[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
tor-0.1.2.18 build issues with zlib
- To: or-talk@xxxxxxxx
- Subject: tor-0.1.2.18 build issues with zlib
- From: tabi meta <tabimeta@xxxxxxxxx>
- Date: Sat, 3 Nov 2007 01:44:43 -0700 (PDT)
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sat, 03 Nov 2007 04:44:54 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; b=YG7hlxzJNCM/0IF9eCNAVyA7UZaOGYnPxnFjR8Qxr9wK2gBvZlHxZ/0frm0dG39g8ZBt2tZGflzsG5TmPTmRYn3Gw0dr0ZViJ2ST9ZNREG798IrW3sGWATkEI7cxhDnLnHP3wGQzUozXqJpqj0eWuN5xueb6mAp/NTrg9/gMJiA=;
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
hi torizens...
1 - how can i tell tor to compile and use the zlib in /usr/local ?
there are two zlib versions on the system. the older supports
legacy apps. there doesn't seem to be a --with-zlib-dir option
to do this.
2 - i get a gzip test error as below.
i've checked the bugtracker for both, no entries.
ideas? thx.
# installed in /usr
openssl-0.9.7d
zlib-1.1.4
# installed in /usr/local
libevent-1.3e
openssl-0.9.8g
zlib-1.2.3
# host
pentiumII, freebsd 4.11-STABLE [really RELENG_4 as of a week ago]
# build info
ports/packages are not used, all from original sources.
configure options: --prefix, --mandir
configure, make, make install output is completely clean as usual, no
problems.
tor itself runs fine, no problems. just ignore the torrc and socket
stuff below.
# build output - zlib related
cf.std: checking zlib.h usability... yes
cf.std: checking zlib.h presence... yes
cf.std: checking for zlib.h... yes
mk.std: gcc -g -O2 -Wall -g -O2 -L/usr/local/lib -o tor <objs>
../common/libor.a ../common/libor-crypto.a -lz -lssl -lcrypto -levent
-lssl -lcrypto
mk.std: gcc -g -O2 -Wall -g -O2 -L/usr/local/lib -o test <objs>
../common/libor.a ../common/libor-crypto.a -lz -lssl -lcrypto -levent
-lssl -lcrypto
# ldd
tor01218/tor-0.1.2.18/src/or/tor:
libz.so => /usr/lib/libz.so (0x28105000)
libssl.so.0.9.8 => /usr/local/lib/libssl.so.0.9.8 (0x28112000)
libcrypto.so.0.9.8 => /usr/local/lib/libcrypto.so.0.9.8
(0x2814d000)
libevent-1.3e.so.1 => /usr/local/lib/libevent-1.3e.so.1
(0x2827a000)
libc.so.4 => /usr/lib/libc.so.4 (0x2828e000)
tor01218/tor-0.1.2.18/src/or/test:
libz.so => /usr/lib/libz.so (0x28119000)
libssl.so.0.9.8 => /usr/local/lib/libssl.so.0.9.8 (0x28126000)
libcrypto.so.0.9.8 => /usr/local/lib/libcrypto.so.0.9.8
(0x28161000)
libevent-1.3e.so.1 => /usr/local/lib/libevent-1.3e.so.1
(0x2828e000)
libc.so.4 => /usr/lib/libc.so.4 (0x282a2000)
# exec - works fine, this is just a test
./tor01218/tor-0.1.2.18/src/or/tor
[notice] Tor v0.1.2.18. This is experimental software. Do not rely on
it for strong anonymity.
[notice] Configuration file "/usr/local/tor01218/etc/tor/torrc" not
present, using reasonable defaults.
[notice] Initialized libevent version 1.3e using method kqueue. Good.
[notice] Opening Socks listener on 127.0.0.1:9050
[warn] Could not bind to 127.0.0.1:9050: Address already in use. Is Tor
already running?
[warn] Failed to parse/validate config: Failed to bind one of the
listener ports.
[err] Reading config failed--see warnings above.
# exec - excess .'s trimmed
./tor01218/tor-0.1.2.18/src/or/test
Running Tor unit tests on FreeBSD i386
========================== Buffers =========================
...
========================== Crypto ==========================
...
========================= Util ============================
.
File test.c: line 1136 (test_gzip): assertion failed:
(!tor_gzip_compress(&buf2, &len1, buf1, strlen(buf1)+1, GZIP_METHOD))
...
========================= Onion Skins =====================
...
========================= Directory Formats ===============
...
========================= Policies ===================
...
========================= Rendezvous functionality ========
...
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com