Solved

Installing FOP2 error

Posted on 2011-09-19
3
1,489 Views
Last Modified: 2012-06-27
Hi,

trying to install FOP2 and get error, it seems its looking for old version of perl how can i change this?:

Starting Flash Operator Panel 2: Can't load '/tmp/par-root/cache-4f594b8bab22c6b43e32f63f333a61998282f027/7d2160ee.so' for module Filter::Crypto::Decrypt: libcrypto.so.6: cannot open shared object file: No such file or directory at /usr/lib64/perl5/5.8.8/x86_64-linux-thread-multi/DynaLoader.pm line 230.
 at /usr/lib/perl5/site_perl/5.8.8/PAR/Heavy.pm line 128
BEGIN failed--compilation aborted at /tmp/par-root/cache-4f594b8bab22c6b43e32f63f333a61998282f027/inc/lib/Filter/Crypto/Decrypt.pm line 37.
Compilation failed in require at script/fop2_server.pl line 1.
BEGIN failed--compilation aborted at script/fop2_server.pl line 1.
0
Comment
Question by:andybrooke
  • 2
3 Comments
 
LVL 9

Expert Comment

by:parparov
ID: 36563998
It looks like you have a RedHat/Centos 5.3 or higher.

Do you have openssl installed? it is the one providing libcrypto.so.6
0
 

Author Comment

by:andybrooke
ID: 36564010
i have centos 6 openssl dont think so. i presume there is a file i need to change?
0
 
LVL 9

Accepted Solution

by:
parparov earned 500 total points
ID: 36564025
Do a
rpm -qa |grep openssl

Open in new window

You may also try
locate libcrypto.so.6

Open in new window

to see if the missing file is anywhere on your system.
If locate fails (spits an error about no database), run (as root)
updatedb

Open in new window

(would take some time, depending on your system size)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

So you think no one can listen in on your VOIP conversations, eh? Well... if you haven't setup Secure Real Time Transport (SRTP), your voice communications can be hacked into by just about anyone! First, let's talk about the intended audience for…
Almost all Internet protocol telephones have built-in switches at the back that allow you to connect your personal computer to one port and use the other port to connect your phone to to a Cisco switch.   Why we need to connect the PC to the pho…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now