[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #27818 [Core Tor/Tor]: 0.3.5.2-alpha undefined reference to `get_uint32' on ARM device.



#27818: 0.3.5.2-alpha undefined reference to `get_uint32' on ARM device.
-------------------------------------------------+-------------------------
 Reporter:  Prada                                |          Owner:  (none)
     Type:  defect                               |         Status:
                                                 |  needs_information
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.3.5.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  undefined, reference, error,         |  Actual Points:
  0.3.5.2-alpha, tor-arm                         |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by Prada):

 Regarding https://trac.torproject.org/projects/tor/ticket/27781, I tried
 to update openssl to version 1.1 or greater - problems with file
 verification resulted - so I couldn't get it and am going to get a new up
 to date OS.

 I did this.
 sudo apt-get remove --purge openssl
 add to file /etc/apt/sources.list the line
 deb httP://http.debian.net/debian wheezy-backports main
 sudo apt-get install -t wheezy-backports nginx
 This gives
 W: GPG error: http://http.debian.net wheezy-backports Release: The
 following signatures couldn't be verified because the public key is not
 available: NO_PUBKEY 8B48AD6246925553 NO_PUBKEY 7638D0442B90D010
 sudo apt-get update gives keyring errors and nginx install complains it
 can't verify the package.

 I was unable to fix this with
 aptitude install debian-keyring debian-archive-keyring
 also tried
 sudo gpg --keyserver pgpkeys.mit.edu --recv-key aB48AD6246925553
 This reports...
 sudo gpg --keyserver pgpkeys.mit.edu --recv-key 8B48AD6246925553
 gpg: directory `/root/.gnupg' created
 gpg: new configuration file `/root/.gnupg/gpg.conf' created
 gpg: WARNING: options in `/root/.gnupg/gpg.conf' are not yet active during
 this run
 gpg: keyring `/root/.gnupg/secring.gpg' created
 gpg: keyring `/root/.gnupg/pubring.gpg' created
 gpg: requesting key 46925553 from hkp server pgpkeys.mit.edu
 gpgkeys: key 8B48AD6246925553 not found on keyserver
 gpg: no valid OpenPGP data found.
 gpg: Total number processed: 0
 I tried a reboot and update still gives NO_PUBKEY and can't verify the
 package.
 sudo apt-get install -t wheezy-backports nginx
 WARNING: The following packages cannot be authenticated!
   nginx-common nginx-full nginx

 So as I can't yet install a good recent version of nginx or openssl I am
 getting a new up to date version of debian.

 Is it not possible to make an install of tor that includes source code for
 all cryptographic packages?
 I had similar problems with early versions of pgp, files not available and
 when they are located the downloads taking several tries to get through.
 Why these critical files that can't be verified?

 Will update the link suggested.
 https://trac.torproject.org/projects/tor/wiki/doc/arm

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27818#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs