2005-02-02 07:48:37 +08:00
|
|
|
#!/bin/sh
|
|
|
|
|
2018-03-15 00:25:37 +08:00
|
|
|
# To test this OpenSSL version's applications against another version's
|
|
|
|
# shared libraries, simply set
|
|
|
|
#
|
|
|
|
# OPENSSL_REGRESSION=/path/to/other/OpenSSL/build/tree
|
|
|
|
if [ -n "$OPENSSL_REGRESSION" ]; then
|
|
|
|
shlibwrap="$OPENSSL_REGRESSION/util/shlib_wrap.sh"
|
|
|
|
if [ -x "$shlibwrap" ]; then
|
|
|
|
# We clear OPENSSL_REGRESSION to avoid a loop, should the shlib_wrap.sh
|
|
|
|
# we exec also support that mechanism...
|
|
|
|
OPENSSL_REGRESSION= exec "$shlibwrap" "$@"
|
|
|
|
else
|
|
|
|
if [ -f "$shlibwrap" ]; then
|
|
|
|
echo "Not permitted to run $shlibwrap" >&2
|
|
|
|
else
|
|
|
|
echo "No $shlibwrap, perhaps OPENSSL_REGRESSION isn't properly set?" >&2
|
|
|
|
fi
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2005-02-02 07:48:37 +08:00
|
|
|
[ $# -ne 0 ] || set -x # debug mode without arguments:-)
|
|
|
|
|
|
|
|
THERE="`echo $0 | sed -e 's|[^/]*$||' 2>/dev/null`.."
|
|
|
|
[ -d "${THERE}" ] || exec "$@" # should never happen...
|
|
|
|
|
|
|
|
# Alternative to this is to parse ${THERE}/Makefile...
|
|
|
|
LIBCRYPTOSO="${THERE}/libcrypto.so"
|
|
|
|
if [ -f "$LIBCRYPTOSO" ]; then
|
|
|
|
while [ -h "$LIBCRYPTOSO" ]; do
|
|
|
|
LIBCRYPTOSO="${THERE}/`ls -l "$LIBCRYPTOSO" | sed -e 's|.*\-> ||'`"
|
|
|
|
done
|
|
|
|
SOSUFFIX=`echo ${LIBCRYPTOSO} | sed -e 's|.*\.so||' 2>/dev/null`
|
|
|
|
LIBSSLSO="${THERE}/libssl.so${SOSUFFIX}"
|
|
|
|
fi
|
|
|
|
|
2005-02-06 21:15:21 +08:00
|
|
|
SYSNAME=`(uname -s) 2>/dev/null`;
|
|
|
|
case "$SYSNAME" in
|
2005-02-02 07:48:37 +08:00
|
|
|
SunOS|IRIX*)
|
|
|
|
# SunOS and IRIX run-time linkers evaluate alternative
|
|
|
|
# variables depending on target ABI...
|
|
|
|
rld_var=LD_LIBRARY_PATH
|
|
|
|
case "`(/usr/bin/file "$LIBCRYPTOSO") 2>/dev/null`" in
|
2007-07-16 22:00:08 +08:00
|
|
|
*ELF\ 64*SPARC*|*ELF\ 64*AMD64*)
|
2005-02-02 07:48:37 +08:00
|
|
|
[ -n "$LD_LIBRARY_PATH_64" ] && rld_var=LD_LIBRARY_PATH_64
|
2007-07-16 22:00:08 +08:00
|
|
|
LD_PRELOAD_64="$LIBCRYPTOSO $LIBSSLSO"; export LD_PRELOAD_64
|
|
|
|
preload_var=LD_PRELOAD_64
|
2005-02-02 07:48:37 +08:00
|
|
|
;;
|
2016-03-07 05:36:57 +08:00
|
|
|
*ELF\ 32*SPARC*|*ELF\ 32*80386*)
|
2016-03-09 18:36:32 +08:00
|
|
|
# We only need to change LD_PRELOAD_32 and LD_LIBRARY_PATH_32
|
|
|
|
# on a multi-arch system. Otherwise, trust the fallbacks.
|
|
|
|
if [ -f /lib/64/ld.so.1 ]; then
|
|
|
|
[ -n "$LD_LIBRARY_PATH_32" ] && rld_var=LD_LIBRARY_PATH_32
|
|
|
|
LD_PRELOAD_32="$LIBCRYPTOSO $LIBSSLSO"; export LD_PRELOAD_32
|
|
|
|
preload_var=LD_PRELOAD_32
|
|
|
|
fi
|
2016-03-07 05:36:57 +08:00
|
|
|
;;
|
2007-08-27 16:51:59 +08:00
|
|
|
# Why are newly built .so's preloaded anyway? Because run-time
|
|
|
|
# .so lookup path embedded into application takes precedence
|
|
|
|
# over LD_LIBRARY_PATH and as result application ends up linking
|
|
|
|
# to previously installed .so's. On IRIX instead of preloading
|
|
|
|
# newly built .so's we trick run-time linker to fail to find
|
|
|
|
# the installed .so by setting _RLD_ROOT variable.
|
2007-08-27 16:42:01 +08:00
|
|
|
*ELF\ 32*MIPS*)
|
|
|
|
#_RLD_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"; export _RLD_LIST
|
|
|
|
_RLD_ROOT=/no/such/dir; export _RLD_ROOT
|
|
|
|
eval $rld_var=\"/usr/lib'${'$rld_var':+:$'$rld_var'}'\"
|
|
|
|
preload_var=_RLD_LIST
|
|
|
|
;;
|
2005-02-02 07:48:37 +08:00
|
|
|
*ELF\ N32*MIPS*)
|
|
|
|
[ -n "$LD_LIBRARYN32_PATH" ] && rld_var=LD_LIBRARYN32_PATH
|
2007-08-27 16:42:01 +08:00
|
|
|
#_RLDN32_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"; export _RLDN32_LIST
|
|
|
|
_RLDN32_ROOT=/no/such/dir; export _RLDN32_ROOT
|
|
|
|
eval $rld_var=\"/usr/lib32'${'$rld_var':+:$'$rld_var'}'\"
|
2007-07-16 22:00:08 +08:00
|
|
|
preload_var=_RLDN32_LIST
|
2005-02-02 07:48:37 +08:00
|
|
|
;;
|
|
|
|
*ELF\ 64*MIPS*)
|
|
|
|
[ -n "$LD_LIBRARY64_PATH" ] && rld_var=LD_LIBRARY64_PATH
|
2007-08-27 16:42:01 +08:00
|
|
|
#_RLD64_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT"; export _RLD64_LIST
|
|
|
|
_RLD64_ROOT=/no/such/dir; export _RLD64_ROOT
|
|
|
|
eval $rld_var=\"/usr/lib64'${'$rld_var':+:$'$rld_var'}'\"
|
2007-07-16 22:00:08 +08:00
|
|
|
preload_var=_RLD64_LIST
|
2005-02-02 07:48:37 +08:00
|
|
|
;;
|
|
|
|
esac
|
2007-08-27 16:42:01 +08:00
|
|
|
eval $rld_var=\"${THERE}'${'$rld_var':+:$'$rld_var'}'\"; export $rld_var
|
2005-02-02 07:48:37 +08:00
|
|
|
unset rld_var
|
|
|
|
;;
|
|
|
|
*) LD_LIBRARY_PATH="${THERE}:$LD_LIBRARY_PATH" # Linux, ELF HP-UX
|
|
|
|
DYLD_LIBRARY_PATH="${THERE}:$DYLD_LIBRARY_PATH" # MacOS X
|
|
|
|
SHLIB_PATH="${THERE}:$SHLIB_PATH" # legacy HP-UX
|
|
|
|
LIBPATH="${THERE}:$LIBPATH" # AIX, OS/2
|
|
|
|
export LD_LIBRARY_PATH DYLD_LIBRARY_PATH SHLIB_PATH LIBPATH
|
|
|
|
# Even though $PATH is adjusted [for Windows sake], it doesn't
|
|
|
|
# necessarily does the trick. Trouble is that with introduction
|
|
|
|
# of SafeDllSearchMode in XP/2003 it's more appropriate to copy
|
|
|
|
# .DLLs in vicinity of executable, which is done elsewhere...
|
|
|
|
if [ "$OSTYPE" != msdosdjgpp ]; then
|
|
|
|
PATH="${THERE}:$PATH"; export PATH
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
Remove automatic RPATH - adapt shlib_wrap.sh
Looking for something starting with '-Wl,-rpath,' isn't good enough,
as someone might give something like '-Wl,--enable-new-dtags,-rpath,/PATH'.
Looking for ',-rpath,' should be safe enough.
We could remove the preloading stuff entirely, but just in case the
user has chosen to given RPATH setting arguments at configuration,
we'd better make sure testing will still work. Fair warning, there
are some configuration options that do not work with preloaded OpenSSL
libraries, such as the sanity checking ones.
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-10-13 06:08:55 +08:00
|
|
|
{- output_off() if $config{ex_libs} !~ /,-rpath,/; ""; -}
|
2007-07-16 22:00:08 +08:00
|
|
|
if [ -f "$LIBCRYPTOSO" -a -z "$preload_var" ]; then
|
2005-02-02 07:48:37 +08:00
|
|
|
# Following three lines are major excuse for isolating them into
|
|
|
|
# this wrapper script. Original reason for setting LD_PRELOAD
|
|
|
|
# was to make it possible to pass 'make test' when user linked
|
|
|
|
# with -rpath pointing to previous version installation. Wrapping
|
|
|
|
# it into a script makes it possible to do so on multi-ABI
|
|
|
|
# platforms.
|
2005-02-06 21:15:21 +08:00
|
|
|
case "$SYSNAME" in
|
2018-03-27 02:10:57 +08:00
|
|
|
*BSD) LD_PRELOAD="$LIBCRYPTOSO:$LIBSSLSO" ;; # *BSD
|
2005-02-06 21:15:21 +08:00
|
|
|
*) LD_PRELOAD="$LIBCRYPTOSO $LIBSSLSO" ;; # SunOS, Linux, ELF HP-UX
|
|
|
|
esac
|
|
|
|
_RLD_LIST="$LIBCRYPTOSO:$LIBSSLSO:DEFAULT" # Tru64, o32 IRIX
|
2007-07-16 22:00:08 +08:00
|
|
|
DYLD_INSERT_LIBRARIES="$LIBCRYPTOSO:$LIBSSLSO" # MacOS X
|
|
|
|
export LD_PRELOAD _RLD_LIST DYLD_INSERT_LIBRARIES
|
2005-02-02 07:48:37 +08:00
|
|
|
fi
|
Remove automatic RPATH - adapt shlib_wrap.sh
Looking for something starting with '-Wl,-rpath,' isn't good enough,
as someone might give something like '-Wl,--enable-new-dtags,-rpath,/PATH'.
Looking for ',-rpath,' should be safe enough.
We could remove the preloading stuff entirely, but just in case the
user has chosen to given RPATH setting arguments at configuration,
we'd better make sure testing will still work. Fair warning, there
are some configuration options that do not work with preloaded OpenSSL
libraries, such as the sanity checking ones.
Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-10-13 06:08:55 +08:00
|
|
|
{- output_on() if $config{ex_libs} !~ /,-rpath,/; ""; -}
|
2005-02-02 07:48:37 +08:00
|
|
|
|
2015-10-13 04:16:07 +08:00
|
|
|
cmd="$1"; [ -x "$cmd" ] || cmd="$cmd${EXE_EXT}"
|
2009-11-16 03:05:13 +08:00
|
|
|
shift
|
2013-11-13 04:49:15 +08:00
|
|
|
if [ $# -eq 0 ]; then
|
|
|
|
exec "$cmd" # old sh, such as Tru64 4.x, fails to expand empty "$@"
|
|
|
|
else
|
|
|
|
exec "$cmd" "$@"
|
|
|
|
fi
|