From owner-freebsd-current@freebsd.org Sun Nov 1 15:08:38 2015 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 72F31A23A55 for ; Sun, 1 Nov 2015 15:08:38 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from dec.sakura.ne.jp (dec.sakura.ne.jp [210.188.226.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 40DF0196E for ; Sun, 1 Nov 2015 15:08:37 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from fortune.joker.local (180-198-137-134.nagoya1.commufa.jp [180.198.137.134]) (authenticated bits=0) by dec.sakura.ne.jp (8.14.3/8.14.2/[SAKURA-WEB]/20080708) with ESMTP id tA1EKpi5029334 for ; Sun, 1 Nov 2015 23:20:51 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Sun, 1 Nov 2015 23:20:51 +0900 From: Tomoaki AOKI To: freebsd-current@freebsd.org Subject: Re: [HEADSUP] OpenSSL updated to 1.0.2d Message-Id: <20151101232051.5495e5eae1ee7ed9337349e3@dec.sakura.ne.jp> In-Reply-To: <5634CECA.6080405@vangyzen.net> References: <5633D9C9.2060906@FreeBSD.org> <20151031112545.46aa9dca.ohartman@zedat.fu-berlin.de> <5634CECA.6080405@vangyzen.net> Organization: Junchoon corps X-Mailer: Sylpheed 3.4.3 (GTK+ 2.24.28; amd64-portbld-freebsd10.2) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 01 Nov 2015 15:08:38 -0000 Thanks! Yours is very much faster than what I was trying. :-) Attached is a modified one to generate updating script. Currently it uses ports-mgmt/portupgrade(-devel), but modifying to use other options or any other tool (such as ports-mgmt/portmaster). Caution: No error checking for generated script. (Command line length, and so on are NOT checked.) On Sat, 31 Oct 2015 09:23:06 -0500 Eric van Gyzen wrote: > On 10/31/15 5:25 AM, O. Hartmann wrote: > > Am Fri, 30 Oct 2015 16:57:45 -0400 > > Jung-uk Kim schrieb: > > > >> -----BEGIN PGP SIGNED MESSAGE----- > >> Hash: SHA256 > >> > >> OpenSSL on head has been updated to 1.0.2d. Please make sure to > >> recompile all binaries depending on libcrypto.so.7 or libssl.so.7. > > > > That is good news. > > > > Could you provide, please, some hints how one could check all installed ports for the > > usage of those specific libraries? Or could you provide a hint towards an existing port > > already providing those tools? It would be great for those "from the set of ordinary > > people" using FreeBSD. > > > > I ask for that because I recall that there were a couple of ports which explicitely asks > > for a selection of what SSL lib should be used and in my case, I use the base system's > > one. > > I expect there's a port, but I'm not aware of one. > > This should work: > > find /usr/local/*bin /usr/local/lib* -type f | \ > while read F; do \ > objdump -x $F 2>&1 | grep -Eq 'NEEDED *lib(crypto|ssl).so.7' && \ > echo $F; \ > done > > This is in /bin/sh (or bash). You could change "echo" to "pkg which" > to show the package names. > > Cheers, > > Eric > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > -- Tomoaki AOKI junchoon@dec.sakura.ne.jp