| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | #!/bin/sh
 | 
					
						
							| 
									
										
										
										
											2018-11-13 07:16:55 +08:00
										 |  |  | {- | 
					
						
							|  |  |  |     use lib '.'; | 
					
						
							|  |  |  |     use configdata; | 
					
						
							| 
									
										
										
										
											2018-10-23 21:42:46 +08:00
										 |  |  |     use lib catdir($config{sourcedir}, 'Configurations'); | 
					
						
							|  |  |  |     use platform; | 
					
						
							| 
									
										
										
										
											2018-11-13 07:16:55 +08:00
										 |  |  | -} | 
					
						
							| 
									
										
										
										
											2018-03-15 00:25:37 +08:00
										 |  |  | # To test this OpenSSL version's applications against another version's | 
					
						
							|  |  |  | # shared libraries, simply set | 
					
						
							|  |  |  | # | 
					
						
							|  |  |  | #     OPENSSL_REGRESSION=/path/to/other/OpenSSL/build/tree | 
					
						
							|  |  |  | if [ -n "$OPENSSL_REGRESSION" ]; then | 
					
						
							|  |  |  |     shlibwrap="$OPENSSL_REGRESSION/util/shlib_wrap.sh" | 
					
						
							|  |  |  |     if [ -x "$shlibwrap" ]; then | 
					
						
							|  |  |  |         # We clear OPENSSL_REGRESSION to avoid a loop, should the shlib_wrap.sh | 
					
						
							|  |  |  |         # we exec also support that mechanism... | 
					
						
							|  |  |  |         OPENSSL_REGRESSION= exec "$shlibwrap" "$@" | 
					
						
							|  |  |  |     else | 
					
						
							|  |  |  |         if [ -f "$shlibwrap" ]; then | 
					
						
							|  |  |  |             echo "Not permitted to run $shlibwrap" >&2 | 
					
						
							|  |  |  |         else | 
					
						
							|  |  |  |             echo "No $shlibwrap, perhaps OPENSSL_REGRESSION isn't properly set?" >&2 | 
					
						
							|  |  |  |         fi | 
					
						
							|  |  |  |         exit 1 | 
					
						
							|  |  |  |     fi | 
					
						
							|  |  |  | fi | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | [ $# -ne 0 ] || set -x		# debug mode without arguments:-) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | THERE="`echo $0 | sed -e 's|[^/]*$||' 2>/dev/null`.." | 
					
						
							|  |  |  | [ -d "${THERE}" ] || exec "$@"	# should never happen... | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-10-23 21:42:46 +08:00
										 |  |  | LIBCRYPTOSO="${THERE}/{- platform->sharedlib('libcrypto') -}" | 
					
						
							|  |  |  | LIBSSLSO="${THERE}/{- platform->sharedlib('libssl') -}" | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2005-02-06 21:15:21 +08:00
										 |  |  | SYSNAME=`(uname -s) 2>/dev/null`; | 
					
						
							|  |  |  | case "$SYSNAME" in | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | SunOS|IRIX*) | 
					
						
							|  |  |  | 	# SunOS and IRIX run-time linkers evaluate alternative | 
					
						
							|  |  |  | 	# variables depending on target ABI... | 
					
						
							|  |  |  | 	rld_var=LD_LIBRARY_PATH | 
					
						
							|  |  |  | 	case "`(/usr/bin/file "$LIBCRYPTOSO") 2>/dev/null`" in | 
					
						
							| 
									
										
										
										
											2007-07-16 22:00:08 +08:00
										 |  |  | 	*ELF\ 64*SPARC*|*ELF\ 64*AMD64*) | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 		[ -n "$LD_LIBRARY_PATH_64" ] && rld_var=LD_LIBRARY_PATH_64 | 
					
						
							| 
									
										
										
										
											2007-07-16 22:00:08 +08:00
										 |  |  | 		LD_PRELOAD_64="$LIBCRYPTOSO $LIBSSLSO"; export LD_PRELOAD_64 | 
					
						
							|  |  |  | 		preload_var=LD_PRELOAD_64 | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 		;; | 
					
						
							| 
									
										
										
										
											2016-03-07 05:36:57 +08:00
										 |  |  | 	*ELF\ 32*SPARC*|*ELF\ 32*80386*) | 
					
						
							| 
									
										
										
										
											2016-03-09 18:36:32 +08:00
										 |  |  | 		# We only need to change LD_PRELOAD_32 and LD_LIBRARY_PATH_32 | 
					
						
							|  |  |  | 		# on a multi-arch system.  Otherwise, trust the fallbacks. | 
					
						
							|  |  |  | 		if [ -f /lib/64/ld.so.1 ]; then | 
					
						
							|  |  |  | 		    [ -n "$LD_LIBRARY_PATH_32" ] && rld_var=LD_LIBRARY_PATH_32 | 
					
						
							|  |  |  | 		    LD_PRELOAD_32="$LIBCRYPTOSO $LIBSSLSO"; export LD_PRELOAD_32 | 
					
						
							|  |  |  | 		    preload_var=LD_PRELOAD_32 | 
					
						
							|  |  |  | 		fi | 
					
						
							| 
									
										
										
										
											2016-03-07 05:36:57 +08:00
										 |  |  | 		;; | 
					
						
							| 
									
										
										
										
											2007-08-27 16:51:59 +08:00
										 |  |  | 	# Why are newly built .so's preloaded anyway? Because run-time | 
					
						
							|  |  |  | 	# .so lookup path embedded into application takes precedence | 
					
						
							|  |  |  | 	# over LD_LIBRARY_PATH and as result application ends up linking | 
					
						
							|  |  |  | 	# to previously installed .so's. On IRIX instead of preloading | 
					
						
							|  |  |  | 	# newly built .so's we trick run-time linker to fail to find | 
					
						
							|  |  |  | 	# the installed .so by setting _RLD_ROOT variable. | 
					
						
							| 
									
										
										
										
											2007-08-27 16:42:01 +08:00
										 |  |  | 	*ELF\ 32*MIPS*) | 
					
						
							|  |  |  | 		#_RLD_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"; export _RLD_LIST | 
					
						
							|  |  |  | 		_RLD_ROOT=/no/such/dir; export _RLD_ROOT | 
					
						
							|  |  |  | 		eval $rld_var=\"/usr/lib'${'$rld_var':+:$'$rld_var'}'\" | 
					
						
							|  |  |  | 		preload_var=_RLD_LIST | 
					
						
							|  |  |  | 		;; | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 	*ELF\ N32*MIPS*) | 
					
						
							|  |  |  | 		[ -n "$LD_LIBRARYN32_PATH" ] && rld_var=LD_LIBRARYN32_PATH | 
					
						
							| 
									
										
										
										
											2007-08-27 16:42:01 +08:00
										 |  |  | 		#_RLDN32_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"; export _RLDN32_LIST | 
					
						
							|  |  |  | 		_RLDN32_ROOT=/no/such/dir; export _RLDN32_ROOT | 
					
						
							|  |  |  | 		eval $rld_var=\"/usr/lib32'${'$rld_var':+:$'$rld_var'}'\" | 
					
						
							| 
									
										
										
										
											2007-07-16 22:00:08 +08:00
										 |  |  | 		preload_var=_RLDN32_LIST | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 		;; | 
					
						
							|  |  |  | 	*ELF\ 64*MIPS*) | 
					
						
							|  |  |  | 		[ -n "$LD_LIBRARY64_PATH"  ] && rld_var=LD_LIBRARY64_PATH | 
					
						
							| 
									
										
										
										
											2007-08-27 16:42:01 +08:00
										 |  |  | 		#_RLD64_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"; export _RLD64_LIST | 
					
						
							|  |  |  | 		_RLD64_ROOT=/no/such/dir; export _RLD64_ROOT | 
					
						
							|  |  |  | 		eval $rld_var=\"/usr/lib64'${'$rld_var':+:$'$rld_var'}'\" | 
					
						
							| 
									
										
										
										
											2007-07-16 22:00:08 +08:00
										 |  |  | 		preload_var=_RLD64_LIST | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 		;; | 
					
						
							|  |  |  | 	esac | 
					
						
							| 
									
										
										
										
											2007-08-27 16:42:01 +08:00
										 |  |  | 	eval $rld_var=\"${THERE}'${'$rld_var':+:$'$rld_var'}'\"; export $rld_var | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 	unset rld_var | 
					
						
							|  |  |  | 	;; | 
					
						
							|  |  |  | *)	LD_LIBRARY_PATH="${THERE}:$LD_LIBRARY_PATH"	# Linux, ELF HP-UX | 
					
						
							|  |  |  | 	DYLD_LIBRARY_PATH="${THERE}:$DYLD_LIBRARY_PATH"	# MacOS X | 
					
						
							|  |  |  | 	SHLIB_PATH="${THERE}:$SHLIB_PATH"		# legacy HP-UX | 
					
						
							|  |  |  | 	LIBPATH="${THERE}:$LIBPATH"			# AIX, OS/2 | 
					
						
							|  |  |  | 	export LD_LIBRARY_PATH DYLD_LIBRARY_PATH SHLIB_PATH LIBPATH | 
					
						
							|  |  |  | 	# Even though $PATH is adjusted [for Windows sake], it doesn't | 
					
						
							|  |  |  | 	# necessarily does the trick. Trouble is that with introduction | 
					
						
							|  |  |  | 	# of SafeDllSearchMode in XP/2003 it's more appropriate to copy | 
					
						
							|  |  |  | 	# .DLLs in vicinity of executable, which is done elsewhere... | 
					
						
							|  |  |  | 	if [ "$OSTYPE" != msdosdjgpp ]; then | 
					
						
							|  |  |  | 		PATH="${THERE}:$PATH"; export PATH | 
					
						
							|  |  |  | 	fi | 
					
						
							|  |  |  | 	;; | 
					
						
							|  |  |  | esac | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-06-19 01:08:50 +08:00
										 |  |  | {- output_off() unless grep (/-rpath\b/, @{$config{LDFLAGS}}); ""; -} | 
					
						
							| 
									
										
										
										
											2007-07-16 22:00:08 +08:00
										 |  |  | if [ -f "$LIBCRYPTOSO" -a -z "$preload_var" ]; then | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 	# Following three lines are major excuse for isolating them into | 
					
						
							|  |  |  | 	# this wrapper script. Original reason for setting LD_PRELOAD | 
					
						
							|  |  |  | 	# was to make it possible to pass 'make test' when user linked | 
					
						
							|  |  |  | 	# with -rpath pointing to previous version installation. Wrapping | 
					
						
							|  |  |  | 	# it into a script makes it possible to do so on multi-ABI | 
					
						
							|  |  |  | 	# platforms. | 
					
						
							| 
									
										
										
										
											2005-02-06 21:15:21 +08:00
										 |  |  | 	case "$SYSNAME" in | 
					
						
							| 
									
										
										
										
											2018-03-27 02:10:57 +08:00
										 |  |  | 	*BSD)	LD_PRELOAD="$LIBCRYPTOSO:$LIBSSLSO" ;;	# *BSD | 
					
						
							| 
									
										
										
										
											2005-02-06 21:15:21 +08:00
										 |  |  | 	*)	LD_PRELOAD="$LIBCRYPTOSO $LIBSSLSO" ;;	# SunOS, Linux, ELF HP-UX | 
					
						
							|  |  |  | 	esac | 
					
						
							|  |  |  | 	_RLD_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"	# Tru64, o32 IRIX | 
					
						
							| 
									
										
										
										
											2007-07-16 22:00:08 +08:00
										 |  |  | 	DYLD_INSERT_LIBRARIES="$LIBCRYPTOSO:$LIBSSLSO"	# MacOS X | 
					
						
							|  |  |  | 	export LD_PRELOAD _RLD_LIST DYLD_INSERT_LIBRARIES | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | fi | 
					
						
							| 
									
										
										
										
											2018-06-19 01:08:50 +08:00
										 |  |  | {- output_on() unless grep (/-rpath\b/, @{$config{LDFLAGS}}); ""; -} | 
					
						
							| 
									
										
										
										
											2005-02-02 07:48:37 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2015-10-13 04:16:07 +08:00
										 |  |  | cmd="$1"; [ -x "$cmd" ] || cmd="$cmd${EXE_EXT}" | 
					
						
							| 
									
										
										
										
											2009-11-16 03:05:13 +08:00
										 |  |  | shift | 
					
						
							| 
									
										
										
										
											2013-11-13 04:49:15 +08:00
										 |  |  | if [ $# -eq 0 ]; then | 
					
						
							|  |  |  | 	exec "$cmd"	# old sh, such as Tru64 4.x, fails to expand empty "$@" | 
					
						
							|  |  |  | else | 
					
						
							|  |  |  | 	exec "$cmd" "$@" | 
					
						
							|  |  |  | fi |