Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Installing FOP2 error

Posted on 2011-09-19
3
Medium Priority
?
1,579 Views
Last Modified: 2012-06-27
Hi,

trying to install FOP2 and get error, it seems its looking for old version of perl how can i change this?:

Starting Flash Operator Panel 2: Can't load '/tmp/par-root/cache-4f594b8bab22c6b43e32f63f333a61998282f027/7d2160ee.so' for module Filter::Crypto::Decrypt: libcrypto.so.6: cannot open shared object file: No such file or directory at /usr/lib64/perl5/5.8.8/x86_64-linux-thread-multi/DynaLoader.pm line 230.
 at /usr/lib/perl5/site_perl/5.8.8/PAR/Heavy.pm line 128
BEGIN failed--compilation aborted at /tmp/par-root/cache-4f594b8bab22c6b43e32f63f333a61998282f027/inc/lib/Filter/Crypto/Decrypt.pm line 37.
Compilation failed in require at script/fop2_server.pl line 1.
BEGIN failed--compilation aborted at script/fop2_server.pl line 1.
0
Comment
Question by:andybrooke
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Expert Comment

by:parparov
ID: 36563998
It looks like you have a RedHat/Centos 5.3 or higher.

Do you have openssl installed? it is the one providing libcrypto.so.6
0
 

Author Comment

by:andybrooke
ID: 36564010
i have centos 6 openssl dont think so. i presume there is a file i need to change?
0
 
LVL 9

Accepted Solution

by:
parparov earned 2000 total points
ID: 36564025
Do a
rpm -qa |grep openssl

Open in new window

You may also try
locate libcrypto.so.6

Open in new window

to see if the missing file is anywhere on your system.
If locate fails (spits an error about no database), run (as root)
updatedb

Open in new window

(would take some time, depending on your system size)
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently purchased a Bluetooth headset called the Music Jogger (model BSH10). The control buttons on it look like this: One of my goals is to use it as the microphone and speakers for Skype calls. In that respect, it works well. However, I …
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question