1
- # !/usr/bin/perl -w
1
+ # !/usr/bin/env perl
2
2
# ***************************************************************************
3
3
# * _ _ ____ _
4
4
# * Project ___| | | | _ \| |
5
5
# * / __| | | | |_) | |
6
6
# * | (__| |_| | _ <| |___
7
7
# * \___|\___/|_| \_\_____|
8
8
# *
9
- # * Copyright (C) 1998 - 2016 , Daniel Stenberg, <[email protected] >, et al.
9
+ # * Copyright (C) 1998 - 2021 , Daniel Stenberg, <[email protected] >, et al.
10
10
# *
11
11
# * This software is licensed as described in the file COPYING, which
12
12
# * you should have received as part of this distribution. The terms
13
- # * are also available at https://curl.haxx. se/docs/copyright.html.
13
+ # * are also available at https://curl.se/docs/copyright.html.
14
14
# *
15
15
# * You may opt to use, copy, modify, merge, publish, distribute and/or sell
16
16
# * copies of the Software, and permit persons to whom the Software is
34
34
use Getopt::Std;
35
35
use MIME::Base64;
36
36
use strict;
37
+ use warnings;
37
38
use vars qw( $opt_b $opt_d $opt_f $opt_h $opt_i $opt_k $opt_l $opt_m $opt_n $opt_p $opt_q $opt_s $opt_t $opt_u $opt_v $opt_w) ;
38
39
use List::Util;
39
40
use Text::Wrap;
41
+ use Time::Local;
40
42
my $MOD_SHA = " Digest::SHA" ;
41
43
eval " require $MOD_SHA " ;
42
44
if ($@ ) {
47
49
48
50
my %urls = (
49
51
' nss' =>
50
- ' https://hg.mozilla.org/projects/nss/raw-file/tip /lib/ckfw/builtins/certdata.txt' ,
52
+ ' https://hg.mozilla.org/projects/nss/raw-file/default /lib/ckfw/builtins/certdata.txt' ,
51
53
' central' =>
52
54
' https://hg.mozilla.org/mozilla-central/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
53
- ' aurora' =>
54
- ' https://hg.mozilla.org/releases/mozilla-aurora/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
55
55
' beta' =>
56
56
' https://hg.mozilla.org/releases/mozilla-beta/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt' ,
57
57
' release' =>
63
63
# If the OpenSSL commandline is not in search path you can configure it here!
64
64
my $openssl = ' openssl' ;
65
65
66
- my $version = ' 1.27 ' ;
66
+ my $version = ' 1.28 ' ;
67
67
68
68
$opt_w = 76; # default base64 encoded lines length
69
69
137
137
print " Perl Version : $] \n " ;
138
138
print " Operating System Name : $^O\n " ;
139
139
print " Getopt::Std.pm Version : ${Getopt::Std::VERSION} \n " ;
140
+ print " Encode::Encoding.pm Version : ${Encode::Encoding::VERSION} \n " ;
140
141
print " MIME::Base64.pm Version : ${MIME::Base64::VERSION} \n " ;
141
142
print " LWP::UserAgent.pm Version : ${LWP::UserAgent::VERSION} \n " if ($LWP::UserAgent::VERSION );
142
143
print " LWP.pm Version : ${LWP::VERSION} \n " if ($LWP::VERSION );
377
378
378
379
if (!$opt_f && $oldhash eq $newhash ) {
379
380
report " Downloaded file identical to previous run\' s source file. Exiting" ;
381
+ if ($opt_u && -e $txt && !unlink ($txt )) {
382
+ report " Failed to remove $txt : $! \n " ;
383
+ }
380
384
exit ;
381
385
}
382
386
@@ -407,11 +411,16 @@ (%)
407
411
* This file is (mostly) automatically generated.
408
412
*
409
413
* Conversion done with mk-ca-bundle.pl version $version as available in at
410
- * github.com/SerialKeyManager/SKM-Client-API-CPP
411
- * SHA256: $newhash
414
+ * https://github.com/cryptolens/cryptolens-cpp
415
+ *
416
+ * SHA256 of downloaded file: $newhash
412
417
*/
413
418
414
- namespace serialkeymanager_com {
419
+ namespace cryptolens_io {
420
+
421
+ namespace v20190401 {
422
+
423
+ namespace cacerts {
415
424
416
425
std::vector<std::string> pems {
417
426
EOT
422
431
my $skipnum = 0;
423
432
my $start_of_cert = 0;
424
433
my @precert ;
434
+ my $cka_value ;
435
+ my $valid = 1;
425
436
426
437
open (TXT," $txt " ) or die " Couldn't open $txt : $! \n " ;
427
438
while (<TXT>) {
436
447
}
437
448
elsif (/ ^# (Issuer|Serial Number|Subject|Not Valid Before|Not Valid After |Fingerprint \( MD5\) |Fingerprint \( SHA1\) ):/ ) {
438
449
push @precert , $_ ;
450
+ $valid = 1;
439
451
next ;
440
452
}
441
453
elsif (/ ^#|^\s *$ / ) {
444
456
}
445
457
chomp ;
446
458
459
+ # Example:
460
+ # CKA_NSS_SERVER_DISTRUST_AFTER MULTILINE_OCTAL
461
+ # \062\060\060\066\061\067\060\060\060\060\060\060\132
462
+ # END
463
+
464
+ if (/ ^CKA_NSS_SERVER_DISTRUST_AFTER (CK_BBOOL CK_FALSE|MULTILINE_OCTAL)/ ) {
465
+ if ($1 eq " MULTILINE_OCTAL" ) {
466
+ my @timestamp ;
467
+ while (<TXT>) {
468
+ last if (/ ^END/ );
469
+ chomp ;
470
+ my @octets = split (/ \\ / );
471
+ shift @octets ;
472
+ for (@octets ) {
473
+ push @timestamp , chr (oct );
474
+ }
475
+ }
476
+ # A trailing Z in the timestamp signifies UTC
477
+ if ($timestamp [12] ne " Z" ) {
478
+ report " distrust date stamp is not using UTC" ;
479
+ }
480
+ # Example date: 200617000000Z
481
+ # Means 2020-06-17 00:00:00 UTC
482
+ my $distrustat =
483
+ timegm($timestamp [10] . $timestamp [11], # second
484
+ $timestamp [8] . $timestamp [9], # minute
485
+ $timestamp [6] . $timestamp [7], # hour
486
+ $timestamp [4] . $timestamp [5], # day
487
+ ($timestamp [2] . $timestamp [3]) - 1, # month
488
+ " 20" . $timestamp [0] . $timestamp [1]); # year
489
+ if (time >= $distrustat ) {
490
+ # not trusted anymore
491
+ $skipnum ++;
492
+ report " Skipping: $caname is not trusted anymore" if ($opt_v );
493
+ $valid = 0;
494
+ }
495
+ else {
496
+ # still trusted
497
+ }
498
+ }
499
+ next ;
500
+ }
501
+
447
502
# this is a match for the start of a certificate
448
503
if (/ ^CKA_CLASS CK_OBJECT_CLASS CKO_CERTIFICATE/ ) {
449
504
$start_of_cert = 1
@@ -453,21 +508,18 @@ (%)
453
508
}
454
509
my %trust_purposes_by_level ;
455
510
if ($start_of_cert && / ^CKA_VALUE MULTILINE_OCTAL/ ) {
456
- my $data ;
511
+ $cka_value = " " ;
457
512
while (<TXT>) {
458
513
last if (/ ^END/ );
459
514
chomp ;
460
515
my @octets = split (/ \\ / );
461
516
shift @octets ;
462
517
for (@octets ) {
463
- $data .= chr (oct );
518
+ $cka_value .= chr (oct );
464
519
}
465
520
}
466
- # scan forwards until the trust part
467
- while (<TXT>) {
468
- last if (/ ^CKA_CLASS CK_OBJECT_CLASS CKO_NSS_TRUST/ );
469
- chomp ;
470
- }
521
+ }
522
+ if (/ ^CKA_CLASS CK_OBJECT_CLASS CKO_NSS_TRUST/ && $valid ) {
471
523
# now scan the trust part to determine how we should trust this cert
472
524
while (<TXT>) {
473
525
last if (/ ^#/ );
484
536
485
537
if ( !should_output_cert(%trust_purposes_by_level ) ) {
486
538
$skipnum ++;
539
+ report " Skipping: $caname " if ($opt_v );
487
540
} else {
541
+ my $data = $cka_value ;
542
+ $cka_value = " " ;
543
+
544
+ if (!length ($data )) {
545
+ # if empty, skip
546
+ next ;
547
+ }
488
548
my $encoded = MIME::Base64::encode_base64($data , ' ' );
489
549
$encoded =~ s / (.{1,${opt_w}})/ $1 \n / g ;
490
550
my $skm_encoded = $encoded ;
496
556
print CRT " \n , std::string {" ;
497
557
print CRT " \n \" $caname \\ n\"\n " ;
498
558
print CRT @precert if ($opt_m );
499
- my $maxStringLength = length (decode(' UTF-8' , $caname , Encode::FB_CROAK));
559
+ my $maxStringLength = length (decode(' UTF-8' , $caname , Encode::FB_CROAK | Encode::LEAVE_SRC ));
500
560
if ($opt_t ) {
501
- foreach my $key (keys %trust_purposes_by_level ) {
561
+ foreach my $key (sort keys %trust_purposes_by_level ) {
502
562
my $string = $key . " : " . join (" , " , @{$trust_purposes_by_level {$key }});
503
563
$maxStringLength = List::Util::max( length ($string ), $maxStringLength );
504
564
print CRT $string . " \n " ;
0 commit comments