Annotation of embedaddon/curl/lib/mk-ca-bundle.vbs, revision 1.1
1.1 ! misho 1: '***************************************************************************
! 2: '* _ _ ____ _
! 3: '* Project ___| | | | _ \| |
! 4: '* / __| | | | |_) | |
! 5: '* | (__| |_| | _ <| |___
! 6: '* \___|\___/|_| \_\_____|
! 7: '*
! 8: '* Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
! 9: '*
! 10: '* This software is licensed as described in the file COPYING, which
! 11: '* you should have received as part of this distribution. The terms
! 12: '* are also available at https://curl.haxx.se/docs/copyright.html.
! 13: '*
! 14: '* You may opt to use, copy, modify, merge, publish, distribute and/or sell
! 15: '* copies of the Software, and permit persons to whom the Software is
! 16: '* furnished to do so, under the terms of the COPYING file.
! 17: '*
! 18: '* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
! 19: '* KIND, either express or implied.
! 20: '*
! 21: '***************************************************************************
! 22: '* Script to fetch certdata.txt from Mozilla.org site and create a
! 23: '* ca-bundle.crt for use with OpenSSL / libcurl / libcurl bindings
! 24: '* Requires WinHttp.WinHttpRequest.5.1 and ADODB.Stream which are part of
! 25: '* W2000 SP3 or later, WXP SP1 or later, W2003 Server SP1 or later.
! 26: '* Hacked by Guenter Knauf
! 27: '***************************************************************************
! 28: Option Explicit
! 29: Const myVersion = "0.4.0"
! 30:
! 31: Const myUrl = "https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt"
! 32:
! 33: Const myOpenSSL = "openssl.exe"
! 34: Dim myUseOpenSSL
! 35: myUseOpenSSL = TRUE ' Flag: TRUE to use OpenSSL. If TRUE and is not
! 36: ' found then a warning is shown before continuing.
! 37:
! 38: Const myCdSavF = TRUE ' Flag: save downloaded data to file certdata.txt
! 39: Const myCaBakF = TRUE ' Flag: backup existing ca-bundle certificate
! 40: Const myAskLiF = TRUE ' Flag: display certdata.txt license agreement
! 41: Const myWrapLe = 76 ' Default length of base64 output lines
! 42:
! 43: ' cert info code doesn't work properly with any recent openssl, leave disabled.
! 44: ' Also: we want our certificate output by default to be as similar as possible
! 45: ' to mk-ca-bundle.pl and setting this TRUE changes the base64 width to
! 46: ' OpenSSL's built-in default width, which is not the same as mk-ca-bundle.pl.
! 47: Const myAskTiF = FALSE ' Flag: ask to include certificate text info
! 48:
! 49: '
! 50: '******************* Nothing to configure below! *******************
! 51: '
! 52: Const adTypeBinary = 1
! 53: Const adTypeText = 2
! 54: Const adSaveCreateNotExist = 1
! 55: Const adSaveCreateOverWrite = 2
! 56: Dim objShell, objNetwork, objFSO, objHttp
! 57: Dim myBase, mySelf, myStream, myTmpFh, myCdData, myCdFile
! 58: Dim myCaFile, myTmpName, myBakNum, myOptTxt, i
! 59: Set objNetwork = WScript.CreateObject("WScript.Network")
! 60: Set objShell = WScript.CreateObject("WScript.Shell")
! 61: Set objFSO = WScript.CreateObject("Scripting.FileSystemObject")
! 62: Set objHttp = WScript.CreateObject("WinHttp.WinHttpRequest.5.1")
! 63: If objHttp Is Nothing Then Set objHttp = WScript.CreateObject("WinHttp.WinHttpRequest")
! 64: myBase = Left(WScript.ScriptFullName, InstrRev(WScript.ScriptFullName, "\"))
! 65: mySelf = Left(WScript.ScriptName, InstrRev(WScript.ScriptName, ".") - 1) & " " & myVersion
! 66:
! 67: myCdFile = Mid(myUrl, InstrRev(myUrl, "/") + 1)
! 68: myCaFile = "ca-bundle.crt"
! 69: myTmpName = InputBox("It will take a minute to download and parse the " & _
! 70: "certificate data." & _
! 71: vbLf & vbLf & _
! 72: "Please enter the output filename:", mySelf, myCaFile)
! 73: If (myTmpName = "") Then
! 74: WScript.Quit 1
! 75: End If
! 76: myCaFile = myTmpName
! 77: If (myCdFile = "") Then
! 78: MsgBox("URL does not contain filename!"), vbCritical, mySelf
! 79: WScript.Quit 1
! 80: End If
! 81:
! 82: ' Don't use OpenSSL if it's not present.
! 83: If (myUseOpenSSL = TRUE) Then
! 84: Dim errnum
! 85:
! 86: On Error Resume Next
! 87: Call objShell.Run("""" & myOpenSSL & """ version", 0, TRUE)
! 88: errnum = Err.Number
! 89: On Error GoTo 0
! 90:
! 91: If Not (errnum = 0) Then
! 92: myUseOpenSSL = FALSE
! 93: MsgBox("OpenSSL was not found so the certificate bundle will not " & _
! 94: "include the SHA256 hash of the raw certificate data file " & _
! 95: "that was used to generate the certificates in the bundle. " & _
! 96: vbLf & vbLf & _
! 97: "This does not have any effect on the certificate output, " & _
! 98: "so this script will continue." & _
! 99: vbLf & vbLf & _
! 100: "If you want to set a custom location for OpenSSL or disable " & _
! 101: "this message then edit the variables at the start of the " & _
! 102: "script."), vbInformation, mySelf
! 103: End If
! 104: End If
! 105:
! 106: If (myAskTiF = TRUE) And (myUseOpenSSL = TRUE) Then
! 107: If (6 = objShell.PopUp("Do you want to include text information about " & _
! 108: "each certificate?" & vbLf & _
! 109: "(Requires OpenSSL.exe in the current directory " & _
! 110: "or search path)",, _
! 111: mySelf, vbQuestion + vbYesNo + vbDefaultButton2)) Then
! 112: myOptTxt = TRUE
! 113: Else
! 114: myOptTxt = FALSE
! 115: End If
! 116: End If
! 117:
! 118: ' Uncomment the line below to ignore SSL invalid cert errors
! 119: ' objHttp.Option(4) = 256 + 512 + 4096 + 8192
! 120: objHttp.SetTimeouts 0, 5000, 10000, 10000
! 121: objHttp.Open "GET", myUrl, FALSE
! 122: objHttp.setRequestHeader "User-Agent", WScript.ScriptName & "/" & myVersion
! 123: objHttp.Send ""
! 124: If Not (objHttp.Status = 200) Then
! 125: MsgBox("Failed to download '" & myCdFile & "': " & objHttp.Status & " - " & objHttp.StatusText), vbCritical, mySelf
! 126: WScript.Quit 1
! 127: End If
! 128: ' Write received data to file if enabled
! 129: If (myCdSavF = TRUE) Then
! 130: Call SaveBinaryData(myCdFile, objHttp.ResponseBody)
! 131: End If
! 132: ' Convert data from ResponseBody instead of using ResponseText because of UTF-8
! 133: myCdData = ConvertBinaryToUTF8(objHttp.ResponseBody)
! 134: Set objHttp = Nothing
! 135: ' Backup exitsing ca-bundle certificate file
! 136: If (myCaBakF = TRUE) Then
! 137: If objFSO.FileExists(myCaFile) Then
! 138: Dim myBakFile, b
! 139: b = 1
! 140: myBakFile = myCaFile & ".~" & b & "~"
! 141: While objFSO.FileExists(myBakFile)
! 142: b = b + 1
! 143: myBakFile = myCaFile & ".~" & b & "~"
! 144: Wend
! 145: Set myTmpFh = objFSO.GetFile(myCaFile)
! 146: myTmpFh.Move myBakFile
! 147: End If
! 148: End If
! 149:
! 150: ' Process the received data
! 151: Dim myLines, myPattern, myInsideCert, myInsideLicense, myLicenseText, myNumCerts, myNumSkipped
! 152: Dim myLabel, myOctets, myData, myPem, myRev, myUntrusted, j
! 153: myNumSkipped = 0
! 154: myNumCerts = 0
! 155: myData = ""
! 156: myLines = Split(myCdData, vbLf, -1)
! 157: Set myStream = CreateObject("ADODB.Stream")
! 158: myStream.Open
! 159: myStream.Type = adTypeText
! 160: myStream.Charset = "utf-8"
! 161: myStream.WriteText "##" & vbLf & _
! 162: "## Bundle of CA Root Certificates" & vbLf & _
! 163: "##" & vbLf & _
! 164: "## Certificate data from Mozilla as of: " & _
! 165: ConvertDateToString(LocalDateToUTC(Now)) & " GMT" & vbLf & _
! 166: "##" & vbLf & _
! 167: "## This is a bundle of X.509 certificates of public Certificate Authorities" & vbLf & _
! 168: "## (CA). These were automatically extracted from Mozilla's root certificates" & vbLf & _
! 169: "## file (certdata.txt). This file can be found in the mozilla source tree:" & vbLf & _
! 170: "## " & myUrl & vbLf & _
! 171: "##" & vbLf & _
! 172: "## It contains the certificates in PEM format and therefore" & vbLf & _
! 173: "## can be directly used with curl / libcurl / php_curl, or with" & vbLf & _
! 174: "## an Apache+mod_ssl webserver for SSL client authentication." & vbLf & _
! 175: "## Just configure this file as the SSLCACertificateFile." & vbLf & _
! 176: "##" & vbLf & _
! 177: "## Conversion done with mk-ca-bundle.vbs version " & myVersion & "." & vbLf
! 178: If (myCdSavF = TRUE) And (myUseOpenSSL = TRUE) Then
! 179: myStream.WriteText "## SHA256: " & FileSHA256(myCdFile) & vbLf
! 180: End If
! 181: myStream.WriteText "##" & vbLf & vbLf
! 182:
! 183: myStream.WriteText vbLf
! 184: For i = 0 To UBound(myLines)
! 185: If InstrRev(myLines(i), "CKA_LABEL ") Then
! 186: myPattern = "^CKA_LABEL\s+[A-Z0-9]+\s+""(.+?)"""
! 187: myLabel = RegExprFirst(myPattern, myLines(i))
! 188: End If
! 189: If (myInsideCert = TRUE) Then
! 190: If InstrRev(myLines(i), "END") Then
! 191: myInsideCert = FALSE
! 192: While (i < UBound(myLines)) And Not (myLines(i) = "#")
! 193: i = i + 1
! 194: If InstrRev(myLines(i), "CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NSS_TRUSTED_DELEGATOR") Then
! 195: myUntrusted = FALSE
! 196: End If
! 197: Wend
! 198: If (myUntrusted = TRUE) Then
! 199: myNumSkipped = myNumSkipped + 1
! 200: Else
! 201: myStream.WriteText myLabel & vbLf
! 202: myStream.WriteText String(Len(myLabel), "=") & vbLf
! 203: myPem = "-----BEGIN CERTIFICATE-----" & vbLf & _
! 204: Base64Encode(myData) & vbLf & _
! 205: "-----END CERTIFICATE-----" & vbLf
! 206: If (myOptTxt = FALSE) Then
! 207: myStream.WriteText myPem & vbLf
! 208: Else
! 209: Dim myCmd, myRval, myTmpIn, myTmpOut
! 210: myTmpIn = objFSO.GetSpecialFolder(2).Path & "\" & objFSO.GetTempName
! 211: myTmpOut = objFSO.GetSpecialFolder(2).Path & "\" & objFSO.GetTempName
! 212: Set myTmpFh = objFSO.OpenTextFile(myTmpIn, 2, TRUE)
! 213: myTmpFh.Write myPem
! 214: myTmpFh.Close
! 215: myCmd = """" & myOpenSSL & """ x509 -md5 -fingerprint -text " & _
! 216: "-inform PEM -in " & myTmpIn & " -out " & myTmpOut
! 217: myRval = objShell.Run (myCmd, 0, TRUE)
! 218: objFSO.DeleteFile myTmpIn, TRUE
! 219: If Not (myRval = 0) Then
! 220: MsgBox("Failed to process PEM cert with OpenSSL commandline!"), vbCritical, mySelf
! 221: objFSO.DeleteFile myTmpOut, TRUE
! 222: WScript.Quit 3
! 223: End If
! 224: Set myTmpFh = objFSO.OpenTextFile(myTmpOut, 1)
! 225: myStream.WriteText myTmpFh.ReadAll & vbLf
! 226: myTmpFh.Close
! 227: objFSO.DeleteFile myTmpOut, TRUE
! 228: End If
! 229: myNumCerts = myNumCerts + 1
! 230: End If
! 231: Else
! 232: myOctets = Split(myLines(i), "\")
! 233: For j = 1 To UBound(myOctets)
! 234: myData = myData & Chr(CByte("&o" & myOctets(j)))
! 235: Next
! 236: End If
! 237: End If
! 238: If InstrRev(myLines(i), "CVS_ID ") Then
! 239: myPattern = "^CVS_ID\s+""(.+?)"""
! 240: myRev = RegExprFirst(myPattern, myLines(i))
! 241: myStream.WriteText "# " & myRev & vbLf & vbLf
! 242: End If
! 243: If InstrRev(myLines(i), "CKA_VALUE MULTILINE_OCTAL") Then
! 244: myInsideCert = TRUE
! 245: myUntrusted = TRUE
! 246: myData = ""
! 247: End If
! 248: If InstrRev(myLines(i), "***** BEGIN LICENSE BLOCK *****") Then
! 249: myInsideLicense = TRUE
! 250: End If
! 251: If (myInsideLicense = TRUE) Then
! 252: myStream.WriteText myLines(i) & vbLf
! 253: myLicenseText = myLicenseText & Mid(myLines(i), 2) & vbLf
! 254: End If
! 255: If InstrRev(myLines(i), "***** END LICENSE BLOCK *****") Then
! 256: myInsideLicense = FALSE
! 257: If (myAskLiF = TRUE) Then
! 258: If Not (6 = objShell.PopUp(myLicenseText & vbLf & _
! 259: "Do you agree to the license shown above (required to proceed) ?",, _
! 260: mySelf, vbQuestion + vbYesNo + vbDefaultButton1)) Then
! 261: myStream.Close
! 262: objFSO.DeleteFile myCaFile, TRUE
! 263: WScript.Quit 2
! 264: End If
! 265: End If
! 266: End If
! 267: Next
! 268:
! 269: ' To stop the UTF-8 BOM from being written the stream has to be copied and
! 270: ' then saved as binary.
! 271: Dim myCopy
! 272: Set myCopy = CreateObject("ADODB.Stream")
! 273: myCopy.Type = adTypeBinary
! 274: myCopy.Open
! 275: myStream.Position = 3 ' Skip UTF-8 BOM
! 276: myStream.CopyTo myCopy
! 277: myCopy.SaveToFile myCaFile, adSaveCreateOverWrite
! 278: myCopy.Close
! 279: myStream.Close
! 280: Set myCopy = Nothing
! 281: Set myStream = Nothing
! 282:
! 283: ' Done
! 284: objShell.PopUp "Done (" & myNumCerts & " CA certs processed, " & myNumSkipped & _
! 285: " untrusted skipped).", 20, mySelf, vbInformation
! 286: WScript.Quit 0
! 287:
! 288: Function ConvertBinaryToUTF8(arrBytes)
! 289: Dim objStream
! 290: Set objStream = CreateObject("ADODB.Stream")
! 291: objStream.Open
! 292: objStream.Type = adTypeBinary
! 293: objStream.Write arrBytes
! 294: objStream.Position = 0
! 295: objStream.Type = adTypeText
! 296: objStream.Charset = "utf-8"
! 297: ConvertBinaryToUTF8 = objStream.ReadText
! 298: Set objStream = Nothing
! 299: End Function
! 300:
! 301: Function SaveBinaryData(filename, data)
! 302: Dim objStream
! 303: Set objStream = CreateObject("ADODB.Stream")
! 304: objStream.Type = adTypeBinary
! 305: objStream.Open
! 306: objStream.Write data
! 307: objStream.SaveToFile filename, adSaveCreateOverWrite
! 308: objStream.Close
! 309: Set objStream = Nothing
! 310: End Function
! 311:
! 312: Function RegExprFirst(SearchPattern, TheString)
! 313: Dim objRegExp, Matches ' create variables.
! 314: Set objRegExp = New RegExp ' create a regular expression.
! 315: objRegExp.Pattern = SearchPattern ' sets the search pattern.
! 316: objRegExp.IgnoreCase = TRUE ' set to ignores case.
! 317: objRegExp.Global = TRUE ' set to global search.
! 318: Set Matches = objRegExp.Execute(TheString) ' do the search.
! 319: If (Matches.Count) Then
! 320: RegExprFirst = Matches(0).SubMatches(0) ' return first match.
! 321: Else
! 322: RegExprFirst = ""
! 323: End If
! 324: Set objRegExp = Nothing
! 325: End Function
! 326:
! 327: Function Base64Encode(inData)
! 328: Const Base64 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"
! 329: Dim cOut, sOut, lWrap, I
! 330: lWrap = Int(myWrapLe * 3 / 4)
! 331:
! 332: 'For each group of 3 bytes
! 333: For I = 1 To Len(inData) Step 3
! 334: Dim nGroup, pOut, sGroup
! 335:
! 336: 'Create one long from this 3 bytes.
! 337: nGroup = &H10000 * Asc(Mid(inData, I, 1)) + _
! 338: &H100 * MyASC(Mid(inData, I + 1, 1)) + _
! 339: MyASC(Mid(inData, I + 2, 1))
! 340:
! 341: 'Oct splits the long To 8 groups with 3 bits
! 342: nGroup = Oct(nGroup)
! 343:
! 344: 'Add leading zeros
! 345: nGroup = String(8 - Len(nGroup), "0") & nGroup
! 346:
! 347: 'Convert To base64
! 348: pOut = Mid(Base64, CLng("&o" & Mid(nGroup, 1, 2)) + 1, 1) & _
! 349: Mid(Base64, CLng("&o" & Mid(nGroup, 3, 2)) + 1, 1) & _
! 350: Mid(Base64, CLng("&o" & Mid(nGroup, 5, 2)) + 1, 1) & _
! 351: Mid(Base64, CLng("&o" & Mid(nGroup, 7, 2)) + 1, 1)
! 352:
! 353: 'Add the part To OutPut string
! 354: sOut = sOut + pOut
! 355:
! 356: 'Add a new line For Each myWrapLe chars In dest
! 357: If (I < Len(inData) - 2) Then
! 358: If (I + 2) Mod lWrap = 0 Then sOut = sOut & vbLf
! 359: End If
! 360: Next
! 361: Select Case Len(inData) Mod 3
! 362: Case 1: '8 bit final
! 363: sOut = Left(sOut, Len(sOut) - 2) & "=="
! 364: Case 2: '16 bit final
! 365: sOut = Left(sOut, Len(sOut) - 1) & "="
! 366: End Select
! 367: Base64Encode = sOut
! 368: End Function
! 369:
! 370: Function MyASC(OneChar)
! 371: If OneChar = "" Then MyASC = 0 Else MyASC = Asc(OneChar)
! 372: End Function
! 373:
! 374: ' Return the date in the same format as perl to match mk-ca-bundle.pl output:
! 375: ' Wed Sep 7 03:12:05 2016
! 376: Function ConvertDateToString(input)
! 377: Dim output
! 378: output = WeekDayName(WeekDay(input), TRUE) & " " & _
! 379: MonthName(Month(input), TRUE) & " "
! 380: If (Len(Day(input)) = 1) Then
! 381: output = output & " "
! 382: End If
! 383: output = output & _
! 384: Day(input) & " " & _
! 385: FormatDateTime(input, vbShortTime) & ":"
! 386: If (Len(Second(input)) = 1) Then
! 387: output = output & "0"
! 388: End If
! 389: output = output & _
! 390: Second(input) & " " & _
! 391: Year(input)
! 392: ConvertDateToString = output
! 393: End Function
! 394:
! 395: ' Convert local Date to UTC. Microsoft says:
! 396: ' Use Win32_ComputerSystem CurrentTimeZone property, because it automatically
! 397: ' adjusts the Time Zone bias for daylight saving time; Win32_Time Zone Bias
! 398: ' property does not.
! 399: ' https://msdn.microsoft.com/en-us/library/windows/desktop/ms696015.aspx
! 400: Function LocalDateToUTC(localdate)
! 401: Dim item, offset
! 402: For Each item In GetObject("winmgmts:").InstancesOf("Win32_ComputerSystem")
! 403: offset = item.CurrentTimeZone ' the offset in minutes
! 404: Next
! 405: If (offset < 0) Then
! 406: LocalDateToUTC = DateAdd("n", ABS(offset), localdate)
! 407: Else
! 408: LocalDateToUTC = DateAdd("n", -ABS(offset), localdate)
! 409: End If
! 410: 'objShell.PopUp LocalDateToUTC
! 411: End Function
! 412:
! 413: Function FileSHA256(filename)
! 414: Dim cmd, rval, tmpOut, tmpFh
! 415: if (myUseOpenSSL = TRUE) Then
! 416: tmpOut = objFSO.GetSpecialFolder(2).Path & "\" & objFSO.GetTempName
! 417: cmd = """" & myOpenSSL & """ dgst -r -sha256 -out """ & tmpOut & """ """ & filename & """"
! 418: rval = objShell.Run(cmd, 0, TRUE)
! 419: If Not (rval = 0) Then
! 420: MsgBox("Failed to get sha256 of """ & filename & """ with OpenSSL commandline!"), vbCritical, mySelf
! 421: objFSO.DeleteFile tmpOut, TRUE
! 422: WScript.Quit 3
! 423: End If
! 424: Set tmpFh = objFSO.OpenTextFile(tmpOut, 1)
! 425: FileSHA256 = RegExprFirst("^([0-9a-f]{64}) .+", tmpFh.ReadAll)
! 426: tmpFh.Close
! 427: objFSO.DeleteFile tmpOut, TRUE
! 428: Else
! 429: FileSHA256 = ""
! 430: End If
! 431: End Function
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>