2008-02-11 19:52:45 +01:00
#!/usr/bin/perl -w
2008-02-08 02:08:25 +01:00
# ***************************************************************************
# * _ _ ____ _
# * Project ___| | | | _ \| |
# * / __| | | | |_) | |
# * | (__| |_| | _ <| |___
# * \___|\___/|_| \_\_____|
# *
2014-01-05 23:37:26 +01:00
# * Copyright (C) 1998 - 2014, Daniel Stenberg, <daniel@haxx.se>, et al.
2008-02-08 02:08:25 +01:00
# *
# * This software is licensed as described in the file COPYING, which
# * you should have received as part of this distribution. The terms
# * are also available at http://curl.haxx.se/docs/copyright.html.
# *
# * You may opt to use, copy, modify, merge, publish, distribute and/or sell
# * copies of the Software, and permit persons to whom the Software is
# * furnished to do so, under the terms of the COPYING file.
# *
# * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
# * KIND, either express or implied.
# *
# ***************************************************************************
2010-02-14 20:40:18 +01:00
# This Perl script creates a fresh ca-bundle.crt file for use with libcurl.
2008-02-08 02:08:25 +01:00
# It downloads certdata.txt from Mozilla's source tree (see URL below),
# then parses certdata.txt and extracts CA Root Certificates into PEM format.
# These are then processed with the OpenSSL commandline tool to produce the
# final ca-bundle.crt file.
2008-02-11 16:00:00 +01:00
# The script is based on the parse-certs script written by Roland Krikava.
2008-02-08 02:08:25 +01:00
# This Perl script works on almost any platform since its only external
2008-02-11 16:00:00 +01:00
# dependency is the OpenSSL commandline tool for optional text listing.
2008-02-08 02:08:25 +01:00
# Hacked by Guenter Knauf.
#
use Getopt::Std ;
use MIME::Base64 ;
2012-03-31 19:48:15 +02:00
use LWP::UserAgent ;
2008-02-11 16:00:00 +01:00
use strict ;
2014-05-08 11:37:45 +02:00
use vars qw( $opt_b $opt_d $opt_f $opt_h $opt_i $opt_l $opt_n $opt_p $opt_q $opt_s $opt_t $opt_u $opt_v $opt_w ) ;
use List::Util ;
use Text::Wrap ;
2014-01-05 23:37:26 +01:00
my % urls = (
'nss' = >
2014-08-13 23:42:53 +02:00
'http://hg.mozilla.org/projects/nss/raw-file/tip/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 23:37:26 +01:00
'central' = >
2014-08-13 23:42:53 +02:00
'http://hg.mozilla.org/mozilla-central/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 23:37:26 +01:00
'aurora' = >
2014-08-13 23:42:53 +02:00
'http://hg.mozilla.org/releases/mozilla-aurora/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 23:37:26 +01:00
'beta' = >
2014-08-13 23:42:53 +02:00
'http://hg.mozilla.org/releases/mozilla-beta/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 23:37:26 +01:00
'release' = >
2014-08-13 23:42:53 +02:00
'http://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 23:37:26 +01:00
) ;
$ opt_d = 'release' ;
2008-02-08 02:08:25 +01:00
# If the OpenSSL commandline is not in search path you can configure it here!
my $ openssl = 'openssl' ;
2014-10-15 12:48:27 +02:00
my $ version = '1.24' ;
2008-02-15 01:26:26 +01:00
2013-04-04 00:02:49 +02:00
$ opt_w = 76 ; # default base64 encoded lines length
2014-05-08 11:37:45 +02:00
# default cert types to include in the output (default is to include CAs which may issue SSL server certs)
my $ default_mozilla_trust_purposes = "SERVER_AUTH" ;
my $ default_mozilla_trust_levels = "TRUSTED_DELEGATOR" ;
$ opt_p = $ default_mozilla_trust_purposes . ":" . $ default_mozilla_trust_levels ;
my @ valid_mozilla_trust_purposes = (
"DIGITAL_SIGNATURE" ,
"NON_REPUDIATION" ,
"KEY_ENCIPHERMENT" ,
"DATA_ENCIPHERMENT" ,
"KEY_AGREEMENT" ,
"KEY_CERT_SIGN" ,
"CRL_SIGN" ,
"SERVER_AUTH" ,
"CLIENT_AUTH" ,
"CODE_SIGNING" ,
"EMAIL_PROTECTION" ,
"IPSEC_END_SYSTEM" ,
"IPSEC_TUNNEL" ,
"IPSEC_USER" ,
"TIME_STAMPING" ,
"STEP_UP_APPROVED"
) ;
my @ valid_mozilla_trust_levels = (
"TRUSTED_DELEGATOR" , # CAs
"NOT_TRUSTED" , # Don't trust these certs.
"MUST_VERIFY_TRUST" , # This explicitly tells us that it ISN'T a CA but is otherwise ok. In other words, this should tell the app to ignore any other sources that claim this is a CA.
"TRUSTED" # This cert is trusted, but only for itself and not for delegates (i.e. it is not a CA).
) ;
my $ default_signature_algorithms = $ opt_s = "MD5" ;
my @ valid_signature_algorithms = (
"MD5" ,
"SHA1" ,
"SHA256" ,
2014-10-15 12:48:27 +02:00
"SHA384" ,
2014-09-11 16:26:26 +02:00
"SHA512"
2014-05-08 11:37:45 +02:00
) ;
2013-04-04 04:01:01 +02:00
$ 0 =~ s@.*(/|\\)@@ ;
2013-04-04 00:21:10 +02:00
$ Getopt:: Std:: STANDARD_HELP_VERSION = 1 ;
2014-05-08 11:37:45 +02:00
getopts ( 'bd:fhilnp:qs:tuvw:' ) ;
2014-01-05 23:37:26 +01:00
2014-01-05 23:53:26 +01:00
if ( ! defined ( $ opt_d ) ) {
# to make plain "-d" use not cause warnings, and actually still work
$ opt_d = 'release' ;
}
2014-01-05 23:37:26 +01:00
# Use predefined URL or else custom URL specified on command line.
my $ url = ( defined ( $ urls { $ opt_d } ) ) ? $ urls { $ opt_d } : $ opt_d ;
2008-02-08 02:08:25 +01:00
2014-09-10 12:14:13 +02:00
my $ curl = `curl -V` ;
2008-02-15 01:26:26 +01:00
if ( $ opt_i ) {
print ( "=" x 78 . "\n" ) ;
print "Script Version : $version\n" ;
print "Perl Version : $]\n" ;
print "Operating System Name : $^O\n" ;
print "Getopt::Std.pm Version : ${Getopt::Std::VERSION}\n" ;
print "MIME::Base64.pm Version : ${MIME::Base64::VERSION}\n" ;
print "LWP::UserAgent.pm Version : ${LWP::UserAgent::VERSION}\n" ;
print "LWP.pm Version : ${LWP::VERSION}\n" ;
print ( "=" x 78 . "\n" ) ;
}
2014-01-05 23:37:26 +01:00
sub WARNING_MESSAGE () {
if ( $ opt_d =~ m/^risk$/i ) { # Long Form Warning and Exit
print "Warning: Use of this script may pose some risk:\n" ;
2014-09-11 16:26:26 +02:00
print "\n" ;
print " 1) Using http is subject to man in the middle attack of certdata content\n" ;
print " 2) Default to 'release', but more recent updates may be found in other trees\n" ;
print " 3) certdata.txt file format may change, lag time to update this script\n" ;
print " 4) Generally unwise to blindly trust CAs without manual review & verification\n" ;
print " 5) Mozilla apps use additional security checks aren't represented in certdata\n" ;
print " 6) Use of this script will make a security engineer grind his teeth and\n" ;
print " swear at you. ;)\n" ;
2014-01-05 23:37:26 +01:00
exit ;
} else { # Short Form Warning
print "Warning: Use of this script may pose some risk, -d risk for more details.\n" ;
}
}
2013-04-04 00:21:10 +02:00
sub HELP_MESSAGE () {
2014-05-08 11:37:45 +02:00
print "Usage:\t${0} [-b] [-d<certdata>] [-f] [-i] [-l] [-n] [-p<purposes:levels>] [-q] [-s<algorithms>] [-t] [-u] [-v] [-w<l>] [<outputfile>]\n" ;
2008-02-10 02:29:24 +01:00
print "\t-b\tbackup an existing version of ca-bundle.crt\n" ;
2014-01-05 23:37:26 +01:00
print "\t-d\tspecify Mozilla tree to pull certdata.txt or custom URL\n" ;
print "\t\t Valid names are:\n" ;
print "\t\t " , join ( ", " , map { ( $ _ =~ m/$opt_d/ ) ? "$_ (default)" : "$_" } sort keys % urls ) , "\n" ;
2013-01-05 23:29:04 +01:00
print "\t-f\tforce rebuild even if certdata.txt is current\n" ;
2008-02-08 02:08:25 +01:00
print "\t-i\tprint version info about used modules\n" ;
2008-02-08 02:58:11 +01:00
print "\t-l\tprint license info about certdata.txt\n" ;
2008-02-08 02:08:25 +01:00
print "\t-n\tno download of certdata.txt (to use existing)\n" ;
2014-05-08 11:37:45 +02:00
print wrap ( "\t" , "\t\t" , "-p\tlist of Mozilla trust purposes and levels for certificates to include in output. Takes the form of a comma separated list of purposes, a colon, and a comma separated list of levels. (default: $default_mozilla_trust_purposes:$default_mozilla_trust_levels)" ) , "\n" ;
print "\t\t Valid purposes are:\n" ;
print wrap ( "\t\t " , "\t\t " , join ( ", " , "ALL" , @ valid_mozilla_trust_purposes ) ) , "\n" ;
print "\t\t Valid levels are:\n" ;
print wrap ( "\t\t " , "\t\t " , join ( ", " , "ALL" , @ valid_mozilla_trust_levels ) ) , "\n" ;
2008-02-11 16:00:00 +01:00
print "\t-q\tbe really quiet (no progress output at all)\n" ;
2014-05-08 11:37:45 +02:00
print wrap ( "\t" , "\t\t" , "-s\tcomma separated list of certificate signatures/hashes to output in plain text mode. (default: $default_signature_algorithms)\n" ) ;
print "\t\t Valid signature algorithms are:\n" ;
print wrap ( "\t\t " , "\t\t " , join ( ", " , "ALL" , @ valid_signature_algorithms ) ) , "\n" ;
2008-02-11 16:00:00 +01:00
print "\t-t\tinclude plain text listing of certificates\n" ;
2008-02-08 02:08:25 +01:00
print "\t-u\tunlink (remove) certdata.txt after processing\n" ;
print "\t-v\tbe verbose and print out processed CAs\n" ;
2013-04-04 00:02:49 +02:00
print "\t-w <l>\twrap base64 output lines after <l> chars (default: ${opt_w})\n" ;
2008-02-08 02:08:25 +01:00
exit ;
}
2013-04-04 00:21:10 +02:00
sub VERSION_MESSAGE () {
2013-04-04 00:23:58 +02:00
print "${0} version ${version} running Perl ${]} on ${^O}\n" ;
2013-04-04 00:21:10 +02:00
}
2014-01-05 23:37:26 +01:00
WARNING_MESSAGE ( ) unless ( $ opt_q || $ url =~ m/^(ht|f)tps:/i ) ;
2013-04-04 00:21:10 +02:00
HELP_MESSAGE ( ) if ( $ opt_h ) ;
2014-05-08 11:37:45 +02:00
sub IS_IN_LIST ($@) {
my $ target = shift ;
return defined ( List::Util:: first { $ target eq $ _ } @ _ ) ;
}
# Parses $param_string as a case insensitive comma separated list with optional whitespace
# validates that only allowed parameters are supplied
sub PARSE_CSV_PARAM ($$@) {
my $ description = shift ;
my $ param_string = shift ;
my @ valid_values = @ _ ;
my @ values = map {
s/^\s+// ; # strip leading spaces
s/\s+$// ; # strip trailing spaces
uc $ _ # return the modified string as upper case
} split ( ',' , $ param_string ) ;
# Find all values which are not in the list of valid values or "ALL"
my @ invalid = grep { ! IS_IN_LIST ( $ _ , "ALL" , @ valid_values ) } @ values ;
if ( scalar ( @ invalid ) > 0 ) {
# Tell the user which parameters were invalid and print the standard help message which will exit
print "Error: Invalid " , $ description , scalar ( @ invalid ) == 1 ? ": " : "s: " , join ( ", " , map { "\"$_\"" } @ invalid ) , "\n" ;
HELP_MESSAGE ( ) ;
}
2014-09-11 16:26:26 +02:00
2014-05-08 11:37:45 +02:00
@ values = @ valid_values if ( IS_IN_LIST ( "ALL" , @ values ) ) ;
2014-09-11 16:26:26 +02:00
2014-05-08 11:37:45 +02:00
return @ values ;
}
2014-08-13 23:42:53 +02:00
sub sha1 {
my ( $ txt ) = @ _ ;
my $ sha1 = `$openssl dgst -sha1 $txt | cut '-d ' -f2` ;
chomp $ sha1 ;
2014-08-13 23:49:01 +02:00
return $ sha1 ;
2014-08-13 23:42:53 +02:00
}
sub oldsha1 {
my ( $ crt ) = @ _ ;
my $ sha1 = "" ;
2014-09-10 12:14:13 +02:00
open ( C , "<$crt" ) || return 0 ;
2014-08-13 23:42:53 +02:00
while ( <C> ) {
chomp ;
if ( $ _ =~ /^\#\# SHA1: (.*)/ ) {
$ sha1 = $ 1 ;
last ;
}
}
close ( C ) ;
return $ sha1 ;
}
2014-05-08 11:37:45 +02:00
if ( $ opt_p !~ m/:/ ) {
print "Error: Mozilla trust identifier list must include both purposes and levels\n" ;
HELP_MESSAGE ( ) ;
}
( my $ included_mozilla_trust_purposes_string , my $ included_mozilla_trust_levels_string ) = split ( ':' , $ opt_p ) ;
my @ included_mozilla_trust_purposes = PARSE_CSV_PARAM ( "trust purpose" , $ included_mozilla_trust_purposes_string , @ valid_mozilla_trust_purposes ) ;
my @ included_mozilla_trust_levels = PARSE_CSV_PARAM ( "trust level" , $ included_mozilla_trust_levels_string , @ valid_mozilla_trust_levels ) ;
my @ included_signature_algorithms = PARSE_CSV_PARAM ( "signature algorithm" , $ opt_s , @ valid_signature_algorithms ) ;
sub SHOULD_OUTPUT_CERT (%) {
my % trust_purposes_by_level = @ _ ;
2014-09-11 16:26:26 +02:00
2014-05-08 11:37:45 +02:00
foreach my $ level ( @ included_mozilla_trust_levels ) {
# for each level we want to output, see if any of our desired purposes are included
return 1 if ( defined ( List::Util:: first { IS_IN_LIST ( $ _ , @ included_mozilla_trust_purposes ) } @ { $ trust_purposes_by_level { $ level } } ) ) ;
}
2014-09-11 16:26:26 +02:00
2014-05-08 11:37:45 +02:00
return 0 ;
}
2008-02-08 03:38:12 +01:00
my $ crt = $ ARGV [ 0 ] || 'ca-bundle.crt' ;
2011-04-14 01:27:39 +02:00
( my $ txt = $ url ) =~ s@(.*/|\?.*)@@g ;
2008-02-11 16:00:00 +01:00
2013-01-05 23:29:04 +01:00
my $ stdout = $ crt eq '-' ;
2011-03-14 06:52:33 +01:00
my $ resp ;
2013-01-05 23:29:04 +01:00
my $ fetched ;
2011-03-14 06:52:33 +01:00
2014-08-13 23:42:53 +02:00
my $ oldsha1 = oldsha1 ( $ crt ) ;
2014-09-10 12:14:13 +02:00
print STDERR "SHA1 of old file: $oldsha1\n" if ( ! $ opt_q ) ;
print STDERR "Downloading '$txt' ...\n" if ( ! $ opt_q ) ;
if ( $ curl && ! $ opt_n ) {
my $ https = $ url ;
$ https =~ s/^http:/https:/ ;
printf "Get certdata over HTTPS with curl!\n" , $ https ;
my $ quiet = $ opt_q ? "-s" : "" ;
my @ out = `curl -w %{response_code} $quiet -O $https` ;
my $ code = 0 ;
if ( @ out ) {
$ code = $ out [ 0 ] ;
}
if ( $ code == 200 ) {
$ fetched = 1 ;
}
else {
print STDERR "Failed downloading HTTPS with curl, trying HTTP with LWP\n"
unless $ opt_q ;
}
}
2014-08-13 23:42:53 +02:00
2014-09-10 12:14:13 +02:00
unless ( $ fetched || ( $ opt_n and - e $ txt ) ) {
2008-02-15 01:26:26 +01:00
my $ ua = new LWP:: UserAgent ( agent = > "$0/$version" ) ;
2011-04-01 14:58:36 +02:00
$ ua - > env_proxy ( ) ;
2011-04-01 14:38:01 +02:00
$ resp = $ ua - > mirror ( $ url , $ txt ) ;
2011-09-04 17:05:49 +02:00
if ( $ resp && $ resp - > code eq '304' ) {
2013-01-05 23:29:04 +01:00
print STDERR "Not modified\n" unless $ opt_q ;
exit 0 if - e $ crt && ! $ opt_f ;
} else {
$ fetched = 1 ;
2011-09-04 17:05:49 +02:00
}
2013-01-05 23:29:04 +01:00
if ( ! $ resp || $ resp - > code !~ /^(?:200|304)$/ ) {
print STDERR "Unable to download latest data: "
. ( $ resp ? $ resp - > code . ' - ' . $ resp - > message : "LWP failed" ) . "\n"
unless $ opt_q ;
exit 1 if - e $ crt || ! - r $ txt ;
2008-02-10 02:29:24 +01:00
}
}
2014-09-10 12:14:13 +02:00
my $ filedate = $ resp ? $ resp - > last_modified : ( stat ( $ txt ) ) [ 9 ] ;
2014-08-13 23:42:53 +02:00
my $ datesrc = "as of" ;
if ( ! $ filedate ) {
# mxr.mozilla.org gave us a time, hg.mozilla.org does not!
$ filedate = time ( ) ;
$ datesrc = "downloaded on" ;
}
# get the hash from the download file
2014-09-11 16:26:26 +02:00
my $ newsha1 = sha1 ( $ txt ) ;
2014-08-13 23:42:53 +02:00
if ( $ oldsha1 eq $ newsha1 ) {
print STDERR "Downloaded file identical to previous run\'s source file. Exiting\n" ;
exit ;
}
print STDERR "SHA1 of new file: $newsha1\n" ;
my $ currentdate = scalar gmtime ( $ filedate ) ;
2013-01-05 23:29:04 +01:00
2008-02-11 16:00:00 +01:00
my $ format = $ opt_t ? "plain text and " : "" ;
2013-01-05 23:29:04 +01:00
if ( $ stdout ) {
open ( CRT , '> -' ) or die "Couldn't open STDOUT: $!\n" ;
} else {
open ( CRT , ">$crt.~" ) or die "Couldn't open $crt.~: $!\n" ;
}
2008-02-08 02:08:25 +01:00
print CRT << EOT ;
##
2014-08-13 23:42:53 +02:00
## Bundle of CA Root Certificates
2008-02-08 02:08:25 +01:00
##
2014-08-13 23:42:53 +02:00
## Certificate data from Mozilla ${datesrc}: ${currentdate}
2008-02-08 02:08:25 +01:00
##
## This is a bundle of X.509 certificates of public Certificate Authorities
## (CA). These were automatically extracted from Mozilla's root certificates
## file (certdata.txt). This file can be found in the mozilla source tree:
2013-04-10 00:20:37 +02:00
## ${url}
2008-02-08 02:08:25 +01:00
##
2008-02-11 16:00:00 +01:00
## It contains the certificates in ${format}PEM format and therefore
2008-02-15 01:26:26 +01:00
## can be directly used with curl / libcurl / php_curl, or with
## an Apache+mod_ssl webserver for SSL client authentication.
2008-02-08 02:08:25 +01:00
## Just configure this file as the SSLCACertificateFile.
##
2014-08-13 23:42:53 +02:00
## Conversion done with mk-ca-bundle.pl verison $version.
## SHA1: $newsha1
##
2008-02-08 02:08:25 +01:00
EOT
2013-01-05 23:29:04 +01:00
print STDERR "Processing '$txt' ...\n" if ( ! $ opt_q ) ;
2008-02-11 16:00:00 +01:00
my $ caname ;
my $ certnum = 0 ;
2011-09-04 17:05:49 +02:00
my $ skipnum = 0 ;
2012-09-04 23:21:15 +02:00
my $ start_of_cert = 0 ;
2013-01-05 23:29:04 +01:00
open ( TXT , "$txt" ) or die "Couldn't open $txt: $!\n" ;
2008-02-08 02:08:25 +01:00
while ( <TXT> ) {
if ( /\*\*\*\*\* BEGIN LICENSE BLOCK \*\*\*\*\*/ ) {
print CRT ;
2008-02-08 02:58:11 +01:00
print if ( $ opt_l ) ;
2008-02-08 02:08:25 +01:00
while ( <TXT> ) {
print CRT ;
2008-02-08 02:58:11 +01:00
print if ( $ opt_l ) ;
2008-02-08 02:08:25 +01:00
last if ( /\*\*\*\*\* END LICENSE BLOCK \*\*\*\*\*/ ) ;
}
}
2008-02-11 16:00:00 +01:00
next if /^#|^\s*$/ ;
2008-02-08 02:08:25 +01:00
chomp ;
2008-02-08 02:58:11 +01:00
if ( /^CVS_ID\s+\"(.*)\"/ ) {
2008-02-08 02:08:25 +01:00
print CRT "# $1\n" ;
}
2012-09-04 23:21:15 +02:00
# this is a match for the start of a certificate
if ( /^CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE/ ) {
$ start_of_cert = 1
}
if ( $ start_of_cert && /^CKA_LABEL UTF8 \"(.*)\"/ ) {
2008-02-11 16:00:00 +01:00
$ caname = $ 1 ;
2008-02-08 02:08:25 +01:00
}
2014-05-08 11:37:45 +02:00
my % trust_purposes_by_level ;
2012-09-04 23:21:15 +02:00
if ( $ start_of_cert && /^CKA_VALUE MULTILINE_OCTAL/ ) {
2008-02-08 02:08:25 +01:00
my $ data ;
while ( <TXT> ) {
last if ( /^END/ ) ;
chomp ;
my @ octets = split ( /\\/ ) ;
shift @ octets ;
for ( @ octets ) {
$ data . = chr ( oct ) ;
}
}
2012-09-04 23:21:15 +02:00
# scan forwards until the trust part
2011-09-04 17:05:49 +02:00
while ( <TXT> ) {
2012-09-04 23:21:15 +02:00
last if ( /^CKA_CLASS CK_OBJECT_CLASS CKO_NSS_TRUST/ ) ;
chomp ;
}
2014-05-08 11:37:45 +02:00
# now scan the trust part to determine how we should trust this cert
2012-09-04 23:21:15 +02:00
while ( <TXT> ) {
last if ( /^#/ ) ;
2014-05-08 11:37:45 +02:00
if ( /^CKA_TRUST_([A-Z_]+)\s+CK_TRUST\s+CKT_NSS_([A-Z_]+)\s*$/ ) {
if ( ! IS_IN_LIST ( $ 1 , @ valid_mozilla_trust_purposes ) ) {
print STDERR "Warning: Unrecognized trust purpose for cert: $caname. Trust purpose: $1. Trust Level: $2\n" if ( ! $ opt_q ) ;
} elsif ( ! IS_IN_LIST ( $ 2 , @ valid_mozilla_trust_levels ) ) {
print STDERR "Warning: Unrecognized trust level for cert: $caname. Trust purpose: $1. Trust Level: $2\n" if ( ! $ opt_q ) ;
} else {
push @ { $ trust_purposes_by_level { $ 2 } } , $ 1 ;
}
2012-09-04 23:21:15 +02:00
}
2008-02-11 16:00:00 +01:00
}
2014-05-08 11:37:45 +02:00
if ( ! SHOULD_OUTPUT_CERT ( % trust_purposes_by_level ) ) {
2011-09-04 17:05:49 +02:00
$ skipnum + + ;
} else {
2013-04-04 00:02:49 +02:00
my $ encoded = MIME::Base64:: encode_base64 ( $ data , '' ) ;
$ encoded =~ s/(.{1,${opt_w}})/$1\n/g ;
2011-09-04 17:05:49 +02:00
my $ pem = "-----BEGIN CERTIFICATE-----\n"
2013-04-04 00:02:49 +02:00
. $ encoded
2011-09-04 17:05:49 +02:00
. "-----END CERTIFICATE-----\n" ;
print CRT "\n$caname\n" ;
2014-05-08 11:37:45 +02:00
my $ maxStringLength = length ( $ caname ) ;
if ( $ opt_t ) {
foreach my $ key ( keys % trust_purposes_by_level ) {
my $ string = $ key . ": " . join ( ", " , @ { $ trust_purposes_by_level { $ key } } ) ;
$ maxStringLength = List::Util:: max ( length ( $ string ) , $ maxStringLength ) ;
print CRT $ string . "\n" ;
}
}
print CRT ( "=" x $ maxStringLength . "\n" ) ;
2011-09-04 17:05:49 +02:00
if ( ! $ opt_t ) {
print CRT $ pem ;
2013-04-10 00:20:37 +02:00
} else {
2014-05-08 11:37:45 +02:00
my $ pipe = "" ;
foreach my $ hash ( @ included_signature_algorithms ) {
$ pipe = "|$openssl x509 -" . $ hash . " -fingerprint -noout -inform PEM" ;
if ( ! $ stdout ) {
$ pipe . = " >> $crt.~" ;
close ( CRT ) or die "Couldn't close $crt.~: $!" ;
}
open ( TMP , $ pipe ) or die "Couldn't open openssl pipe: $!" ;
print TMP $ pem ;
close ( TMP ) or die "Couldn't close openssl pipe: $!" ;
if ( ! $ stdout ) {
open ( CRT , ">>$crt.~" ) or die "Couldn't open $crt.~: $!" ;
}
}
$ pipe = "|$openssl x509 -text -inform PEM" ;
2013-04-10 00:20:37 +02:00
if ( ! $ stdout ) {
$ pipe . = " >> $crt.~" ;
close ( CRT ) or die "Couldn't close $crt.~: $!" ;
}
open ( TMP , $ pipe ) or die "Couldn't open openssl pipe: $!" ;
print TMP $ pem ;
close ( TMP ) or die "Couldn't close openssl pipe: $!" ;
if ( ! $ stdout ) {
open ( CRT , ">>$crt.~" ) or die "Couldn't open $crt.~: $!" ;
}
2011-09-04 17:05:49 +02:00
}
2013-01-05 23:29:04 +01:00
print STDERR "Parsing: $caname\n" if ( $ opt_v ) ;
2011-09-04 17:05:49 +02:00
$ certnum + + ;
2012-09-04 23:21:15 +02:00
$ start_of_cert = 0 ;
2008-02-11 16:00:00 +01:00
}
2008-02-08 02:08:25 +01:00
}
}
2013-01-05 23:29:04 +01:00
close ( TXT ) or die "Couldn't close $txt: $!\n" ;
close ( CRT ) or die "Couldn't close $crt.~: $!\n" ;
unless ( $ stdout ) {
if ( $ opt_b && - e $ crt ) {
my $ bk = 1 ;
while ( - e "$crt.~${bk}~" ) {
$ bk + + ;
}
rename $ crt , "$crt.~${bk}~" or die "Failed to create backup $crt.~$bk}~: $!\n" ;
} elsif ( - e $ crt ) {
unlink ( $ crt ) or die "Failed to remove $crt: $!\n" ;
}
rename "$crt.~" , $ crt or die "Failed to rename $crt.~ to $crt: $!\n" ;
}
2008-02-08 02:08:25 +01:00
unlink $ txt if ( $ opt_u ) ;
2014-05-08 11:37:45 +02:00
print STDERR "Done ($certnum CA certs processed, $skipnum skipped).\n" if ( ! $ opt_q ) ;