summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--.circleci/config.yml53
-rw-r--r--openssl-sys/Cargo.toml4
-rw-r--r--openssl-sys/build/main.rs338
-rw-r--r--openssl/Cargo.toml2
-rw-r--r--openssl/src/ssl/test.rs6
-rw-r--r--systest/Cargo.toml3
-rwxr-xr-xtest/add_target.sh3
-rwxr-xr-xtest/build_openssl.sh8
8 files changed, 251 insertions, 166 deletions
diff --git a/.circleci/config.yml b/.circleci/config.yml
index 0d4315dc..b188695b 100644
--- a/.circleci/config.yml
+++ b/.circleci/config.yml
@@ -1,9 +1,9 @@
restore_registry: &RESTORE_REGISTRY
restore_cache:
- key: registry-3
+ key: registry-4
save_registry: &SAVE_REGISTRY
save_cache:
- key: registry-3-{{ .BuildNum }}
+ key: registry-4-{{ .BuildNum }}
paths:
- /usr/local/cargo/registry/index
openssl_key: &OPENSSL_KEY
@@ -38,14 +38,14 @@ job: &JOB
- run: apt-get remove -y libssl-dev
- run: ./test/add_target.sh
- *RESTORE_REGISTRY
- - run: cargo generate-lockfile
+ - run: cargo generate-lockfile --verbose
- *SAVE_REGISTRY
- run: echo "${LIBRARY}-${VERSION}-${TARGET}" > ~/lib_key
- *RESTORE_OPENSSL
- run: ./test/build_openssl.sh
- *SAVE_OPENSSL
- *RESTORE_DEPS
- - run: cargo run --manifest-path=systest/Cargo.toml --target $TARGET
+ - run: cargo run --manifest-path=systest/Cargo.toml --target $TARGET --features "$FEATURES"
- run: |
ulimit -c unlimited
export PATH=$OPENSSL_DIR/bin:$PATH
@@ -55,6 +55,7 @@ job: &JOB
cargo test \
--manifest-path=openssl/Cargo.toml \
--target $TARGET \
+ --features "$FEATURES" \
$TEST_ARGS
- run:
command: |
@@ -69,9 +70,6 @@ job: &JOB
macos_job: &MACOS_JOB
macos:
xcode: "9.0"
- environment:
- RUSTUP_HOME: /usr/local/rustup
- CARGO_HOME: /usr/local/cargo
steps:
- checkout
- run: sudo mkdir /opt
@@ -83,12 +81,18 @@ macos_job: &MACOS_JOB
- *SAVE_REGISTRY
- run: echo "homebrew-x86_64-apple-darwin" > ~/lib_key
- *RESTORE_DEPS
- - run: cargo run --manifest-path=systest/Cargo.toml
+ - run: cargo run --manifest-path=systest/Cargo.toml --features "$FEATURES"
- run: |
PATH=/usr/local/opt/openssl/bin:$PATH
- cargo test --manifest-path=openssl/Cargo.toml
+ cargo test --manifest-path=openssl/Cargo.toml --features "$FEATURES"
- *SAVE_DEPS
+macos_env: &MACOS_ENV
+ RUSTUP_HOME: /usr/local/rustup
+ CARGO_HOME: /usr/local/cargo
+vendored: &VENDORED
+ FEATURES: vendored
+ LIBRARY: ""
openssl_111: &OPENSSL_111
LIBRARY: openssl
VERSION: 1.1.1-pre8
@@ -110,6 +114,8 @@ libressl_270: &LIBRESSL_272
x86_64: &X86_64
TARGET: x86_64-unknown-linux-gnu
+musl: &MUSL
+ TARGET: x86_64-unknown-linux-musl
i686: &I686
TARGET: i686-unknown-linux-gnu
armhf: &ARMHF
@@ -127,6 +133,16 @@ base: &BASE
version: 2
jobs:
+ musl-vendored:
+ <<: *JOB
+ docker:
+ - image: rust:1.21.0
+ environment:
+ <<: [*VENDORED, *MUSL, *BASE]
+ x86_64-vendored:
+ <<: *JOB
+ environment:
+ <<: [*VENDORED, *X86_64, *BASE]
x86_64-openssl-1.1.1:
<<: *JOB
environment:
@@ -143,6 +159,10 @@ jobs:
<<: *JOB
environment:
<<: [*OPENSSL_101, *X86_64, *BASE]
+ i686-vendored:
+ <<: *JOB
+ environment:
+ <<: [*VENDORED, *I686, *BASE]
i686-openssl-1.1.1:
<<: *JOB
environment:
@@ -155,6 +175,10 @@ jobs:
<<: *JOB
environment:
<<: [*OPENSSL_102, *I686, *BASE]
+ armhf-vendored:
+ <<: *JOB
+ environment:
+ <<: [*VENDORED, *ARMHF, *BASE]
armhf-openssl-1.1.1:
<<: *JOB
environment:
@@ -177,20 +201,31 @@ jobs:
<<: [*LIBRESSL_272, *X86_64, *BASE]
macos:
<<: *MACOS_JOB
+ environment:
+ <<: [*MACOS_ENV]
+ macos-vendored:
+ <<: *MACOS_JOB
+ environment:
+ <<: [*VENDORED, *MACOS_ENV]
workflows:
version: 2
tests:
jobs:
+ - musl-vendored
+ - x86_64-vendored
- x86_64-openssl-1.1.1
- x86_64-openssl-1.1.0
- x86_64-openssl-1.0.2
- x86_64-openssl-1.0.1
+ - i686-vendored
- i686-openssl-1.1.1
- i686-openssl-1.1.0
- i686-openssl-1.0.2
+ - armhf-vendored
- armhf-openssl-1.1.1
- armhf-openssl-1.1.0
- armhf-openssl-1.0.2
- x86_64-libressl-2.5.0
- x86_64-libressl-2.7.2
- macos
+ - macos-vendored
diff --git a/openssl-sys/Cargo.toml b/openssl-sys/Cargo.toml
index b48d3055..195a179f 100644
--- a/openssl-sys/Cargo.toml
+++ b/openssl-sys/Cargo.toml
@@ -11,12 +11,16 @@ categories = ["cryptography", "external-ffi-bindings"]
links = "openssl"
build = "build/main.rs"
+[features]
+vendored = ['openssl-src']
+
[dependencies]
libc = "0.2"
[build-dependencies]
pkg-config = "0.3.9"
cc = "1.0"
+openssl-src = { version = "110.0.4", optional = true }
[target.'cfg(target_env = "msvc")'.build-dependencies]
vcpkg = "0.2"
diff --git a/openssl-sys/build/main.rs b/openssl-sys/build/main.rs
index 24f69018..4d58d248 100644
--- a/openssl-sys/build/main.rs
+++ b/openssl-sys/build/main.rs
@@ -2,6 +2,8 @@ extern crate cc;
extern crate pkg_config;
#[cfg(target_env = "msvc")]
extern crate vcpkg;
+#[cfg(feature = "vendored")]
+extern crate openssl_src;
use std::collections::HashSet;
use std::env;
@@ -9,7 +11,6 @@ use std::ffi::OsString;
use std::fs::File;
use std::io::{BufWriter, Write};
use std::path::{Path, PathBuf};
-use std::process::Command;
mod cfgs;
@@ -52,18 +53,7 @@ fn env(name: &str) -> Option<OsString> {
fn main() {
let target = env::var("TARGET").unwrap();
- let lib_dir = env("OPENSSL_LIB_DIR").map(PathBuf::from);
- let include_dir = env("OPENSSL_INCLUDE_DIR").map(PathBuf::from);
-
- let (lib_dir, include_dir) = if lib_dir.is_none() || include_dir.is_none() {
- let openssl_dir = env("OPENSSL_DIR").unwrap_or_else(|| find_openssl_dir(&target));
- let openssl_dir = Path::new(&openssl_dir);
- let lib_dir = lib_dir.unwrap_or_else(|| openssl_dir.join("lib"));
- let include_dir = include_dir.unwrap_or_else(|| openssl_dir.join("include"));
- (lib_dir, include_dir)
- } else {
- (lib_dir.unwrap(), include_dir.unwrap())
- };
+ let (lib_dir, include_dir) = imp::get_openssl(&target);
if !Path::new(&lib_dir).exists() {
panic!(
@@ -110,48 +100,83 @@ fn main() {
}
}
-fn find_openssl_dir(target: &str) -> OsString {
- let host = env::var("HOST").unwrap();
+#[cfg(feature = "vendored")]
+mod imp {
+ use std::path::PathBuf;
+ use openssl_src;
- if host == target && target.contains("apple-darwin") {
- // Check up default Homebrew installation location first
- // for quick resolution if possible.
- let homebrew = Path::new("/usr/local/opt/openssl@1.1");
- if homebrew.exists() {
- return homebrew.to_path_buf().into();
- }
- let homebrew = Path::new("/usr/local/opt/openssl");
- if homebrew.exists() {
- return homebrew.to_path_buf().into();
+ pub fn get_openssl(_target: &str) -> (PathBuf, PathBuf) {
+ let artifacts = openssl_src::Build::new().build();
+ (artifacts.lib_dir().to_path_buf(), artifacts.include_dir().to_path_buf())
+ }
+}
+
+#[cfg(not(feature = "vendored"))]
+mod imp {
+ use pkg_config;
+ use std::path::{Path, PathBuf};
+ use std::ffi::OsString;
+ use std::process::{self, Command};
+
+ use super::env;
+
+ pub fn get_openssl(target: &str) -> (PathBuf, PathBuf) {
+ let lib_dir = env("OPENSSL_LIB_DIR").map(PathBuf::from);
+ let include_dir = env("OPENSSL_INCLUDE_DIR").map(PathBuf::from);
+
+ if lib_dir.is_none() || include_dir.is_none() {
+ let openssl_dir = env("OPENSSL_DIR").unwrap_or_else(|| find_openssl_dir(&target));
+ let openssl_dir = Path::new(&openssl_dir);
+ let lib_dir = lib_dir.unwrap_or_else(|| openssl_dir.join("lib"));
+ let include_dir = include_dir.unwrap_or_else(|| openssl_dir.join("include"));
+ (lib_dir, include_dir)
+ } else {
+ (lib_dir.unwrap(), include_dir.unwrap())
}
- // Calling `brew --prefix <package>` command usually slow and
- // takes seconds, and will be used only as a last resort.
- let output = execute_command_and_get_output("brew", &["--prefix", "openssl@1.1"]);
- if let Some(ref output) = output {
- let homebrew = Path::new(&output);
+ }
+
+ fn find_openssl_dir(target: &str) -> OsString {
+ let host = env::var("HOST").unwrap();
+
+ if host == target && target.contains("apple-darwin") {
+ // Check up default Homebrew installation location first
+ // for quick resolution if possible.
+ let homebrew = Path::new("/usr/local/opt/openssl@1.1");
if homebrew.exists() {
return homebrew.to_path_buf().into();
}
- }
- let output = execute_command_and_get_output("brew", &["--prefix", "openssl"]);
- if let Some(ref output) = output {
- let homebrew = Path::new(&output);
+ let homebrew = Path::new("/usr/local/opt/openssl");
if homebrew.exists() {
return homebrew.to_path_buf().into();
}
+ // Calling `brew --prefix <package>` command usually slow and
+ // takes seconds, and will be used only as a last resort.
+ let output = execute_command_and_get_output("brew", &["--prefix", "openssl@1.1"]);
+ if let Some(ref output) = output {
+ let homebrew = Path::new(&output);
+ if homebrew.exists() {
+ return homebrew.to_path_buf().into();
+ }
+ }
+ let output = execute_command_and_get_output("brew", &["--prefix", "openssl"]);
+ if let Some(ref output) = output {
+ let homebrew = Path::new(&output);
+ if homebrew.exists() {
+ return homebrew.to_path_buf().into();
+ }
+ }
}
- }
- try_pkg_config();
- try_vcpkg();
+ try_pkg_config();
+ try_vcpkg();
- // FreeBSD ships with OpenSSL but doesn't include a pkg-config file :(
- if host == target && target.contains("freebsd") {
- return OsString::from("/usr");
- }
+ // FreeBSD ships with OpenSSL but doesn't include a pkg-config file :(
+ if host == target && target.contains("freebsd") {
+ return OsString::from("/usr");
+ }
- let mut msg = format!(
- "
+ let mut msg = format!(
+ "
Could not find directory of OpenSSL installation, and this `-sys` crate cannot
proceed without this knowledge. If OpenSSL is installed and this crate had
@@ -170,16 +195,16 @@ and include information about your system as well as this message.
openssl-sys = {}
",
- host,
- target,
- env!("CARGO_PKG_VERSION")
- );
+ host,
+ target,
+ env!("CARGO_PKG_VERSION")
+ );
- if host.contains("apple-darwin") && target.contains("apple-darwin") {
- let system = Path::new("/usr/lib/libssl.0.9.8.dylib");
- if system.exists() {
- msg.push_str(&format!(
- "
+ if host.contains("apple-darwin") && target.contains("apple-darwin") {
+ let system = Path::new("/usr/lib/libssl.0.9.8.dylib");
+ if system.exists() {
+ msg.push_str(&format!(
+ "
It looks like you're compiling on macOS, where the system contains a version of
OpenSSL 0.9.8. This crate no longer supports OpenSSL 0.9.8.
@@ -191,27 +216,27 @@ install the `openssl` package, or as a maintainer you can use the openssl-sys
Unfortunately though the compile cannot continue, so aborting.
"
- ));
+ ));
+ }
}
- }
- if host.contains("unknown-linux") && target.contains("unknown-linux-gnu") {
- if Command::new("pkg-config").output().is_err() {
- msg.push_str(&format!(
- "
+ if host.contains("unknown-linux") && target.contains("unknown-linux-gnu") {
+ if Command::new("pkg-config").output().is_err() {
+ msg.push_str(&format!(
+ "
It looks like you're compiling on Linux and also targeting Linux. Currently this
requires the `pkg-config` utility to find OpenSSL but unfortunately `pkg-config`
could not be found. If you have OpenSSL installed you can likely fix this by
installing `pkg-config`.
"
- ));
+ ));
+ }
}
- }
- if host.contains("windows") && target.contains("windows-gnu") {
- msg.push_str(&format!(
- "
+ if host.contains("windows") && target.contains("windows-gnu") {
+ msg.push_str(&format!(
+ "
It looks like you're compiling for MinGW but you may not have either OpenSSL or
pkg-config installed. You can install these two dependencies with:
@@ -220,12 +245,12 @@ pkg-config installed. You can install these two dependencies with:
and try building this crate again.
"
- ));
- }
+ ));
+ }
- if host.contains("windows") && target.contains("windows-msvc") {
- msg.push_str(&format!(
- "
+ if host.contains("windows") && target.contains("windows-msvc") {
+ msg.push_str(&format!(
+ "
It looks like you're compiling for MSVC but we couldn't detect an OpenSSL
installation. If there isn't one installed then you can try the rust-openssl
README for more information about how to download precompiled binaries of
@@ -234,96 +259,112 @@ OpenSSL:
https://github.com/sfackler/rust-openssl#windows
"
- ));
- }
-
- panic!(msg);
-}
-
-/// Attempt to find OpenSSL through pkg-config.
-///
-/// Note that if this succeeds then the function does not return as pkg-config
-/// typically tells us all the information that we need.
-fn try_pkg_config() {
- let target = env::var("TARGET").unwrap();
- let host = env::var("HOST").unwrap();
+ ));
+ }
- // If we're going to windows-gnu we can use pkg-config, but only so long as
- // we're coming from a windows host.
- //
- // Otherwise if we're going to windows we probably can't use pkg-config.
- if target.contains("windows-gnu") && host.contains("windows") {
- env::set_var("PKG_CONFIG_ALLOW_CROSS", "1");
- } else if target.contains("windows") {
- return;
+ panic!(msg);
}
- let lib = match pkg_config::Config::new()
- .print_system_libs(false)
- .find("openssl")
- {
- Ok(lib) => lib,
- Err(e) => {
- println!("run pkg_config fail: {:?}", e);
+ /// Attempt to find OpenSSL through pkg-config.
+ ///
+ /// Note that if this succeeds then the function does not return as pkg-config
+ /// typically tells us all the information that we need.
+ fn try_pkg_config() {
+ let target = env::var("TARGET").unwrap();
+ let host = env::var("HOST").unwrap();
+
+ // If we're going to windows-gnu we can use pkg-config, but only so long as
+ // we're coming from a windows host.
+ //
+ // Otherwise if we're going to windows we probably can't use pkg-config.
+ if target.contains("windows-gnu") && host.contains("windows") {
+ env::set_var("PKG_CONFIG_ALLOW_CROSS", "1");
+ } else if target.contains("windows") {
return;
}
- };
- validate_headers(&lib.include_paths);
+ let lib = match pkg_config::Config::new()
+ .print_system_libs(false)
+ .find("openssl")
+ {
+ Ok(lib) => lib,
+ Err(e) => {
+ println!("run pkg_config fail: {:?}", e);
+ return;
+ }
+ };
+
+ super::validate_headers(&lib.include_paths);
- for include in lib.include_paths.iter() {
- println!("cargo:include={}", include.display());
+ for include in lib.include_paths.iter() {
+ println!("cargo:include={}", include.display());
+ }
+
+ process::exit(0);
}
- std::process::exit(0);
-}
+ /// Attempt to find OpenSSL through vcpkg.
+ ///
+ /// Note that if this succeeds then the function does not return as vcpkg
+ /// should emit all of the cargo metadata that we need.
+ #[cfg(target_env = "msvc")]
+ fn try_vcpkg() {
+ use vcpkg;
-/// Attempt to find OpenSSL through vcpkg.
-///
-/// Note that if this succeeds then the function does not return as vcpkg
-/// should emit all of the cargo metadata that we need.
-#[cfg(target_env = "msvc")]
-fn try_vcpkg() {
- // vcpkg will not emit any metadata if it can not find libraries
- // appropriate for the target triple with the desired linkage.
-
- let mut lib = vcpkg::Config::new()
- .emit_includes(true)
- .lib_name("libcrypto")
- .lib_name("libssl")
- .probe("openssl");
-
- if let Err(e) = lib {
- println!(
- "note: vcpkg did not find openssl as libcrypto and libssl : {:?}",
- e
- );
- lib = vcpkg::Config::new()
+ // vcpkg will not emit any metadata if it can not find libraries
+ // appropriate for the target triple with the desired linkage.
+
+ let mut lib = vcpkg::Config::new()
.emit_includes(true)
- .lib_name("libeay32")
- .lib_name("ssleay32")
+ .lib_name("libcrypto")
+ .lib_name("libssl")
.probe("openssl");
- }
- if let Err(e) = lib {
- println!(
- "note: vcpkg did not find openssl as ssleay32 and libeay32: {:?}",
- e
- );
- return;
- }
- let lib = lib.unwrap();
- validate_headers(&lib.include_paths);
+ if let Err(e) = lib {
+ println!(
+ "note: vcpkg did not find openssl as libcrypto and libssl : {:?}",
+ e
+ );
+ lib = vcpkg::Config::new()
+ .emit_includes(true)
+ .lib_name("libeay32")
+ .lib_name("ssleay32")
+ .probe("openssl");
+ }
+ if let Err(e) = lib {
+ println!(
+ "note: vcpkg did not find openssl as ssleay32 and libeay32: {:?}",
+ e
+ );
+ return;
+ }
+
+ let lib = lib.unwrap();
+ super::validate_headers(&lib.include_paths);
- println!("cargo:rustc-link-lib=user32");
- println!("cargo:rustc-link-lib=gdi32");
- println!("cargo:rustc-link-lib=crypt32");
+ println!("cargo:rustc-link-lib=user32");
+ println!("cargo:rustc-link-lib=gdi32");
+ println!("cargo:rustc-link-lib=crypt32");
- std::process::exit(0);
-}
+ process::exit(0);
+ }
-#[cfg(not(target_env = "msvc"))]
-fn try_vcpkg() {}
+ #[cfg(not(target_env = "msvc"))]
+ fn try_vcpkg() {}
+
+ fn execute_command_and_get_output(cmd: &str, args: &[&str]) -> Option<String> {
+ let out = Command::new(cmd).args(args).output();
+ if let Ok(ref r1) = out {
+ if r1.status.success() {
+ let r2 = String::from_utf8(r1.stdout.clone());
+ if let Ok(r3) = r2 {
+ return Some(r3.trim().to_string());
+ }
+ }
+ }
+ return None;
+ }
+}
/// Validates the header files found in `include_dir` and then returns the
/// version string of OpenSSL.
@@ -565,16 +606,3 @@ fn determine_mode(libdir: &Path, libs: &[&str]) -> &'static str {
// practices with security libs", let's link dynamically.
"dylib"
}
-
-fn execute_command_and_get_output(cmd: &str, args: &[&str]) -> Option<String> {
- let out = Command::new(cmd).args(args).output();
- if let Ok(ref r1) = out {
- if r1.status.success() {
- let r2 = String::from_utf8(r1.stdout.clone());
- if let Ok(r3) = r2 {
- return Some(r3.trim().to_string());
- }
- }
- }
- return None;
-}
diff --git a/openssl/Cargo.toml b/openssl/Cargo.toml
index b14a7d28..317918f0 100644
--- a/openssl/Cargo.toml
+++ b/openssl/Cargo.toml
@@ -16,6 +16,8 @@ v102 = []
v110 = []
v111 = []
+vendored = ['openssl-sys/vendored']
+
[dependencies]
bitflags = "1.0"
cfg-if = "0.1"
diff --git a/openssl/src/ssl/test.rs b/openssl/src/ssl/test.rs
index 05938af4..08a93b97 100644
--- a/openssl/src/ssl/test.rs
+++ b/openssl/src/ssl/test.rs
@@ -775,6 +775,7 @@ fn refcount_ssl_context() {
#[test]
#[cfg_attr(libressl250, ignore)]
+#[cfg_attr(all(target_os = "macos", feature = "vendored"), ignore)]
fn default_verify_paths() {
let mut ctx = SslContext::builder(SslMethod::tls()).unwrap();
ctx.set_default_verify_paths().unwrap();
@@ -804,6 +805,7 @@ fn add_extra_chain_cert() {
#[test]
#[cfg(any(ossl102, ossl110))]
+#[cfg_attr(all(target_os = "macos", feature = "vendored"), ignore)]
fn verify_valid_hostname() {
let mut ctx = SslContext::builder(SslMethod::tls()).unwrap();
ctx.set_default_verify_paths().unwrap();
@@ -845,6 +847,7 @@ fn verify_invalid_hostname() {
#[test]
#[cfg_attr(libressl250, ignore)]
+#[cfg_attr(all(target_os = "macos", feature = "vendored"), ignore)]
fn connector_valid_hostname() {
let connector = SslConnector::builder(SslMethod::tls()).unwrap().build();
@@ -861,6 +864,7 @@ fn connector_valid_hostname() {
}
#[test]
+#[cfg_attr(all(target_os = "macos", feature = "vendored"), ignore)]
fn connector_invalid_hostname() {
let connector = SslConnector::builder(SslMethod::tls()).unwrap().build();
@@ -870,6 +874,7 @@ fn connector_invalid_hostname() {
#[test]
#[cfg_attr(libressl250, ignore)]
+#[cfg_attr(all(target_os = "macos", feature = "vendored"), ignore)]
fn connector_invalid_no_hostname_verification() {
let connector = SslConnector::builder(SslMethod::tls()).unwrap().build();
@@ -1202,6 +1207,7 @@ fn idle_session() {
#[test]
#[cfg_attr(libressl250, ignore)]
+#[cfg_attr(all(target_os = "macos", feature = "vendored"), ignore)]
fn active_session() {
let connector = SslConnector::builder(SslMethod::tls()).unwrap().build();
diff --git a/systest/Cargo.toml b/systest/Cargo.toml
index e9d7af64..63f80479 100644
--- a/systest/Cargo.toml
+++ b/systest/Cargo.toml
@@ -9,3 +9,6 @@ openssl-sys = { path = "../openssl-sys" }
[build-dependencies]
ctest = "0.1"
+
+[features]
+vendored = ['openssl-sys/vendored']
diff --git a/test/add_target.sh b/test/add_target.sh
index c9914ad2..8aef7d6a 100755
--- a/test/add_target.sh
+++ b/test/add_target.sh
@@ -8,6 +8,9 @@ case "${TARGET}" in
"i686-unknown-linux-gnu")
apt-get install -y --no-install-recommends gcc-multilib
;;
+"x86_64-unknown-linux-musl")
+ apt-get install -y --no-install-recommends musl-tools
+ ;;
"arm-unknown-linux-gnueabihf")
dpkg --add-architecture armhf
apt-get update
diff --git a/test/build_openssl.sh b/test/build_openssl.sh
index 9c1cda1e..a5250d11 100755
--- a/test/build_openssl.sh
+++ b/test/build_openssl.sh
@@ -5,8 +5,6 @@ if [ -d "${OPENSSL_DIR}" ]; then
exit 0
fi
-apt-get install -y --no-install-recommends curl
-
case "${LIBRARY}" in
"libressl")
URL1="http://ftp3.usa.openbsd.org/pub/OpenBSD/LibreSSL/libressl-${VERSION}.tar.gz"
@@ -16,8 +14,14 @@ case "${LIBRARY}" in
URL1="https://openssl.org/source/openssl-${VERSION}.tar.gz"
URL2="http://mirrors.ibiblio.org/openssl/source/openssl-${VERSION}.tar.gz"
;;
+"")
+ # using the vendored builds
+ exit 0;
+ ;;
esac
+apt-get install -y --no-install-recommends curl
+
case "${TARGET}" in
"x86_64-unknown-linux-gnu")
OS_COMPILER=linux-x86_64