv
Copy link
Member

@bapt working on kerberos now. base heimdail is a pain in ass :( looks like base kerberos libs need to be hided too, and all ports switch over to ports crypto/ssl/krb :(
as first step, now will start a local exp-run with current state base to find bad linking via kerberos

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants