# If the OpenSSL commandline is not in search path you can configure it here!
my$openssl='openssl';
my$version='1.25';
my$version='1.26';
$opt_w=76;# default base64 encoded lines length
@@ -109,7 +109,7 @@ my @valid_signature_algorithms = (
$0=~s@.*(/|\\)@@;
$Getopt::Std::STANDARD_HELP_VERSION=1;
getopts('bd:fhilnp:qs:tuvw:');
getopts('bd:fhilmnp:qs:tuvw:');
if(!defined($opt_d)){
# to make plain "-d" use not cause warnings, and actually still work
@@ -161,6 +161,7 @@ sub HELP_MESSAGE() {
print"\t-f\tforce rebuild even if certdata.txt is current\n";
print"\t-i\tprint version info about used modules\n";
print"\t-l\tprint license info about certdata.txt\n";
print"\t-m\tinclude meta data in output\n";
print"\t-n\tno download of certdata.txt (to use existing)\n";
printwrap("\t","\t\t","-p\tlist of Mozilla trust purposes and levels for certificates to include in output. Takes the form of a comma separated list of purposes, a colon, and a comma separated list of levels. (default: $default_mozilla_trust_purposes:$default_mozilla_trust_levels)"),"\n";
print"\t\t Valid purposes are:\n";
@@ -371,6 +372,7 @@ my $caname;
my$certnum=0;
my$skipnum=0;
my$start_of_cert=0;
my@precert;
open(TXT,"$txt")ordie"Couldn't open $txt: $!\n";
while(<TXT>){
@@ -383,11 +385,15 @@ while (<TXT>) {
lastif(/\*\*\*\*\* END LICENSE BLOCK \*\*\*\*\*/);
}
}
nextif/^#|^\s*$/;
chomp;
if(/^CVS_ID\s+\"(.*)\"/){
printCRT"# $1\n";
elsif(/^# (Issuer|Serial Number|Subject|Not Valid Before|Not Valid After |Fingerprint \(MD5\)|Fingerprint \(SHA1\)):/){