2008-02-11 13:52:45 -05:00
#!/usr/bin/perl -w
2008-02-07 20:08:25 -05:00
# ***************************************************************************
# * _ _ ____ _
# * Project ___| | | | _ \| |
# * / __| | | | |_) | |
# * | (__| |_| | _ <| |___
# * \___|\___/|_| \_\_____|
# *
2014-01-05 17:37:26 -05:00
# * Copyright (C) 1998 - 2014, Daniel Stenberg, <daniel@haxx.se>, et al.
2008-02-07 20:08:25 -05:00
# *
# * This software is licensed as described in the file COPYING, which
# * you should have received as part of this distribution. The terms
# * are also available at http://curl.haxx.se/docs/copyright.html.
# *
# * You may opt to use, copy, modify, merge, publish, distribute and/or sell
# * copies of the Software, and permit persons to whom the Software is
# * furnished to do so, under the terms of the COPYING file.
# *
# * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
# * KIND, either express or implied.
# *
# ***************************************************************************
2010-02-14 14:40:18 -05:00
# This Perl script creates a fresh ca-bundle.crt file for use with libcurl.
2008-02-07 20:08:25 -05:00
# It downloads certdata.txt from Mozilla's source tree (see URL below),
# then parses certdata.txt and extracts CA Root Certificates into PEM format.
# These are then processed with the OpenSSL commandline tool to produce the
# final ca-bundle.crt file.
2008-02-11 10:00:00 -05:00
# The script is based on the parse-certs script written by Roland Krikava.
2008-02-07 20:08:25 -05:00
# This Perl script works on almost any platform since its only external
2008-02-11 10:00:00 -05:00
# dependency is the OpenSSL commandline tool for optional text listing.
2008-02-07 20:08:25 -05:00
# Hacked by Guenter Knauf.
#
use Getopt::Std ;
use MIME::Base64 ;
2012-03-31 13:48:15 -04:00
use LWP::UserAgent ;
2008-02-11 10:00:00 -05:00
use strict ;
2014-05-08 05:37:45 -04:00
use vars qw( $opt_b $opt_d $opt_f $opt_h $opt_i $opt_l $opt_n $opt_p $opt_q $opt_s $opt_t $opt_u $opt_v $opt_w ) ;
use List::Util ;
use Text::Wrap ;
2014-10-23 09:18:05 -04:00
my $ MOD_SHA = "Digest::SHA" ;
eval "require $MOD_SHA" ;
if ( $@ ) {
$ MOD_SHA = "Digest::SHA::PurePerl" ;
eval "require $MOD_SHA" ;
}
2014-01-05 17:37:26 -05:00
my % urls = (
'nss' = >
2014-08-13 17:42:53 -04:00
'http://hg.mozilla.org/projects/nss/raw-file/tip/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 17:37:26 -05:00
'central' = >
2014-08-13 17:42:53 -04:00
'http://hg.mozilla.org/mozilla-central/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 17:37:26 -05:00
'aurora' = >
2014-08-13 17:42:53 -04:00
'http://hg.mozilla.org/releases/mozilla-aurora/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 17:37:26 -05:00
'beta' = >
2014-08-13 17:42:53 -04:00
'http://hg.mozilla.org/releases/mozilla-beta/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 17:37:26 -05:00
'release' = >
2014-08-13 17:42:53 -04:00
'http://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
2014-01-05 17:37:26 -05:00
) ;
$ opt_d = 'release' ;
2008-02-07 20:08:25 -05:00
# If the OpenSSL commandline is not in search path you can configure it here!
my $ openssl = 'openssl' ;
2014-10-23 09:18:05 -04:00
my $ version = '1.25' ;
2008-02-14 19:26:26 -05:00
2013-04-03 18:02:49 -04:00
$ opt_w = 76 ; # default base64 encoded lines length
2014-05-08 05:37:45 -04:00
# default cert types to include in the output (default is to include CAs which may issue SSL server certs)
my $ default_mozilla_trust_purposes = "SERVER_AUTH" ;
my $ default_mozilla_trust_levels = "TRUSTED_DELEGATOR" ;
$ opt_p = $ default_mozilla_trust_purposes . ":" . $ default_mozilla_trust_levels ;
my @ valid_mozilla_trust_purposes = (
"DIGITAL_SIGNATURE" ,
"NON_REPUDIATION" ,
"KEY_ENCIPHERMENT" ,
"DATA_ENCIPHERMENT" ,
"KEY_AGREEMENT" ,
"KEY_CERT_SIGN" ,
"CRL_SIGN" ,
"SERVER_AUTH" ,
"CLIENT_AUTH" ,
"CODE_SIGNING" ,
"EMAIL_PROTECTION" ,
"IPSEC_END_SYSTEM" ,
"IPSEC_TUNNEL" ,
"IPSEC_USER" ,
"TIME_STAMPING" ,
"STEP_UP_APPROVED"
) ;
my @ valid_mozilla_trust_levels = (
"TRUSTED_DELEGATOR" , # CAs
"NOT_TRUSTED" , # Don't trust these certs.
"MUST_VERIFY_TRUST" , # This explicitly tells us that it ISN'T a CA but is otherwise ok. In other words, this should tell the app to ignore any other sources that claim this is a CA.
"TRUSTED" # This cert is trusted, but only for itself and not for delegates (i.e. it is not a CA).
) ;
my $ default_signature_algorithms = $ opt_s = "MD5" ;
my @ valid_signature_algorithms = (
"MD5" ,
"SHA1" ,
"SHA256" ,
2014-10-15 06:48:27 -04:00
"SHA384" ,
2014-09-11 10:26:26 -04:00
"SHA512"
2014-05-08 05:37:45 -04:00
) ;
2013-04-03 22:01:01 -04:00
$ 0 =~ s@.*(/|\\)@@ ;
2013-04-03 18:21:10 -04:00
$ Getopt:: Std:: STANDARD_HELP_VERSION = 1 ;
2014-05-08 05:37:45 -04:00
getopts ( 'bd:fhilnp:qs:tuvw:' ) ;
2014-01-05 17:37:26 -05:00
2014-01-05 17:53:26 -05:00
if ( ! defined ( $ opt_d ) ) {
# to make plain "-d" use not cause warnings, and actually still work
$ opt_d = 'release' ;
}
2014-01-05 17:37:26 -05:00
# Use predefined URL or else custom URL specified on command line.
my $ url = ( defined ( $ urls { $ opt_d } ) ) ? $ urls { $ opt_d } : $ opt_d ;
2008-02-07 20:08:25 -05:00
2014-10-26 14:07:35 -04:00
my $ curl = `curl -V` ;
2014-09-10 06:14:13 -04:00
2008-02-14 19:26:26 -05:00
if ( $ opt_i ) {
print ( "=" x 78 . "\n" ) ;
2014-10-23 09:18:05 -04:00
print "Script Version : $version\n" ;
print "Perl Version : $]\n" ;
print "Operating System Name : $^O\n" ;
print "Getopt::Std.pm Version : ${Getopt::Std::VERSION}\n" ;
print "MIME::Base64.pm Version : ${MIME::Base64::VERSION}\n" ;
print "LWP::UserAgent.pm Version : ${LWP::UserAgent::VERSION}\n" ;
print "LWP.pm Version : ${LWP::VERSION}\n" ;
print "Digest::SHA.pm Version : ${Digest::SHA::VERSION}\n" if ( $ Digest:: SHA:: VERSION ) ;
print "Digest::SHA::PurePerl.pm Version : ${Digest::SHA::PurePerl::VERSION}\n" if ( $ Digest:: SHA:: PurePerl:: VERSION ) ;
2008-02-14 19:26:26 -05:00
print ( "=" x 78 . "\n" ) ;
}
2014-10-26 14:07:35 -04:00
sub warning_message () {
2014-01-05 17:37:26 -05:00
if ( $ opt_d =~ m/^risk$/i ) { # Long Form Warning and Exit
print "Warning: Use of this script may pose some risk:\n" ;
2014-09-11 10:26:26 -04:00
print "\n" ;
print " 1) Using http is subject to man in the middle attack of certdata content\n" ;
print " 2) Default to 'release', but more recent updates may be found in other trees\n" ;
print " 3) certdata.txt file format may change, lag time to update this script\n" ;
print " 4) Generally unwise to blindly trust CAs without manual review & verification\n" ;
print " 5) Mozilla apps use additional security checks aren't represented in certdata\n" ;
print " 6) Use of this script will make a security engineer grind his teeth and\n" ;
print " swear at you. ;)\n" ;
2014-01-05 17:37:26 -05:00
exit ;
} else { # Short Form Warning
print "Warning: Use of this script may pose some risk, -d risk for more details.\n" ;
}
}
2013-04-03 18:21:10 -04:00
sub HELP_MESSAGE () {
2014-05-08 05:37:45 -04:00
print "Usage:\t${0} [-b] [-d<certdata>] [-f] [-i] [-l] [-n] [-p<purposes:levels>] [-q] [-s<algorithms>] [-t] [-u] [-v] [-w<l>] [<outputfile>]\n" ;
2008-02-09 20:29:24 -05:00
print "\t-b\tbackup an existing version of ca-bundle.crt\n" ;
2014-01-05 17:37:26 -05:00
print "\t-d\tspecify Mozilla tree to pull certdata.txt or custom URL\n" ;
print "\t\t Valid names are:\n" ;
print "\t\t " , join ( ", " , map { ( $ _ =~ m/$opt_d/ ) ? "$_ (default)" : "$_" } sort keys % urls ) , "\n" ;
2013-01-05 17:29:04 -05:00
print "\t-f\tforce rebuild even if certdata.txt is current\n" ;
2008-02-07 20:08:25 -05:00
print "\t-i\tprint version info about used modules\n" ;
2008-02-07 20:58:11 -05:00
print "\t-l\tprint license info about certdata.txt\n" ;
2008-02-07 20:08:25 -05:00
print "\t-n\tno download of certdata.txt (to use existing)\n" ;
2014-05-08 05:37:45 -04:00
print wrap ( "\t" , "\t\t" , "-p\tlist of Mozilla trust purposes and levels for certificates to include in output. Takes the form of a comma separated list of purposes, a colon, and a comma separated list of levels. (default: $default_mozilla_trust_purposes:$default_mozilla_trust_levels)" ) , "\n" ;
print "\t\t Valid purposes are:\n" ;
print wrap ( "\t\t " , "\t\t " , join ( ", " , "ALL" , @ valid_mozilla_trust_purposes ) ) , "\n" ;
print "\t\t Valid levels are:\n" ;
print wrap ( "\t\t " , "\t\t " , join ( ", " , "ALL" , @ valid_mozilla_trust_levels ) ) , "\n" ;
2008-02-11 10:00:00 -05:00
print "\t-q\tbe really quiet (no progress output at all)\n" ;
2014-05-08 05:37:45 -04:00
print wrap ( "\t" , "\t\t" , "-s\tcomma separated list of certificate signatures/hashes to output in plain text mode. (default: $default_signature_algorithms)\n" ) ;
print "\t\t Valid signature algorithms are:\n" ;
print wrap ( "\t\t " , "\t\t " , join ( ", " , "ALL" , @ valid_signature_algorithms ) ) , "\n" ;
2008-02-11 10:00:00 -05:00
print "\t-t\tinclude plain text listing of certificates\n" ;
2008-02-07 20:08:25 -05:00
print "\t-u\tunlink (remove) certdata.txt after processing\n" ;
print "\t-v\tbe verbose and print out processed CAs\n" ;
2013-04-03 18:02:49 -04:00
print "\t-w <l>\twrap base64 output lines after <l> chars (default: ${opt_w})\n" ;
2008-02-07 20:08:25 -05:00
exit ;
}
2013-04-03 18:21:10 -04:00
sub VERSION_MESSAGE () {
2013-04-03 18:23:58 -04:00
print "${0} version ${version} running Perl ${]} on ${^O}\n" ;
2013-04-03 18:21:10 -04:00
}
2014-10-26 14:07:35 -04:00
warning_message ( ) unless ( $ opt_q || $ url =~ m/^(ht|f)tps:/i ) ;
2013-04-03 18:21:10 -04:00
HELP_MESSAGE ( ) if ( $ opt_h ) ;
2014-10-26 14:07:35 -04:00
sub is_in_list ($@) {
2014-05-08 05:37:45 -04:00
my $ target = shift ;
return defined ( List::Util:: first { $ target eq $ _ } @ _ ) ;
}
# Parses $param_string as a case insensitive comma separated list with optional whitespace
# validates that only allowed parameters are supplied
2014-10-26 14:07:35 -04:00
sub parse_csv_param ($$@) {
2014-05-08 05:37:45 -04:00
my $ description = shift ;
my $ param_string = shift ;
my @ valid_values = @ _ ;
my @ values = map {
s/^\s+// ; # strip leading spaces
s/\s+$// ; # strip trailing spaces
uc $ _ # return the modified string as upper case
} split ( ',' , $ param_string ) ;
# Find all values which are not in the list of valid values or "ALL"
2014-10-26 14:07:35 -04:00
my @ invalid = grep { ! is_in_list ( $ _ , "ALL" , @ valid_values ) } @ values ;
2014-05-08 05:37:45 -04:00
if ( scalar ( @ invalid ) > 0 ) {
# Tell the user which parameters were invalid and print the standard help message which will exit
print "Error: Invalid " , $ description , scalar ( @ invalid ) == 1 ? ": " : "s: " , join ( ", " , map { "\"$_\"" } @ invalid ) , "\n" ;
HELP_MESSAGE ( ) ;
}
2014-09-11 10:26:26 -04:00
2014-10-26 14:07:35 -04:00
@ values = @ valid_values if ( is_in_list ( "ALL" , @ values ) ) ;
2014-09-11 10:26:26 -04:00
2014-05-08 05:37:45 -04:00
return @ values ;
}
2014-08-13 17:42:53 -04:00
sub sha1 {
2014-10-23 09:18:05 -04:00
my $ result ;
if ( $ Digest:: SHA:: VERSION || $ Digest:: SHA:: PurePerl:: VERSION ) {
open ( FILE , $ _ [ 0 ] ) or die "Can't open '$_[0]': $!" ;
binmode ( FILE ) ;
$ result = $ MOD_SHA - > new ( 1 ) - > addfile ( * FILE ) - > hexdigest ;
close ( FILE ) ;
} else {
# Use OpenSSL command if Perl Digest::SHA modules not available
$ result = ( split ( / |\r|\n/ , `$openssl dgst -sha1 $_[0]` ) ) [ 1 ] ;
}
return $ result ;
2014-08-13 17:42:53 -04:00
}
2014-10-23 09:18:05 -04:00
2014-08-13 17:42:53 -04:00
sub oldsha1 {
2014-10-23 10:27:40 -04:00
my $ sha1 = "" ;
open ( C , "<$_[0]" ) || return 0 ;
while ( <C> ) {
chomp ;
if ( $ _ =~ /^\#\# SHA1: (.*)/ ) {
$ sha1 = $ 1 ;
last ;
2014-08-13 17:42:53 -04:00
}
2014-10-23 10:27:40 -04:00
}
close ( C ) ;
return $ sha1 ;
2014-08-13 17:42:53 -04:00
}
2014-05-08 05:37:45 -04:00
if ( $ opt_p !~ m/:/ ) {
print "Error: Mozilla trust identifier list must include both purposes and levels\n" ;
HELP_MESSAGE ( ) ;
}
( my $ included_mozilla_trust_purposes_string , my $ included_mozilla_trust_levels_string ) = split ( ':' , $ opt_p ) ;
2014-10-26 14:07:35 -04:00
my @ included_mozilla_trust_purposes = parse_csv_param ( "trust purpose" , $ included_mozilla_trust_purposes_string , @ valid_mozilla_trust_purposes ) ;
my @ included_mozilla_trust_levels = parse_csv_param ( "trust level" , $ included_mozilla_trust_levels_string , @ valid_mozilla_trust_levels ) ;
2014-05-08 05:37:45 -04:00
2014-10-26 14:07:35 -04:00
my @ included_signature_algorithms = parse_csv_param ( "signature algorithm" , $ opt_s , @ valid_signature_algorithms ) ;
2014-05-08 05:37:45 -04:00
2014-10-26 14:07:35 -04:00
sub should_output_cert (%) {
2014-05-08 05:37:45 -04:00
my % trust_purposes_by_level = @ _ ;
2014-09-11 10:26:26 -04:00
2014-05-08 05:37:45 -04:00
foreach my $ level ( @ included_mozilla_trust_levels ) {
# for each level we want to output, see if any of our desired purposes are included
2014-10-26 14:07:35 -04:00
return 1 if ( defined ( List::Util:: first { is_in_list ( $ _ , @ included_mozilla_trust_purposes ) } @ { $ trust_purposes_by_level { $ level } } ) ) ;
2014-05-08 05:37:45 -04:00
}
2014-09-11 10:26:26 -04:00
2014-05-08 05:37:45 -04:00
return 0 ;
}
2008-02-07 21:38:12 -05:00
my $ crt = $ ARGV [ 0 ] || 'ca-bundle.crt' ;
2011-04-13 19:27:39 -04:00
( my $ txt = $ url ) =~ s@(.*/|\?.*)@@g ;
2008-02-11 10:00:00 -05:00
2013-01-05 17:29:04 -05:00
my $ stdout = $ crt eq '-' ;
2011-03-14 01:52:33 -04:00
my $ resp ;
2013-01-05 17:29:04 -05:00
my $ fetched ;
2011-03-14 01:52:33 -04:00
2014-10-23 10:27:40 -04:00
my $ oldsha1 = oldsha1 ( $ crt ) ;
2014-08-13 17:42:53 -04:00
2014-09-10 06:14:13 -04:00
print STDERR "SHA1 of old file: $oldsha1\n" if ( ! $ opt_q ) ;
print STDERR "Downloading '$txt' ...\n" if ( ! $ opt_q ) ;
if ( $ curl && ! $ opt_n ) {
2014-10-23 10:27:40 -04:00
my $ https = $ url ;
$ https =~ s/^http:/https:/ ;
print STDERR "Get certdata over HTTPS with curl!\n" if ( ! $ opt_q ) ;
my $ quiet = $ opt_q ? "-s" : "" ;
my @ out = `curl -w %{response_code} $quiet -O $https` ;
if ( @ out && $ out [ 0 ] == 200 ) {
$ fetched = 1 ;
} else {
print STDERR "Failed downloading HTTPS with curl, trying HTTP with LWP\n" if ( ! $ opt_q ) ;
}
2014-09-10 06:14:13 -04:00
}
2014-08-13 17:42:53 -04:00
2014-09-10 06:14:13 -04:00
unless ( $ fetched || ( $ opt_n and - e $ txt ) ) {
2008-02-14 19:26:26 -05:00
my $ ua = new LWP:: UserAgent ( agent = > "$0/$version" ) ;
2011-04-01 08:58:36 -04:00
$ ua - > env_proxy ( ) ;
2011-04-01 08:38:01 -04:00
$ resp = $ ua - > mirror ( $ url , $ txt ) ;
2011-09-04 11:05:49 -04:00
if ( $ resp && $ resp - > code eq '304' ) {
2013-01-05 17:29:04 -05:00
print STDERR "Not modified\n" unless $ opt_q ;
exit 0 if - e $ crt && ! $ opt_f ;
} else {
$ fetched = 1 ;
2011-09-04 11:05:49 -04:00
}
2013-01-05 17:29:04 -05:00
if ( ! $ resp || $ resp - > code !~ /^(?:200|304)$/ ) {
print STDERR "Unable to download latest data: "
. ( $ resp ? $ resp - > code . ' - ' . $ resp - > message : "LWP failed" ) . "\n"
unless $ opt_q ;
exit 1 if - e $ crt || ! - r $ txt ;
2008-02-09 20:29:24 -05:00
}
}
2014-09-10 06:14:13 -04:00
my $ filedate = $ resp ? $ resp - > last_modified : ( stat ( $ txt ) ) [ 9 ] ;
2014-08-13 17:42:53 -04:00
my $ datesrc = "as of" ;
if ( ! $ filedate ) {
# mxr.mozilla.org gave us a time, hg.mozilla.org does not!
$ filedate = time ( ) ;
$ datesrc = "downloaded on" ;
}
# get the hash from the download file
2014-09-11 10:26:26 -04:00
my $ newsha1 = sha1 ( $ txt ) ;
2014-08-13 17:42:53 -04:00
if ( $ oldsha1 eq $ newsha1 ) {
print STDERR "Downloaded file identical to previous run\'s source file. Exiting\n" ;
exit ;
}
print STDERR "SHA1 of new file: $newsha1\n" ;
my $ currentdate = scalar gmtime ( $ filedate ) ;
2013-01-05 17:29:04 -05:00
2008-02-11 10:00:00 -05:00
my $ format = $ opt_t ? "plain text and " : "" ;
2013-01-05 17:29:04 -05:00
if ( $ stdout ) {
open ( CRT , '> -' ) or die "Couldn't open STDOUT: $!\n" ;
} else {
open ( CRT , ">$crt.~" ) or die "Couldn't open $crt.~: $!\n" ;
}
2008-02-07 20:08:25 -05:00
print CRT << EOT ;
##
2014-08-13 17:42:53 -04:00
## Bundle of CA Root Certificates
2008-02-07 20:08:25 -05:00
##
2014-08-13 17:42:53 -04:00
## Certificate data from Mozilla ${datesrc}: ${currentdate}
2008-02-07 20:08:25 -05:00
##
## This is a bundle of X.509 certificates of public Certificate Authorities
## (CA). These were automatically extracted from Mozilla's root certificates
## file (certdata.txt). This file can be found in the mozilla source tree:
2013-04-09 18:20:37 -04:00
## ${url}
2008-02-07 20:08:25 -05:00
##
2008-02-11 10:00:00 -05:00
## It contains the certificates in ${format}PEM format and therefore
2008-02-14 19:26:26 -05:00
## can be directly used with curl / libcurl / php_curl, or with
## an Apache+mod_ssl webserver for SSL client authentication.
2008-02-07 20:08:25 -05:00
## Just configure this file as the SSLCACertificateFile.
##
2014-10-28 10:20:42 -04:00
## Conversion done with mk-ca-bundle.pl version $version.
2014-08-13 17:42:53 -04:00
## SHA1: $newsha1
##
2008-02-07 20:08:25 -05:00
EOT
2013-01-05 17:29:04 -05:00
print STDERR "Processing '$txt' ...\n" if ( ! $ opt_q ) ;
2008-02-11 10:00:00 -05:00
my $ caname ;
my $ certnum = 0 ;
2011-09-04 11:05:49 -04:00
my $ skipnum = 0 ;
2012-09-04 17:21:15 -04:00
my $ start_of_cert = 0 ;
2013-01-05 17:29:04 -05:00
open ( TXT , "$txt" ) or die "Couldn't open $txt: $!\n" ;
2008-02-07 20:08:25 -05:00
while ( <TXT> ) {
if ( /\*\*\*\*\* BEGIN LICENSE BLOCK \*\*\*\*\*/ ) {
print CRT ;
2008-02-07 20:58:11 -05:00
print if ( $ opt_l ) ;
2008-02-07 20:08:25 -05:00
while ( <TXT> ) {
print CRT ;
2008-02-07 20:58:11 -05:00
print if ( $ opt_l ) ;
2008-02-07 20:08:25 -05:00
last if ( /\*\*\*\*\* END LICENSE BLOCK \*\*\*\*\*/ ) ;
}
}
2008-02-11 10:00:00 -05:00
next if /^#|^\s*$/ ;
2008-02-07 20:08:25 -05:00
chomp ;
2008-02-07 20:58:11 -05:00
if ( /^CVS_ID\s+\"(.*)\"/ ) {
2008-02-07 20:08:25 -05:00
print CRT "# $1\n" ;
}
2012-09-04 17:21:15 -04:00
# this is a match for the start of a certificate
if ( /^CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE/ ) {
$ start_of_cert = 1
}
if ( $ start_of_cert && /^CKA_LABEL UTF8 \"(.*)\"/ ) {
2008-02-11 10:00:00 -05:00
$ caname = $ 1 ;
2008-02-07 20:08:25 -05:00
}
2014-05-08 05:37:45 -04:00
my % trust_purposes_by_level ;
2012-09-04 17:21:15 -04:00
if ( $ start_of_cert && /^CKA_VALUE MULTILINE_OCTAL/ ) {
2008-02-07 20:08:25 -05:00
my $ data ;
while ( <TXT> ) {
last if ( /^END/ ) ;
chomp ;
my @ octets = split ( /\\/ ) ;
shift @ octets ;
for ( @ octets ) {
$ data . = chr ( oct ) ;
}
}
2012-09-04 17:21:15 -04:00
# scan forwards until the trust part
2011-09-04 11:05:49 -04:00
while ( <TXT> ) {
2012-09-04 17:21:15 -04:00
last if ( /^CKA_CLASS CK_OBJECT_CLASS CKO_NSS_TRUST/ ) ;
chomp ;
}
2014-05-08 05:37:45 -04:00
# now scan the trust part to determine how we should trust this cert
2012-09-04 17:21:15 -04:00
while ( <TXT> ) {
last if ( /^#/ ) ;
2014-05-08 05:37:45 -04:00
if ( /^CKA_TRUST_([A-Z_]+)\s+CK_TRUST\s+CKT_NSS_([A-Z_]+)\s*$/ ) {
2014-10-26 14:07:35 -04:00
if ( ! is_in_list ( $ 1 , @ valid_mozilla_trust_purposes ) ) {
2014-05-08 05:37:45 -04:00
print STDERR "Warning: Unrecognized trust purpose for cert: $caname. Trust purpose: $1. Trust Level: $2\n" if ( ! $ opt_q ) ;
2014-10-26 14:07:35 -04:00
} elsif ( ! is_in_list ( $ 2 , @ valid_mozilla_trust_levels ) ) {
2014-05-08 05:37:45 -04:00
print STDERR "Warning: Unrecognized trust level for cert: $caname. Trust purpose: $1. Trust Level: $2\n" if ( ! $ opt_q ) ;
} else {
push @ { $ trust_purposes_by_level { $ 2 } } , $ 1 ;
}
2012-09-04 17:21:15 -04:00
}
2008-02-11 10:00:00 -05:00
}
2014-05-08 05:37:45 -04:00
2014-10-26 14:07:35 -04:00
if ( ! should_output_cert ( % trust_purposes_by_level ) ) {
2011-09-04 11:05:49 -04:00
$ skipnum + + ;
} else {
2013-04-03 18:02:49 -04:00
my $ encoded = MIME::Base64:: encode_base64 ( $ data , '' ) ;
$ encoded =~ s/(.{1,${opt_w}})/$1\n/g ;
2011-09-04 11:05:49 -04:00
my $ pem = "-----BEGIN CERTIFICATE-----\n"
2013-04-03 18:02:49 -04:00
. $ encoded
2011-09-04 11:05:49 -04:00
. "-----END CERTIFICATE-----\n" ;
print CRT "\n$caname\n" ;
2014-05-08 05:37:45 -04:00
my $ maxStringLength = length ( $ caname ) ;
if ( $ opt_t ) {
foreach my $ key ( keys % trust_purposes_by_level ) {
my $ string = $ key . ": " . join ( ", " , @ { $ trust_purposes_by_level { $ key } } ) ;
$ maxStringLength = List::Util:: max ( length ( $ string ) , $ maxStringLength ) ;
print CRT $ string . "\n" ;
}
}
print CRT ( "=" x $ maxStringLength . "\n" ) ;
2011-09-04 11:05:49 -04:00
if ( ! $ opt_t ) {
print CRT $ pem ;
2013-04-09 18:20:37 -04:00
} else {
2014-05-08 05:37:45 -04:00
my $ pipe = "" ;
foreach my $ hash ( @ included_signature_algorithms ) {
$ pipe = "|$openssl x509 -" . $ hash . " -fingerprint -noout -inform PEM" ;
if ( ! $ stdout ) {
$ pipe . = " >> $crt.~" ;
close ( CRT ) or die "Couldn't close $crt.~: $!" ;
}
open ( TMP , $ pipe ) or die "Couldn't open openssl pipe: $!" ;
print TMP $ pem ;
close ( TMP ) or die "Couldn't close openssl pipe: $!" ;
if ( ! $ stdout ) {
open ( CRT , ">>$crt.~" ) or die "Couldn't open $crt.~: $!" ;
}
}
$ pipe = "|$openssl x509 -text -inform PEM" ;
2013-04-09 18:20:37 -04:00
if ( ! $ stdout ) {
$ pipe . = " >> $crt.~" ;
close ( CRT ) or die "Couldn't close $crt.~: $!" ;
}
open ( TMP , $ pipe ) or die "Couldn't open openssl pipe: $!" ;
print TMP $ pem ;
close ( TMP ) or die "Couldn't close openssl pipe: $!" ;
if ( ! $ stdout ) {
open ( CRT , ">>$crt.~" ) or die "Couldn't open $crt.~: $!" ;
}
2011-09-04 11:05:49 -04:00
}
2013-01-05 17:29:04 -05:00
print STDERR "Parsing: $caname\n" if ( $ opt_v ) ;
2011-09-04 11:05:49 -04:00
$ certnum + + ;
2012-09-04 17:21:15 -04:00
$ start_of_cert = 0 ;
2008-02-11 10:00:00 -05:00
}
2008-02-07 20:08:25 -05:00
}
}
2013-01-05 17:29:04 -05:00
close ( TXT ) or die "Couldn't close $txt: $!\n" ;
close ( CRT ) or die "Couldn't close $crt.~: $!\n" ;
unless ( $ stdout ) {
if ( $ opt_b && - e $ crt ) {
my $ bk = 1 ;
while ( - e "$crt.~${bk}~" ) {
$ bk + + ;
}
rename $ crt , "$crt.~${bk}~" or die "Failed to create backup $crt.~$bk}~: $!\n" ;
} elsif ( - e $ crt ) {
unlink ( $ crt ) or die "Failed to remove $crt: $!\n" ;
}
rename "$crt.~" , $ crt or die "Failed to rename $crt.~ to $crt: $!\n" ;
}
2008-02-07 20:08:25 -05:00
unlink $ txt if ( $ opt_u ) ;
2014-05-08 05:37:45 -04:00
print STDERR "Done ($certnum CA certs processed, $skipnum skipped).\n" if ( ! $ opt_q ) ;