233 lines
6.1 KiB
Plaintext
233 lines
6.1 KiB
Plaintext
|
#!/usr/bin/env perl
|
||
|
|
||
|
# WARNING: do not edit!
|
||
|
# Generated by Makefile from tools/c_rehash.in
|
||
|
# Copyright 1999-2018 The OpenSSL Project Authors. All Rights Reserved.
|
||
|
#
|
||
|
# Licensed under the OpenSSL license (the "License"). You may not use
|
||
|
# this file except in compliance with the License. You can obtain a copy
|
||
|
# in the file LICENSE in the source distribution or at
|
||
|
# https://www.openssl.org/source/license.html
|
||
|
|
||
|
# Perl c_rehash script, scan all files in a directory
|
||
|
# and add symbolic links to their hash values.
|
||
|
|
||
|
my $dir = "";
|
||
|
my $prefix = "/home/cory/src/tildefriends/deps/openssl/mingw64";
|
||
|
|
||
|
my $errorcount = 0;
|
||
|
my $openssl = $ENV{OPENSSL} || "openssl";
|
||
|
my $pwd;
|
||
|
my $x509hash = "-subject_hash";
|
||
|
my $crlhash = "-hash";
|
||
|
my $verbose = 0;
|
||
|
my $symlink_exists=eval {symlink("",""); 1};
|
||
|
my $removelinks = 1;
|
||
|
|
||
|
## Parse flags.
|
||
|
while ( $ARGV[0] =~ /^-/ ) {
|
||
|
my $flag = shift @ARGV;
|
||
|
last if ( $flag eq '--');
|
||
|
if ( $flag eq '-old') {
|
||
|
$x509hash = "-subject_hash_old";
|
||
|
$crlhash = "-hash_old";
|
||
|
} elsif ( $flag eq '-h' || $flag eq '-help' ) {
|
||
|
help();
|
||
|
} elsif ( $flag eq '-n' ) {
|
||
|
$removelinks = 0;
|
||
|
} elsif ( $flag eq '-v' ) {
|
||
|
$verbose++;
|
||
|
}
|
||
|
else {
|
||
|
print STDERR "Usage error; try -h.\n";
|
||
|
exit 1;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
sub help {
|
||
|
print "Usage: c_rehash [-old] [-h] [-help] [-v] [dirs...]\n";
|
||
|
print " -old use old-style digest\n";
|
||
|
print " -h or -help print this help text\n";
|
||
|
print " -v print files removed and linked\n";
|
||
|
exit 0;
|
||
|
}
|
||
|
|
||
|
eval "require Cwd";
|
||
|
if (defined(&Cwd::getcwd)) {
|
||
|
$pwd=Cwd::getcwd();
|
||
|
} else {
|
||
|
$pwd=`pwd`;
|
||
|
chomp($pwd);
|
||
|
}
|
||
|
|
||
|
# DOS/Win32 or Unix delimiter? Prefix our installdir, then search.
|
||
|
my $path_delim = ($pwd =~ /^[a-z]\:/i) ? ';' : ':';
|
||
|
$ENV{PATH} = "$prefix/bin" . ($ENV{PATH} ? $path_delim . $ENV{PATH} : "");
|
||
|
|
||
|
if (! -x $openssl) {
|
||
|
my $found = 0;
|
||
|
foreach (split /$path_delim/, $ENV{PATH}) {
|
||
|
if (-x "$_/$openssl") {
|
||
|
$found = 1;
|
||
|
$openssl = "$_/$openssl";
|
||
|
last;
|
||
|
}
|
||
|
}
|
||
|
if ($found == 0) {
|
||
|
print STDERR "c_rehash: rehashing skipped ('openssl' program not available)\n";
|
||
|
exit 0;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if (@ARGV) {
|
||
|
@dirlist = @ARGV;
|
||
|
} elsif ($ENV{SSL_CERT_DIR}) {
|
||
|
@dirlist = split /$path_delim/, $ENV{SSL_CERT_DIR};
|
||
|
} else {
|
||
|
$dirlist[0] = "$dir/certs";
|
||
|
}
|
||
|
|
||
|
if (-d $dirlist[0]) {
|
||
|
chdir $dirlist[0];
|
||
|
$openssl="$pwd/$openssl" if (!-x $openssl);
|
||
|
chdir $pwd;
|
||
|
}
|
||
|
|
||
|
foreach (@dirlist) {
|
||
|
if (-d $_ ) {
|
||
|
if ( -w $_) {
|
||
|
hash_dir($_);
|
||
|
} else {
|
||
|
print "Skipping $_, can't write\n";
|
||
|
$errorcount++;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
exit($errorcount);
|
||
|
|
||
|
sub hash_dir {
|
||
|
my %hashlist;
|
||
|
print "Doing $_[0]\n";
|
||
|
chdir $_[0];
|
||
|
opendir(DIR, ".");
|
||
|
my @flist = sort readdir(DIR);
|
||
|
closedir DIR;
|
||
|
if ( $removelinks ) {
|
||
|
# Delete any existing symbolic links
|
||
|
foreach (grep {/^[\da-f]+\.r{0,1}\d+$/} @flist) {
|
||
|
if (-l $_) {
|
||
|
print "unlink $_" if $verbose;
|
||
|
unlink $_ || warn "Can't unlink $_, $!\n";
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
FILE: foreach $fname (grep {/\.(pem)|(crt)|(cer)|(crl)$/} @flist) {
|
||
|
# Check to see if certificates and/or CRLs present.
|
||
|
my ($cert, $crl) = check_file($fname);
|
||
|
if (!$cert && !$crl) {
|
||
|
print STDERR "WARNING: $fname does not contain a certificate or CRL: skipping\n";
|
||
|
next;
|
||
|
}
|
||
|
link_hash_cert($fname) if ($cert);
|
||
|
link_hash_crl($fname) if ($crl);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
sub check_file {
|
||
|
my ($is_cert, $is_crl) = (0,0);
|
||
|
my $fname = $_[0];
|
||
|
open IN, $fname;
|
||
|
while(<IN>) {
|
||
|
if (/^-----BEGIN (.*)-----/) {
|
||
|
my $hdr = $1;
|
||
|
if ($hdr =~ /^(X509 |TRUSTED |)CERTIFICATE$/) {
|
||
|
$is_cert = 1;
|
||
|
last if ($is_crl);
|
||
|
} elsif ($hdr eq "X509 CRL") {
|
||
|
$is_crl = 1;
|
||
|
last if ($is_cert);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
close IN;
|
||
|
return ($is_cert, $is_crl);
|
||
|
}
|
||
|
|
||
|
|
||
|
# Link a certificate to its subject name hash value, each hash is of
|
||
|
# the form <hash>.<n> where n is an integer. If the hash value already exists
|
||
|
# then we need to up the value of n, unless its a duplicate in which
|
||
|
# case we skip the link. We check for duplicates by comparing the
|
||
|
# certificate fingerprints
|
||
|
|
||
|
sub link_hash_cert {
|
||
|
my $fname = $_[0];
|
||
|
$fname =~ s/'/'\\''/g;
|
||
|
my ($hash, $fprint) = `"$openssl" x509 $x509hash -fingerprint -noout -in "$fname"`;
|
||
|
chomp $hash;
|
||
|
chomp $fprint;
|
||
|
$fprint =~ s/^.*=//;
|
||
|
$fprint =~ tr/://d;
|
||
|
my $suffix = 0;
|
||
|
# Search for an unused hash filename
|
||
|
while(exists $hashlist{"$hash.$suffix"}) {
|
||
|
# Hash matches: if fingerprint matches its a duplicate cert
|
||
|
if ($hashlist{"$hash.$suffix"} eq $fprint) {
|
||
|
print STDERR "WARNING: Skipping duplicate certificate $fname\n";
|
||
|
return;
|
||
|
}
|
||
|
$suffix++;
|
||
|
}
|
||
|
$hash .= ".$suffix";
|
||
|
if ($symlink_exists) {
|
||
|
print "link $fname -> $hash\n" if $verbose;
|
||
|
symlink $fname, $hash || warn "Can't symlink, $!";
|
||
|
} else {
|
||
|
print "copy $fname -> $hash\n" if $verbose;
|
||
|
if (open($in, "<", $fname)) {
|
||
|
if (open($out,">", $hash)) {
|
||
|
print $out $_ while (<$in>);
|
||
|
close $out;
|
||
|
} else {
|
||
|
warn "can't open $hash for write, $!";
|
||
|
}
|
||
|
close $in;
|
||
|
} else {
|
||
|
warn "can't open $fname for read, $!";
|
||
|
}
|
||
|
}
|
||
|
$hashlist{$hash} = $fprint;
|
||
|
}
|
||
|
|
||
|
# Same as above except for a CRL. CRL links are of the form <hash>.r<n>
|
||
|
|
||
|
sub link_hash_crl {
|
||
|
my $fname = $_[0];
|
||
|
$fname =~ s/'/'\\''/g;
|
||
|
my ($hash, $fprint) = `"$openssl" crl $crlhash -fingerprint -noout -in '$fname'`;
|
||
|
chomp $hash;
|
||
|
chomp $fprint;
|
||
|
$fprint =~ s/^.*=//;
|
||
|
$fprint =~ tr/://d;
|
||
|
my $suffix = 0;
|
||
|
# Search for an unused hash filename
|
||
|
while(exists $hashlist{"$hash.r$suffix"}) {
|
||
|
# Hash matches: if fingerprint matches its a duplicate cert
|
||
|
if ($hashlist{"$hash.r$suffix"} eq $fprint) {
|
||
|
print STDERR "WARNING: Skipping duplicate CRL $fname\n";
|
||
|
return;
|
||
|
}
|
||
|
$suffix++;
|
||
|
}
|
||
|
$hash .= ".r$suffix";
|
||
|
if ($symlink_exists) {
|
||
|
print "link $fname -> $hash\n" if $verbose;
|
||
|
symlink $fname, $hash || warn "Can't symlink, $!";
|
||
|
} else {
|
||
|
print "cp $fname -> $hash\n" if $verbose;
|
||
|
system ("cp", $fname, $hash);
|
||
|
warn "Can't copy, $!" if ($? >> 8) != 0;
|
||
|
}
|
||
|
$hashlist{$hash} = $fprint;
|
||
|
}
|