Crypt-OpenSSL-X509-1.813/000755 000765 000024 00000000000 13554375627 015371 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/inc/000755 000765 000024 00000000000 13554375627 016142 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/X509.pm000644 000765 000024 00000023076 13554375226 016377 0ustar00jonasbnstaff000000 000000 package Crypt::OpenSSL::X509; use strict; use vars qw($VERSION @EXPORT_OK); use Exporter; use base qw(Exporter); $VERSION = '1.813'; @EXPORT_OK = qw( FORMAT_UNDEF FORMAT_ASN1 FORMAT_TEXT FORMAT_PEM FORMAT_PKCS12 FORMAT_SMIME FORMAT_ENGINE FORMAT_IISSGC OPENSSL_VERSION_NUMBER ); sub Crypt::OpenSSL::X509::has_extension_oid { my $x509 = shift; my $oid = shift; if (not $Crypt::OpenSSL::X509::exts_by_oid) { $Crypt::OpenSSL::X509::exts_by_oid = $x509->extensions_by_oid; } return $$Crypt::OpenSSL::X509::exts_by_oid{$oid} ? 1 : 0; } sub Crypt::OpenSSL::X509::Extension::is_critical { my $ext = shift; my $crit = $ext->critical(); return $crit ? 1 : 0; } # return a hash for the values of keyUsage or nsCertType sub Crypt::OpenSSL::X509::Extension::hash_bit_string { my $ext = shift; my @bits = split(//, $ext->bit_string); my $len = @bits; my %bit_str_hash = (); if ($len == 9) { # bits for keyUsage %bit_str_hash = ( 'Digital Signature' => $bits[0], 'Non Repudiation' => $bits[1], 'Key Encipherment' => $bits[2], 'Data Encipherment' => $bits[3], 'Key Agreement' => $bits[4], 'Certificate Sign' => $bits[5], 'CRL Sign' => $bits[6], 'Encipher Only' => $bits[7], 'Decipher Only' => $bits[8],); } elsif ($len == 8) { #bits for nsCertType %bit_str_hash = ( 'SSL Client' => $bits[0], 'SSL Server' => $bits[1], 'S/MIME' => $bits[2], 'Object Signing' => $bits[3], 'Unused' => $bits[4], 'SSL CA' => $bits[5], 'S/MIME CA' => $bits[6], 'Object Signing CA' => $bits[7],); } return %bit_str_hash; } sub Crypt::OpenSSL::X509::Extension::extKeyUsage { my $ext = shift; my @vals = split(/ /, $ext->extendedKeyUsage); return @vals; } sub Crypt::OpenSSL::X509::is_selfsigned { my $x509 = shift; return $x509->subject eq $x509->issuer; } BOOT_XS: { require DynaLoader; # DynaLoader calls dl_load_flags as a static method. *dl_load_flags = DynaLoader->can('dl_load_flags'); do {__PACKAGE__->can('bootstrap') || \&DynaLoader::bootstrap}->(__PACKAGE__, $VERSION); } END { __PACKAGE__->__X509_cleanup; } 1; __END__ =head1 NAME Crypt::OpenSSL::X509 - Perl extension to OpenSSL's X509 API. =head1 SYNOPSIS use Crypt::OpenSSL::X509; my $x509 = Crypt::OpenSSL::X509->new_from_file('cert.pem'); print $x509->pubkey() . "\n"; print $x509->subject() . "\n"; print $x509->hash() . "\n"; print $x509->email() . "\n"; print $x509->issuer() . "\n"; print $x509->issuer_hash() . "\n"; print $x509->notBefore() . "\n"; print $x509->notAfter() . "\n"; print $x509->modulus() . "\n"; print $x509->exponent() . "\n"; print $x509->fingerprint_md5() . "\n"; print $x509->fingerprint_sha256() . "\n"; print $x509->as_string() . "\n"; my $x509 = Crypt::OpenSSL::X509->new_from_string( $der_encoded_data, Crypt::OpenSSL::X509::FORMAT_ASN1 ); # given a time offset of $seconds, will the certificate be valid? if ($x509->checkend($seconds)) { # cert is expired at $seconds offset } else { # cert is ok at $seconds offset } my $exts = $x509->extensions_by_oid(); foreach my $oid (keys %$exts) { my $ext = $$exts{$oid}; print $oid, " ", $ext->object()->name(), ": ", $ext->value(), "\n"; } =head1 ABSTRACT Crypt::OpenSSL::X509 - Perl extension to OpenSSL's X509 API. =head1 DESCRIPTION This implement a large majority of OpenSSL's useful X509 API. The email() method supports both certificates where the subject is of the form: "... CN=Firstname lastname/emailAddress=user@domain", and also certificates where there is a X509v3 Extension of the form "X509v3 Subject Alternative Name: email=user@domain". =head2 EXPORT None by default. On request: FORMAT_UNDEF FORMAT_ASN1 FORMAT_TEXT FORMAT_PEM FORMAT_PKCS12 FORMAT_SMIME FORMAT_ENGINE FORMAT_IISSGC =head1 FUNCTIONS =head2 X509 CONSTRUCTORS =over 4 =item new ( ) Create a new X509 object. =item new_from_string ( STRING [ FORMAT ] ) =item new_from_file ( FILENAME [ FORMAT ] ) Create a new X509 object from a string or file. C should be C or C. =back =head2 X509 ACCESSORS =over 4 =item subject Subject name as a string. =item issuer Issuer name as a string. =item issuer_hash Issuer name hash as a string. =item serial Serial number as a string. =item hash Alias for subject_hash =item subject_hash Subject name hash as a string. =item notBefore C time as a string. =item notAfter C time as a string. =item email Email address as a string. =item version Certificate version as a string. =item sig_alg_name Signature algorithm name as a string. =item key_alg_name Public key algorithm name as a string. =item curve Name of the EC curve used in the public key. =back =head2 X509 METHODS =over 4 =item subject_name ( ) =item issuer_name ( ) Return a Name object for the subject or issuer name. Methods for handling Name objects are given below. =item is_selfsigned ( ) Return Boolean value if subject and issuer name are the same. =item as_string ( [ FORMAT ] ) Return the certificate as a string in the specified format. C can be one of C (the default) or C. =item modulus ( ) Return the modulus for an RSA public key as a string of hex digits. For DSA and EC return the public key. Other algorithms are not supported. =item bit_length ( ) Return the length of the modulus as a number of bits. =item fingerprint_md5 ( ) =item fingerprint_sha1 ( ) =item fingerprint_sha224 ( ) =item fingerprint_sha256 ( ) =item fingerprint_sha384 ( ) =item fingerprint_sha512 ( ) Return the specified message digest for the certificate. =item checkend( OFFSET ) Given an offset in seconds, will the certificate be expired? Returns True if the certificate will be expired. False otherwise. =item pubkey ( ) Return the RSA, DSA, or EC public key. =item num_extensions ( ) Return the number of extensions in the certificate. =item extension ( INDEX ) Return the Extension specified by the integer C. Methods for handling Extension objects are given below. =item extensions_by_oid ( ) =item extensions_by_name ( ) =item extensions_by_long_name ( ) Return a hash of Extensions indexed by OID or name. =item has_extension_oid ( OID ) Return true if the certificate has the extension specified by C. =back =head2 X509::Extension METHODS =over 4 =item critical ( ) Return a value indicating if the extension is critical or not. FIXME: the value is an ASN.1 BOOLEAN value. =item object ( ) Return the ObjectID of the extension. Methods for handling ObjectID objects are given below. =item value ( ) Return the value of the extension as an asn1parse(1) style hex dump. =item as_string ( ) Return a human-readable version of the extension as formatted by X509V3_EXT_print. Note that this will return an empty string for OIDs with unknown ASN.1 encodings. =back =head2 X509::ObjectID METHODS =over 4 =item name ( ) Return the long name of the object as a string. =item oid ( ) Return the numeric dot-separated form of the object identifier as a string. =back =head2 X509::Name METHODS =over 4 =item as_string ( ) Return a string representation of the Name =item entries ( ) Return an array of Name_Entry objects. Methods for handling Name_Entry objects are given below. =item has_entry ( TYPE [ LASTPOS ] ) =item has_long_entry ( TYPE [ LASTPOS ] ) =item has_oid_entry ( TYPE [ LASTPOS ] ) Return true if a name has an entry of the specified C. Depending on the function the C may be in the short form (e.g. C), long form (C) or OID (C<2.5.4.3>). If C is specified then the search is made from that index rather than from the start. =item get_index_by_type ( TYPE [ LASTPOS ] ) =item get_index_by_long_type ( TYPE [ LASTPOS ] ) =item get_index_by_oid_type ( TYPE [ LASTPOS ] ) Return the index of an entry of the specified C in a name. Depending on the function the C may be in the short form (e.g. C), long form (C) or OID (C<2.5.4.3>). If C is specified then the search is made from that index rather than from the start. =item get_entry_by_type ( TYPE [ LASTPOS ] ) =item get_entry_by_long_type ( TYPE [ LASTPOS ] ) These methods work similarly to get_index_by_* but return the Name_Entry rather than the index. =back =head2 X509::Name_Entry METHODS =over 4 =item as_string ( [ LONG ] ) Return a string representation of the Name_Entry of the form C. If C is 1, the long form of the type is used. =item type ( [ LONG ] ) Return a string representation of the type of the Name_Entry. If C is 1, the long form of the type is used. =item value ( ) Return a string representation of the value of the Name_Entry. =item is_printableString ( ) =item is_ia5string ( ) =item is_utf8string ( ) =item is_asn1_type ( [ASN1_TYPE] ) Return true if the Name_Entry value is of the specified type. The value of C should be as listed in OpenSSL's C. =back =head1 SEE ALSO OpenSSL(1), Crypt::OpenSSL::RSA, Crypt::OpenSSL::Bignum =head1 AUTHOR Dan Sully =head1 CONTRIBUTORS =over =item * Neil Bowers, release 1.8.13 =item * kmx, release 1.8.9 =item * Sebastian Andrzej Siewior =item * David O'Callaghan, Edavid.ocallaghan@cs.tcd.ieE =item * Daniel Kahn Gillmor Edkg@fifthhorseman.netE =back =head1 COPYRIGHT AND LICENSE Copyright 2004-2019 by Dan Sully This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. =cut Crypt-OpenSSL-X509-1.813/Changes000644 000765 000024 00000011330 13554375111 016646 0ustar00jonasbnstaff000000 000000 Revision history for Perl extension Crypt::OpenSSL::X509. 1.8.13 Thu Oct 24 21:23:46 CEST 2019 - Ensure /usr/local is ahead of /usr in include and lib searches PR: #74 1.8.12 Thu Nov 22 19:54:37 CET 2018 - Applied patch from @eserte addressing issue (#71) with current directory no longer included in @INC by default from Perl 5.26 ref: https://www.effectiveperlprogramming.com/2017/01/v5-26-removes-dot-from-inc/ 1.8.11 Sun Oct 28 20:22:59 CET 2018 - Re-release of 1.8.10, with corrected version number indexer error from PAUSE 1.8.10 Sun Oct 28 16:52:50 CET 2018 - Maintenance release, corrected issue with MYMETA.* files included in distribution, ref: https://weblog.bulknews.net/stop-shipping-mymeta-to-cpan-b92215a227f6 1.8.9 Tue May 30 2017 - Patch / PR from kmx improving detection of OpenSSL libraries under strawberry Perl 1.8.8 Fri Nov 10 2017 - Patch from pi-rho exposing the Issuer's name hash; provide subject_hash() as an alias to hash() - Patch from stphnlyd X509_get0_signature() was introduced to openssl since 1.0.2. See https://www.openssl.org/docs/man1.1.0/crypto/X509_get0_signature.html - Patch from brandond fixing compilation on OpenSSL 1.0.1e - Patch to support compilation on MacOS Homebrew installed libraries by jonasbn - Patch from ppisar, patch redefines the accessors only with OpenSSL older than 1.1.0. - Patch from Sebastian Andrzej Siewior fixing compilation against openssl 1.1.0 and keeping it working against openssl 1.0.2j - Patch from jonasbn reinitializing inc/ using Module::Install 1.16, fixed issue with META.yml version since META.yml was not regenerated 1.8.7 Thu May 12 2016 - Patch from Bernhard M. Wiedemann to fix compilation errors. 1.8.6 Sat Jan 24 2015 - Patch from James Hunt to print OpenSSL version during tests. - Various MANIFEST fixes. 1.8.5 Sat Nov 22 2014 - Patch from Uli Scholler to expose more SHA1 hash functions. 1.8.4 Sun Dec 1 2013 - Fix Github Issues #16, #29 & #30 - Possibly fix issue #31 1.8.3 Mon Aug 12 05:50:58 PDT 2013 - Fix Github Issues #2, 10, 15, 17, 22, 23, 24 & 25 1.8.2 Sat May 7 20:19:58 PDT 2011 - Fix warnings under gcc 4.6 1.8.1 Sun Apr 17 06:57:09 PDT 2011 - Fix OpenSSL version check. 1.8 Wed Apr 13 06:22:30 PDT 2011 - Bump version to deal with CPAN/Perl versioning madness. 1.7.1 Tue Apr 5 20:07:48 PDT 2011 - Fix compile issue on i386, etc. 1.7 Tue Mar 29 19:58:08 PDT 2011 - Updates from David O'Callaghan to add pubkey, encoding & CRL functions. 1.6 Wed Jan 5 10:04:08 PST 2011 - Fix from Nicholas Harteau for -Wall error. Exhibited by -O2. - Update home page & bug tracker. 1.5 Fri Dec 24 14:39:20 PST 2010 - Fix call to utf_loclen to be compatible with CentOS Perl. (CPAN RT #62339) - Update Module::Install 1.4 Tue Aug 31 07:13:20 PDT 2010 - Fix new_from_string(). 1.3 Fri Aug 6 09:18:30 PDT 2010 - Fix fingerprint_sha1(). 1.2 Mon May 31 05:59:03 PDT 2010 - Compatible with OpenSSL v1.0.0 - Incompatible change: Removed fingerprint_md2 method. - Fix leaked memory on module END. 1.1 Fri May 21 17:10:28 PDT 2010 - Fix memory leak in sv_bio_final() (CPAN RT #57719) 1.0 Mon Jan 18 12:49:11 PST 2010 - Remove pub_exponent() and alias it to exponent(). 0.9 Mon Jan 18 11:02:26 PST 2010 - Patches from David O'Callaghan to access X509 extensions & documenation. - Patch from Otmar Lendl to allow UTF-8 chars in certificate names. - Patches from Louise Doran via David O'Callaghan. - Patch from Daniel Kahn Gillmor adding more examples in the POD SYNOPSIS - Patch from Daniel Kahn Gillmor adding the exponent() method. 0.8 Sat Nov 8 15:40:02 PST 2008 - Fix error message. 0.7 Sat May 17 00:49:28 PDT 2008 - Stop cpansmoke if libcrypto isn't installed. 0.6 Sat Feb 23 14:18:30 PST 2008 - RT #28684: Failed test 'use Crypt::OpenSSL::X509;' 0.5 Sat Jun 2 11:12:03 PDT 2007 - Fix manifest. 0.4 Wed Jan 3 17:19:10 PST 2007 - RT #13861 - patch from dsteinwand@citysearch.com - RT #8778 - Fix flags for X509_NAME_print_ex() 0.3.1 Mon Nov 22 23:20:43 PST 2004 - Patch from Daniel Risacher to add an email() method & doc additions. - Remove newline from hash() accessor. 0.3 Mon Oct 4 12:38:34 PDT 2004 - Patch from Otmar Lendl to remove NULL on fingerprint. 0.2 Fri Jan 30 11:36:36 PST 2004 - Handle ASN1/DER input. - Additional headers and cleanup. 0.1 Thu Jan 29 17:01:38 PST 2004 - Initial release. - Interoperates with Crypt::OpenSSL::Bignum & Crypt::OpenSSL::RSA 0.01 Wed Jan 28 15:53:18 2004 - original version; created by h2xs 1.22 with options -O -b 5.5.3 -a -k --skip-ppport --skip-warnings -c -n Crypt::OpenSSL::X509 Crypt-OpenSSL-X509-1.813/MANIFEST000644 000765 000024 00000001225 13365344736 016517 0ustar00jonasbnstaff000000 000000 certs/balt.pem certs/broken-utf8.pem certs/thawte-ec.pem certs/thawte.pem certs/turk.pem certs/vsign1.pem Changes hints/MSWin32.pl inc/Module/AutoInstall.pm inc/Module/Install.pm inc/Module/Install/AutoInstall.pm inc/Module/Install/Base.pm inc/Module/Install/Can.pm inc/Module/Install/Compiler.pm inc/Module/Install/External.pm inc/Module/Install/Fetch.pm inc/Module/Install/Include.pm inc/Module/Install/Makefile.pm inc/Module/Install/Metadata.pm inc/Module/Install/Win32.pm inc/Module/Install/WriteAll.pm Makefile.PL MANIFEST This list of files MANIFEST.SKIP META.yml README t/00-version.t t/pod.t t/utf8.t t/x509-ec.t t/x509.t TODO typemap X509.pm X509.xs Crypt-OpenSSL-X509-1.813/X509.xs000644 000765 000024 00000072526 13303327520 016403 0ustar00jonasbnstaff000000 000000 #include "EXTERN.h" #include "perl.h" #include "XSUB.h" #include #include #include #include #include #include #include #include #include #include #ifndef OPENSSL_NO_EC # include #endif /* from openssl/apps/apps.h */ #define FORMAT_UNDEF 0 #define FORMAT_ASN1 1 #define FORMAT_TEXT 2 #define FORMAT_PEM 3 #define FORMAT_PKCS12 5 #define FORMAT_SMIME 6 #define FORMAT_ENGINE 7 #define FORMAT_IISSGC 8 /* fake our package name */ typedef X509* Crypt__OpenSSL__X509; typedef X509_EXTENSION* Crypt__OpenSSL__X509__Extension; typedef ASN1_OBJECT* Crypt__OpenSSL__X509__ObjectID; typedef X509_NAME* Crypt__OpenSSL__X509__Name; typedef X509_NAME_ENTRY* Crypt__OpenSSL__X509__Name_Entry; typedef X509_CRL* Crypt__OpenSSL__X509__CRL; /* 1.0 backwards compat */ #if OPENSSL_VERSION_NUMBER < 0x10100000 #define const_ossl11 #ifndef sk_OPENSSL_STRING_num #define sk_OPENSSL_STRING_num sk_num #endif #ifndef sk_OPENSSL_STRING_value #define sk_OPENSSL_STRING_value sk_value #endif static ASN1_INTEGER *X509_get0_serialNumber(const X509 *a) { return a->cert_info->serialNumber; } static void RSA_get0_key(const RSA *r, const BIGNUM **n, const BIGNUM **e, const BIGNUM **d) { if (n != NULL) *n = r->n; if (e != NULL) *e = r->e; if (d != NULL) *d = r->d; } static RSA *EVP_PKEY_get0_RSA(EVP_PKEY *pkey) { if (pkey->type != EVP_PKEY_RSA) return NULL; return pkey->pkey.rsa; } static void X509_CRL_get0_signature(const X509_CRL *crl, const ASN1_BIT_STRING **psig, X509_ALGOR **palg) { if (psig != NULL) *psig = crl->signature; if (palg != NULL) *palg = crl->sig_alg; } #if OPENSSL_VERSION_NUMBER < 0x10002000 static void X509_get0_signature(const_ossl11 ASN1_BIT_STRING **psig, const_ossl11 X509_ALGOR **palg, const X509 *x) { if (psig != NULL) *psig = x->signature; if (palg != NULL) *palg = x->sig_alg; } #endif static void DSA_get0_pqg(const DSA *d, const BIGNUM **p, const BIGNUM **q, const BIGNUM **g) { if (p != NULL) *p = d->p; if (q != NULL) *q = d->q; if (g != NULL) *g = d->g; } static void DSA_get0_key(const DSA *d, const BIGNUM **pub_key, const BIGNUM **priv_key) { if (pub_key != NULL) *pub_key = d->pub_key; if (priv_key != NULL) *priv_key = d->priv_key; } static DSA *EVP_PKEY_get0_DSA(EVP_PKEY *pkey) { if (pkey->type != EVP_PKEY_DSA) return NULL; return pkey->pkey.dsa; } static EC_KEY *EVP_PKEY_get0_EC_KEY(EVP_PKEY *pkey) { if (pkey->type != EVP_PKEY_EC) return NULL; return pkey->pkey.ec; } #else #define const_ossl11 const #endif /* Unicode 0xfffd */ static U8 utf8_substitute_char[3] = { 0xef, 0xbf, 0xbd }; /* stolen from OpenSSL.xs */ long bio_write_cb(struct bio_st *bm, int m, const char *ptr, int l, long x, long y) { if (m == BIO_CB_WRITE) { SV *sv = (SV *) BIO_get_callback_arg(bm); sv_catpvn(sv, ptr, l); } if (m == BIO_CB_PUTS) { SV *sv = (SV *) BIO_get_callback_arg(bm); l = strlen(ptr); sv_catpvn(sv, ptr, l); } return l; } static BIO* sv_bio_create(void) { SV *sv = newSVpvn("", 0); /* create an in-memory BIO abstraction and callbacks */ BIO *bio = BIO_new(BIO_s_mem()); BIO_set_callback(bio, bio_write_cb); BIO_set_callback_arg(bio, (void *)sv); return bio; } static SV* sv_bio_final(BIO *bio) { SV* sv; (void)BIO_flush(bio); sv = (SV *)BIO_get_callback_arg(bio); BIO_set_callback_arg(bio, (void *)NULL); BIO_set_callback(bio, (void *)NULL); BIO_free_all(bio); if (!sv) sv = &PL_sv_undef; return sv; } /* call this just before sv_bio_final if the BIO got an UTF8 encoded text and you want native perl utf-8 strings. */ static SV* sv_bio_utf8_on(BIO *bio) { SV* sv = (SV *)BIO_get_callback_arg(bio); /* Illegal utf-8 in the string */ if (!sv_utf8_decode(sv)) { STRLEN len; SV *nsv = newSVpvn("", 0); const U8* start = (U8 *) SvPV(sv, len); const U8* end = start + len; const U8* cur; while ((start < end) && !is_utf8_string_loclen(start, len, &cur, 0)) { sv_catpvn(nsv, (const char*)start, (cur - start) + 1); /* text that was ok */ sv_catpvn(nsv, (const char*)utf8_substitute_char, 3); /* insert \x{fffd} */ start = cur + 1; len = end - cur; } if (start < end) { sv_catpvn(nsv, (const char*)start, (cur - start) - 1); /* rest of the string */ } sv_copypv(sv, nsv); SvREFCNT_dec(nsv); sv_utf8_decode(sv); /* should be ok now */ } return sv; } /* static void sv_bio_error(BIO *bio) { SV* sv = (SV *)BIO_get_callback_arg(bio); if (sv) sv_free(sv); BIO_free_all (bio); } */ static const char *ssl_error(void) { BIO *bio; SV *sv; STRLEN l; bio = sv_bio_create(); ERR_print_errors(bio); sv = sv_bio_final(bio); ERR_clear_error(); return SvPV(sv, l); } // Make a scalar ref to a class object static SV* sv_make_ref(const char* class, void* object) { SV* rv; rv = newSV(0); sv_setref_pv(rv, class, (void*) object); if (! sv_isa(rv, class) ) { croak("Error creating reference to %s", class); } return rv; } /* * hash of extensions from x509. * no_name can be * 0: index by long name, * 1: index by oid string, * 2: index by short name */ static HV* hv_exts(X509* x509, int no_name) { X509_EXTENSION *ext; int i, c, r; size_t len = 128; char* key = NULL; SV* rv; HV* RETVAL = newHV(); sv_2mortal((SV*)RETVAL); c = X509_get_ext_count(x509); if ( !(c > 0) ) { croak("No extensions found\n"); } for (i = 0; i < c; i++) { r = 0; ext = X509_get_ext(x509, i); if (ext == NULL) croak("Extension %d unavailable\n", i); rv = sv_make_ref("Crypt::OpenSSL::X509::Extension", (void*)ext); if (no_name == 0 || no_name == 1) { key = malloc(sizeof(char) * (len + 1)); /*FIXME will it leak?*/ r = OBJ_obj2txt(key, len, X509_EXTENSION_get_object(ext), no_name); } else if (no_name == 2) { key = (char*)OBJ_nid2sn(OBJ_obj2nid(X509_EXTENSION_get_object(ext))); r = strlen(key); } if (! hv_store(RETVAL, key, r, rv, 0) ) croak("Error storing extension in hash\n"); } return RETVAL; } MODULE = Crypt::OpenSSL::X509 PACKAGE = Crypt::OpenSSL::X509 PROTOTYPES: DISABLE BOOT: { HV *stash = gv_stashpvn("Crypt::OpenSSL::X509", 20, TRUE); struct { char *n; I32 v; } Crypt__OpenSSL__X509__const[] = { {"OPENSSL_VERSION_NUMBER", OPENSSL_VERSION_NUMBER}, {"FORMAT_UNDEF", FORMAT_UNDEF}, {"FORMAT_ASN1", FORMAT_ASN1}, {"FORMAT_TEXT", FORMAT_TEXT}, {"FORMAT_PEM", FORMAT_PEM}, {"FORMAT_PKCS12", FORMAT_PKCS12}, {"FORMAT_SMIME", FORMAT_SMIME}, {"FORMAT_ENGINE", FORMAT_ENGINE}, {"FORMAT_IISSGC", FORMAT_IISSGC}, {"V_ASN1_PRINTABLESTRING", V_ASN1_PRINTABLESTRING}, {"V_ASN1_UTF8STRING", V_ASN1_UTF8STRING}, {"V_ASN1_IA5STRING", V_ASN1_IA5STRING}, {Nullch,0}}; char *name; int i; for (i = 0; (name = Crypt__OpenSSL__X509__const[i].n); i++) { newCONSTSUB(stash, name, newSViv(Crypt__OpenSSL__X509__const[i].v)); } ERR_load_crypto_strings(); OPENSSL_add_all_algorithms_conf(); } Crypt::OpenSSL::X509 new(class) SV *class CODE: if ((RETVAL = X509_new()) == NULL) { croak("X509_new"); } if (!X509_set_version(RETVAL, 2)) { X509_free(RETVAL); croak ("%s - can't X509_set_version()", SvPV_nolen(class)); } ASN1_INTEGER_set(X509_get_serialNumber(RETVAL), 0L); OUTPUT: RETVAL Crypt::OpenSSL::X509 new_from_string(class, string, format = FORMAT_PEM) SV *class SV *string int format ALIAS: new_from_file = 1 PREINIT: BIO *bio; STRLEN len; char *cert; CODE: cert = SvPV(string, len); if (ix == 1) { bio = BIO_new_file(cert, "r"); } else { bio = BIO_new_mem_buf(cert, len); } if (!bio) croak("%s: Failed to create BIO", SvPV_nolen(class)); /* this can come in any number of ways */ if (format == FORMAT_ASN1) { RETVAL = (X509*)d2i_X509_bio(bio, NULL); } else { RETVAL = (X509*)PEM_read_bio_X509(bio, NULL, NULL, NULL); } BIO_free_all(bio); if (!RETVAL) croak("%s: failed to read X509 certificate.", SvPV_nolen(class)); OUTPUT: RETVAL void DESTROY(x509) Crypt::OpenSSL::X509 x509; PPCODE: if (x509) X509_free(x509); x509 = 0; # This is called via an END block in the Perl module to clean up initialization that happened in BOOT. void __X509_cleanup(void) PPCODE: CRYPTO_cleanup_all_ex_data(); ERR_free_strings(); #if OPENSSL_VERSION_NUMBER < 0x10100000 ERR_remove_state(0); #endif EVP_cleanup(); SV* accessor(x509) Crypt::OpenSSL::X509 x509; ALIAS: subject = 1 issuer = 2 serial = 3 hash = 4 subject_hash = 4 notBefore = 5 notAfter = 6 email = 7 version = 8 sig_alg_name = 9 key_alg_name = 10 issuer_hash = 11 PREINIT: BIO *bio; X509_NAME *name; CODE: bio = sv_bio_create(); /* this includes both subject and issuer since they are so much alike */ if (ix == 1 || ix == 2) { if (ix == 1) { name = X509_get_subject_name(x509); } else { name = X509_get_issuer_name(x509); } /* this is prefered over X509_NAME_oneline() */ X509_NAME_print_ex(bio, name, 0, (XN_FLAG_SEP_CPLUS_SPC | ASN1_STRFLGS_UTF8_CONVERT) & ~ASN1_STRFLGS_ESC_MSB); /* this need not be pure ascii, try to get a native perl character string with * utf8 */ sv_bio_utf8_on(bio); } else if (ix == 3) { i2a_ASN1_INTEGER(bio, X509_get0_serialNumber(x509)); } else if (ix == 4) { BIO_printf(bio, "%08lx", X509_subject_name_hash(x509)); } else if (ix == 5) { ASN1_TIME_print(bio, X509_get_notBefore(x509)); } else if (ix == 6) { ASN1_TIME_print(bio, X509_get_notAfter(x509)); } else if (ix == 7) { int j; STACK_OF(OPENSSL_STRING) *emlst = X509_get1_email(x509); for (j = 0; j < sk_OPENSSL_STRING_num(emlst); j++) { BIO_printf(bio, "%s", sk_OPENSSL_STRING_value(emlst, j)); } X509_email_free(emlst); } else if (ix == 8) { BIO_printf(bio, "%02ld", X509_get_version(x509)); } else if (ix == 9) { const_ossl11 X509_ALGOR *palg; const_ossl11 ASN1_OBJECT *paobj; X509_get0_signature(NULL, &palg, x509); X509_ALGOR_get0(&paobj, NULL, NULL, palg); i2a_ASN1_OBJECT(bio, paobj); } else if ( ix == 10 ) { X509_PUBKEY *pkey; ASN1_OBJECT *ppkalg; pkey = X509_get_X509_PUBKEY(x509); X509_PUBKEY_get0_param(&ppkalg, NULL, NULL, NULL, pkey); i2a_ASN1_OBJECT(bio, ppkalg); } else if ( ix == 11 ) { BIO_printf(bio, "%08lx", X509_issuer_name_hash(x509)); } RETVAL = sv_bio_final(bio); OUTPUT: RETVAL Crypt::OpenSSL::X509::Name subject_name(x509) Crypt::OpenSSL::X509 x509; ALIAS: subject_name = 1 issuer_name = 2 CODE: if (ix == 1) { RETVAL = X509_get_subject_name(x509); } else { RETVAL = X509_get_issuer_name(x509); } OUTPUT: RETVAL SV* sig_print(x509) Crypt::OpenSSL::X509 x509; PREINIT: BIO *bio; unsigned char *s; const_ossl11 ASN1_BIT_STRING *psig; int n,i; CODE: X509_get0_signature(&psig, NULL, x509); n = psig->length; s = psig->data; bio = sv_bio_create(); for (i=0; i 0)) { croak("No extensions found\n"); } else if (i >= c || i < 0) { croak("Requested extension index out of range\n"); } else { ext = X509_get_ext(x509, i); } if (ext == NULL) { // X509_EXTENSION_free(ext); // not needed? croak("Extension unavailable\n"); } RETVAL = ext; OUTPUT: RETVAL HV* extensions(x509) Crypt::OpenSSL::X509 x509 ALIAS: extensions_by_long_name = 0 extensions_by_oid = 1 extensions_by_name = 2 CODE: RETVAL = hv_exts(x509, ix); OUTPUT: RETVAL MODULE = Crypt::OpenSSL::X509 PACKAGE = Crypt::OpenSSL::X509::Extension int critical(ext) Crypt::OpenSSL::X509::Extension ext; CODE: if (ext == NULL) { croak("No extension supplied\n"); } RETVAL = X509_EXTENSION_get_critical(ext); OUTPUT: RETVAL Crypt::OpenSSL::X509::ObjectID object(ext) Crypt::OpenSSL::X509::Extension ext; CODE: if (ext == NULL) { croak("No extension supplied\n"); } RETVAL = X509_EXTENSION_get_object(ext); OUTPUT: RETVAL SV* value(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: BIO* bio; CODE: bio = sv_bio_create(); if (ext == NULL) { BIO_free_all(bio); croak("No extension supplied\n"); } ASN1_STRING_print_ex(bio, X509_EXTENSION_get_data(ext), ASN1_STRFLGS_DUMP_ALL); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL SV* to_string(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: BIO* bio; CODE: bio = sv_bio_create(); if (ext == NULL) { BIO_free_all(bio); croak("No extension supplied\n"); } X509V3_EXT_print(bio, ext, 0, 0); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL int basicC(ext, value) Crypt::OpenSSL::X509::Extension ext; char *value; PREINIT: BASIC_CONSTRAINTS *bs; int ret = 0; CODE: /* retrieve the value of CA or pathlen in basicConstraints */ bs = X509V3_EXT_d2i(ext); if (strcmp(value, "ca") == 0) { ret = bs->ca ? 1 : 0; } else if (strcmp(value, "pathlen") == 0) { ret = bs->pathlen ? 1 : 0; } BASIC_CONSTRAINTS_free(bs); RETVAL = ret; OUTPUT: RETVAL SV* ia5string(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: ASN1_IA5STRING *str; BIO *bio; CODE: /* retrieving the value of an ia5string object */ bio = sv_bio_create(); str = X509V3_EXT_d2i(ext); BIO_printf(bio,"%s", str->data); ASN1_IA5STRING_free(str); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL SV* bit_string(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: int i, nid; ASN1_OBJECT *object; ASN1_BIT_STRING *bit_str; int string[10]; BIO *bio; CODE: bio = sv_bio_create(); object = X509_EXTENSION_get_object(ext); nid = OBJ_obj2nid(object); bit_str = X509V3_EXT_d2i(ext); if (nid == NID_key_usage) { for (i = 0; i < 9; i++) { string[i] = (int)ASN1_BIT_STRING_get_bit(bit_str, i); BIO_printf(bio, "%d", string[i]); } } else if (nid == NID_netscape_cert_type) { for (i = 0; i < 8; i++) { string[i] = (int)ASN1_BIT_STRING_get_bit(bit_str, i); BIO_printf(bio, "%d", string[i]); } } RETVAL = sv_bio_final(bio); OUTPUT: RETVAL SV* extendedKeyUsage(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: BIO *bio; STACK_OF(ASN1_OBJECT) *extku; int nid; const char *value; CODE: bio = sv_bio_create(); extku = (STACK_OF(ASN1_OBJECT)*) X509V3_EXT_d2i(ext); while(sk_ASN1_OBJECT_num(extku) > 0) { nid = OBJ_obj2nid(sk_ASN1_OBJECT_pop(extku)); value = OBJ_nid2sn(nid); BIO_printf(bio, "%s", value); BIO_printf(bio, " "); } RETVAL = sv_bio_final(bio); OUTPUT: RETVAL int auth_att(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: AUTHORITY_KEYID *akid; CODE: akid = X509V3_EXT_d2i(ext); RETVAL = akid->keyid ? 1 : 0; OUTPUT: RETVAL SV* keyid_data(ext) Crypt::OpenSSL::X509::Extension ext; PREINIT: AUTHORITY_KEYID *akid; ASN1_OCTET_STRING *skid; int nid; ASN1_OBJECT *object; BIO *bio; CODE: bio = sv_bio_create(); object = X509_EXTENSION_get_object(ext); nid = OBJ_obj2nid(object); if (nid == NID_authority_key_identifier) { akid = X509V3_EXT_d2i(ext); BIO_printf(bio, "%s", akid->keyid->data); } else if (nid == NID_subject_key_identifier) { skid = X509V3_EXT_d2i(ext); BIO_printf(bio, "%s", skid->data); } RETVAL = sv_bio_final(bio); OUTPUT: RETVAL MODULE = Crypt::OpenSSL::X509 PACKAGE = Crypt::OpenSSL::X509::ObjectID char* name(obj) Crypt::OpenSSL::X509::ObjectID obj; PREINIT: char buf[128]; CODE: if (obj == NULL) { croak("No ObjectID supplied\n"); } (void)OBJ_obj2txt(buf, 128, obj, 0); RETVAL = buf; OUTPUT: RETVAL char* oid(obj) Crypt::OpenSSL::X509::ObjectID obj; PREINIT: char buf[128]; CODE: if (obj == NULL) { croak("No ObjectID supplied\n"); } (void)OBJ_obj2txt(buf, 128, obj, 1); RETVAL = buf; OUTPUT: RETVAL MODULE = Crypt::OpenSSL::X509 PACKAGE = Crypt::OpenSSL::X509::Name SV* as_string(name) Crypt::OpenSSL::X509::Name name; PREINIT: BIO *bio; CODE: bio = sv_bio_create(); /* this is prefered over X509_NAME_oneline() */ X509_NAME_print_ex(bio, name, 0, XN_FLAG_SEP_CPLUS_SPC); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL AV* entries(name) Crypt::OpenSSL::X509::Name name; PREINIT: int i, c; SV* rv; CODE: RETVAL = newAV(); sv_2mortal((SV*)RETVAL); c = X509_NAME_entry_count(name); for (i = 0; i < c; i++) { rv = sv_make_ref("Crypt::OpenSSL::X509::Name_Entry", (void*)X509_NAME_get_entry(name, i)); av_push(RETVAL, rv); } OUTPUT: RETVAL int get_index_by_type(name, type, lastpos = -1) Crypt::OpenSSL::X509::Name name; const char* type; int lastpos; ALIAS: get_index_by_long_type = 1 has_entry = 2 has_long_entry = 3 has_oid_entry = 4 get_index_by_oid_type = 5 PREINIT: int nid, i; CODE: if (ix == 1 || ix == 3) { nid = OBJ_ln2nid(type); } else if (ix == 4 || ix == 5) { nid = OBJ_obj2nid(OBJ_txt2obj(type, /*oid*/ 1)); } else { nid = OBJ_sn2nid(type); } if (!nid) { croak("Unknown type"); } i = X509_NAME_get_index_by_NID(name, nid, lastpos); if (ix == 2 || ix == 3 || ix == 4) { /* has_entry */ RETVAL = (i > lastpos)?1:0; } else { /* get_index */ RETVAL = i; } OUTPUT: RETVAL Crypt::OpenSSL::X509::Name_Entry get_entry_by_type(name, type, lastpos = -1) Crypt::OpenSSL::X509::Name name; const char* type; int lastpos; ALIAS: get_entry_by_long_type = 1 PREINIT: int nid, i; CODE: if (ix == 1) { nid = OBJ_ln2nid(type); } else { nid = OBJ_sn2nid(type); } if (!nid) { croak("Unknown type"); } i = X509_NAME_get_index_by_NID(name, nid, lastpos); RETVAL = X509_NAME_get_entry(name, i); OUTPUT: RETVAL MODULE = Crypt::OpenSSL::X509 PACKAGE = Crypt::OpenSSL::X509::Name_Entry SV* as_string(name_entry, ln = 0) Crypt::OpenSSL::X509::Name_Entry name_entry; int ln; ALIAS: as_long_string = 1 PREINIT: BIO *bio; const char *n; int nid; CODE: bio = sv_bio_create(); nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(name_entry)); if (ix == 1 || ln) { n = OBJ_nid2ln(nid); } else { n = OBJ_nid2sn(nid); } BIO_printf(bio, "%s=", n); ASN1_STRING_print_ex(bio, X509_NAME_ENTRY_get_data(name_entry), ASN1_STRFLGS_UTF8_CONVERT & ~ASN1_STRFLGS_ESC_MSB); sv_bio_utf8_on(bio); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL SV* type(name_entry, ln = 0) Crypt::OpenSSL::X509::Name_Entry name_entry; int ln; ALIAS: long_type = 1 PREINIT: BIO *bio; const char *n; int nid; CODE: bio = sv_bio_create(); nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(name_entry)); if (ix == 1 || ln) { n = OBJ_nid2ln(nid); } else { n = OBJ_nid2sn(nid); } BIO_printf(bio, "%s", n); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL SV* value(name_entry) Crypt::OpenSSL::X509::Name_Entry name_entry; PREINIT: BIO *bio; CODE: bio = sv_bio_create(); ASN1_STRING_print(bio, X509_NAME_ENTRY_get_data(name_entry)); RETVAL = sv_bio_final(bio); OUTPUT: RETVAL int is_printableString(name_entry, asn1_type = V_ASN1_PRINTABLESTRING) Crypt::OpenSSL::X509::Name_Entry name_entry; int asn1_type; ALIAS: is_asn1_type = 1 is_printableString = V_ASN1_PRINTABLESTRING is_ia5string = V_ASN1_IA5STRING is_utf8string = V_ASN1_UTF8STRING CODE: RETVAL = (X509_NAME_ENTRY_get_data(name_entry)->type == (ix == 1 ? asn1_type : ix)); OUTPUT: RETVAL char* encoding(name_entry) Crypt::OpenSSL::X509::Name_Entry name_entry; CODE: RETVAL = NULL; if (X509_NAME_ENTRY_get_data(name_entry)->type == V_ASN1_PRINTABLESTRING) { RETVAL = "printableString"; } else if(X509_NAME_ENTRY_get_data(name_entry)->type == V_ASN1_IA5STRING) { RETVAL = "ia5String"; } else if(X509_NAME_ENTRY_get_data(name_entry)->type == V_ASN1_UTF8STRING) { RETVAL = "utf8String"; } OUTPUT: RETVAL MODULE = Crypt::OpenSSL::X509 PACKAGE = Crypt::OpenSSL::X509_CRL Crypt::OpenSSL::X509::CRL new_from_crl_string(class, string, format = FORMAT_PEM) SV *class; SV *string; int format; ALIAS: new_from_crl_file = 1 PREINIT: BIO *bio; STRLEN len; char *crl; CODE: crl = SvPV(string, len); if (ix == 1) { bio = BIO_new_file(crl, "r"); } else { bio = BIO_new_mem_buf(crl, len); } if (!bio) { croak("%s: Failed to create BIO", SvPV_nolen(class)); } if (format == FORMAT_ASN1) { RETVAL = (X509_CRL*)d2i_X509_CRL_bio(bio, NULL); } else { RETVAL = (X509_CRL*)PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL); } if (!RETVAL) { croak("%s: failed to read X509 certificate.", SvPV_nolen(class)); } BIO_free(bio); OUTPUT: RETVAL SV* CRL_accessor(crl) Crypt::OpenSSL::X509::CRL crl; ALIAS: CRL_issuer = 1 CRL_sig_alg_name = 2 PREINIT: BIO *bio; X509_NAME *name; CODE: bio = sv_bio_create(); if (ix == 1) { name = X509_CRL_get_issuer(crl); sv_bio_utf8_on(bio); X509_NAME_print_ex(bio, name, 0, (XN_FLAG_SEP_CPLUS_SPC | ASN1_STRFLGS_UTF8_CONVERT) & ~ASN1_STRFLGS_ESC_MSB); RETVAL = sv_bio_final(bio); } else if (ix == 2) { const_ossl11 X509_ALGOR *palg; const_ossl11 ASN1_OBJECT *paobj; X509_CRL_get0_signature(crl, NULL, &palg); X509_ALGOR_get0(&paobj, NULL, NULL, palg); i2a_ASN1_OBJECT(bio, paobj); } RETVAL = sv_bio_final(bio); OUTPUT: RETVAL Crypt-OpenSSL-X509-1.813/t/000755 000765 000024 00000000000 13554375627 015634 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/README000644 000765 000024 00000002115 13554375251 016241 0ustar00jonasbnstaff000000 000000 Crypt/OpenSSL/X509 version 1.8.13 =============================== The README is used to introduce the module and provide instructions on how to install the module, any machine dependencies it may have (for example C compilers and installed libraries) and any other information that should be provided before the module is installed. A README file is required for CPAN modules since CPAN extracts the README file from a module distribution so that people browsing the archive can use it get an idea of the modules uses. It is usually a good idea to provide version information here so that people can decide whether fixes for the module are worth downloading. INSTALLATION To install this module type the following: perl Makefile.PL make make test make install DEPENDENCIES This module requires these other modules and libraries: OpenSSL Development Libs COPYRIGHT AND LICENCE Put the correct copyright and licence information here. Copyright (C) 2004-2019 Dan Sully This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself. Crypt-OpenSSL-X509-1.813/TODO000644 000765 000024 00000000144 13303327520 016035 0ustar00jonasbnstaff000000 000000 Purpose printing - put into a hash. Better error handling. Setter methods. Private key handling. Crypt-OpenSSL-X509-1.813/typemap000644 000765 000024 00000000341 13303327520 016746 0ustar00jonasbnstaff000000 000000 Crypt::OpenSSL::X509 T_PTROBJ Crypt::OpenSSL::X509::Extension T_PTROBJ Crypt::OpenSSL::X509::ObjectID T_PTROBJ Crypt::OpenSSL::X509::Name T_PTROBJ Crypt::OpenSSL::X509::Name_Entry T_PTROBJ Crypt::OpenSSL::X509::CRL T_PTROBJ Crypt-OpenSSL-X509-1.813/certs/000755 000765 000024 00000000000 13554375627 016511 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/MANIFEST.SKIP000644 000765 000024 00000000204 13365344722 017253 0ustar00jonasbnstaff000000 000000 \B\.git\b \B\.gitignore \B.vstags \B.github \.gz \.tar \.bak .travis.yml ^Makefile$ blib/ X509.bs X509.c X509.o pm_to_blib MYMETA.* Crypt-OpenSSL-X509-1.813/META.yml000644 000765 000024 00000001320 13554375447 016636 0ustar00jonasbnstaff000000 000000 --- abstract: "Perl extension to OpenSSL's X509 API." author: - 'Dan Sully' build_requires: ExtUtils::MakeMaker: 6.36 configure_requires: ExtUtils::MakeMaker: 6.36 distribution_type: module dynamic_config: 1 generated_by: 'Module::Install version 1.19' license: perl meta-spec: url: http://module-build.sourceforge.net/META-spec-v1.4.html version: 1.4 name: Crypt-OpenSSL-X509 no_index: directory: - inc - t requires: perl: '5.005' resources: bugtracker: https://github.com/dsully/perl-crypt-openssl-x509/issues homepage: https://github.com/dsully/perl-crypt-openssl-x509 license: http://dev.perl.org/licenses/ repository: https://github.com/dsully/perl-crypt-openssl-x509 version: '1.813' Crypt-OpenSSL-X509-1.813/Makefile.PL000644 000765 000024 00000001600 13554375024 017327 0ustar00jonasbnstaff000000 000000 use lib '.'; use inc::Module::Install; use Config; name('Crypt-OpenSSL-X509'); license('perl'); perl_version('5.005'); all_from('X509.pm'); homepage 'https://github.com/dsully/perl-crypt-openssl-x509'; repository 'https://github.com/dsully/perl-crypt-openssl-x509'; bugtracker 'https://github.com/dsully/perl-crypt-openssl-x509/issues'; requires_external_cc(); inc '-I/usr/local/opt/openssl/include -I/usr/local/include/openssl -I/usr/include/openssl -I/usr/local/include/ssl -I/usr/local/ssl/include'; libs '-L/usr/local/opt/openssl/lib -L/usr/local/lib -L/usr/lib -L/usr/local/ssl/lib -lcrypto -lssl'; if ($Config::Config{myuname} =~ /darwin/i) { cc_optimize_flags('-O2 -g -Wall -Werror -Wno-deprecated-declarations'); } elsif ($Config::Config{myuname} =~ /sunos|solaris/i) { # Any SunStudio flags? } else { cc_optimize_flags('-O2 -g -Wall -Werror'); } auto_install(); WriteAll(); Crypt-OpenSSL-X509-1.813/hints/000755 000765 000024 00000000000 13554375627 016516 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/hints/MSWin32.pl000755 000765 000024 00000000434 13303327520 020176 0ustar00jonasbnstaff000000 000000 use Config; if (my $libs = `pkg-config --libs libcrypto 2>nul`) { # strawberry perl has pkg-config $self->{LIBS} = [ $libs ]; } else { $self->{LIBS} = ['-llibeay32'] if $Config{cc} =~ /cl/; # msvc with ActivePerl $self->{LIBS} = ['-leay32'] if $Config{gccversion}; # gcc } Crypt-OpenSSL-X509-1.813/certs/turk.pem000644 000765 000024 00000002774 13303327520 020170 0ustar00jonasbnstaff000000 000000 -----BEGIN CERTIFICATE----- MIIEPDCCAySgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBvjE/MD0GA1UEAww2 VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xh ecSxY8Sxc8SxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMV0wWwYD VQQKDFRUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0g R8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLiAoYykgS2FzxLFtIDIwMDUw HhcNMDUxMTA3MTAwNzU3WhcNMTUwOTE2MTAwNzU3WjCBvjE/MD0GA1UEAww2 VMOcUktUUlVTVCBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xh ecSxY8Sxc8SxMQswCQYDVQQGEwJUUjEPMA0GA1UEBwwGQW5rYXJhMV0wWwYD VQQKDFRUw5xSS1RSVVNUIEJpbGdpIMSwbGV0acWfaW0gdmUgQmlsacWfaW0g R8O8dmVubGnEn2kgSGl6bWV0bGVyaSBBLsWeLiAoYykgS2FzxLFtIDIwMDUw ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCpNn7DkUNMwxmYCMjH WHtPFoylzkkBH3MOrHUTpvqeLCDe2JAOCtFp0if7qnefJ1Il4std2NiDUBd9 irWCPwSOtNXwSadktx4uXyCcUHVPr+G1QRT0mJKIx+XlZEdhR3n9wFHxwZnn 3M5q+6+1ATDcRhzviuyV79z/rxAc653YsKpqhRgNF8k+v/Gb0AmJQv2gQrSd iVFVKc8bcLyEVK3BEx+Y9C52YItdP5qtygy/p1Zbj3e41Z55SZI/4PGXJHps mxcPbe9TmJEr5A++WXkHeLuXlfSfadRYhwqp48y2WBmfJiGxxFmNskF1wK1p zpwACPI2/z7woQ8arBT9pmAPAgMBAAGjQzBBMB0GA1UdDgQWBBTZN7NOBf3Z z58SFq62iS/rJTqIHDAPBgNVHQ8BAf8EBQMDBwYAMA8GA1UdEwEB/wQFMAMB Af8wDQYJKoZIhvcNAQEFBQADggEBAHJglrfJ3NgpXiOFX7KzLXb7iNcX/ntt Rbj2hWyfIvwqECLsqrkw9qtY1jkQMZkpAL2JZkH7dN6RwRgLn7Vhy506vvWo lKMiVW4XSf/SKfE4Jl3vpao6+XF75tpYHdN0wgH6PmlYX63LaL4ULptswLbc oCb6dxriJNoaN+BnrdFzgw2lGh1uEpJ+hGIAF728JRhX8tepb1mIvDS3LoV4 nZbcFMMsilKbloxSZj2GFotHuFEJjOp9zYhys2AzsfAKRO8P9Qk3iCQOLGsg OqL6EfJANZxEaGM7rDNvY7wsu/LSy3Z9fYjYHcgFHW68lKlmjHdxx/qR+i9R nuk5UrbnBEI= -----END CERTIFICATE----- Crypt-OpenSSL-X509-1.813/certs/balt.pem000644 000765 000024 00000002402 13303327520 020111 0ustar00jonasbnstaff000000 000000 -----BEGIN CERTIFICATE----- MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp -----END CERTIFICATE----- Crypt-OpenSSL-X509-1.813/certs/thawte-ec.pem000644 000765 000024 00000001654 13303327520 021060 0ustar00jonasbnstaff000000 000000 -----BEGIN CERTIFICATE----- MIICiDCCAg2gAwIBAgIQNfwmXNmET8k9Jj1Xm67XVjAKBggqhkjOPQQDAzCBhDEL MAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjE4MDYGA1UECxMvKGMp IDIwMDcgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAi BgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMjAeFw0wNzExMDUwMDAw MDBaFw0zODAxMTgyMzU5NTlaMIGEMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhh d3RlLCBJbmMuMTgwNgYDVQQLEy8oYykgMjAwNyB0aGF3dGUsIEluYy4gLSBGb3Ig YXV0aG9yaXplZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9v dCBDQSAtIEcyMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEotWcgnuVnfFSeIf+iha/ BebfowJPDQfGAFG6DAJSLSKkQjnE/o/qycG+1E3/n3qe4rF8mq2nhglzh9HnmuN6 papu+7qzcMBniKI11KOasf2twu8x+qi58/sIxpHR+ymVo0IwQDAPBgNVHRMBAf8E BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUmtgAMADna3+FGO6Lts6K DPgR4bswCgYIKoZIzj0EAwMDaQAwZgIxAN344FdHW6fmCsO99YCKlzUNG4k8VIZ3 KMqh9HneteY4sPBlcIx/AlTCv//YoT7ZzwIxAMSNlPzcU9LcnXgWHxUzI1NS41ox XZ3Krr0TKUQNJ1uo52icEvdYPy5yAlejj6EULg== -----END CERTIFICATE----- Crypt-OpenSSL-X509-1.813/certs/vsign1.pem000644 000765 000024 00000001730 13303327520 020401 0ustar00jonasbnstaff000000 000000 subject=/C=US/O=VeriSign, Inc./OU=Class 1 Public Primary Certification Authority notBefore=Jan 29 00:00:00 1996 GMT notAfter=Jan 7 23:59:59 2020 GMT -----BEGIN CERTIFICATE----- MIICPDCCAaUCEDJQM89Q0VbzXIGtZVxPyCUwDQYJKoZIhvcNAQECBQAwXzELMAkG A1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTcwNQYDVQQLEy5DbGFz cyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk2 MDEyOTAwMDAwMFoXDTIwMDEwNzIzNTk1OVowXzELMAkGA1UEBhMCVVMxFzAVBgNV BAoTDlZlcmlTaWduLCBJbmMuMTcwNQYDVQQLEy5DbGFzcyAxIFB1YmxpYyBQcmlt YXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGfMA0GCSqGSIb3DQEBAQUAA4GN ADCBiQKBgQDlGb9to1ZhLZlIcfZn3rmN67eehoAKkQ76OCWvRoiC5XOooJskXQ0f zGVuDLDQVoQYh5oGmxChc9+0WDlrbsH2FdWoqD+qEgaNMax/sDTXjzRniAnNFBHi TkVWaR94AoDa3EeRKbs2yWNcxeDXLYd7obcysHswuiovMaruo2fa2wIDAQABMA0G CSqGSIb3DQEBAgUAA4GBAEtEZmBoZOSYG/OwcuaViXzde7OVwB0u2NgZ0C00PcZQ mhCGjKo/O6gE/DdSlcPZydvN8oYGxLEb8IKIMEKOF1AcZHq4PplJdJf8rAJD+5YM VgQlDHx8h50kp9jwMim1pN9dokzFFjKoQvZFprY2ueC/ZTaTwtLXa9zeWdaiNfhF -----END CERTIFICATE----- Crypt-OpenSSL-X509-1.813/certs/thawte.pem000644 000765 000024 00000002147 13303327520 020471 0ustar00jonasbnstaff000000 000000 -----BEGIN CERTIFICATE----- MIIDEzCCAnygAwIBAgIBATANBgkqhkiG9w0BAQQFADCBxDELMAkGA1UEBhMCWkEx FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYD VQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlv biBTZXJ2aWNlcyBEaXZpc2lvbjEZMBcGA1UEAxMQVGhhd3RlIFNlcnZlciBDQTEm MCQGCSqGSIb3DQEJARYXc2VydmVyLWNlcnRzQHRoYXd0ZS5jb20wHhcNOTYwODAx MDAwMDAwWhcNMjAxMjMxMjM1OTU5WjCBxDELMAkGA1UEBhMCWkExFTATBgNVBAgT DFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYDVQQKExRUaGF3 dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNl cyBEaXZpc2lvbjEZMBcGA1UEAxMQVGhhd3RlIFNlcnZlciBDQTEmMCQGCSqGSIb3 DQEJARYXc2VydmVyLWNlcnRzQHRoYXd0ZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQAD gY0AMIGJAoGBANOkUG7I/1Zr5s9dtuoMaHVHoqrC2oQl/Kj0R1HahbUgdJSGHg91 yekIYfUGbTBuFRkC6VLAYttNmZ7iagxEOM3+vuNkCXDF/rFrKbYvScg71CcEJRCX L+eQbcAoQpnXTEPew/UhbVSfXcNY4cDk2VuwuNy0e982OsK1ZiIS1ocNAgMBAAGj EzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAB/pMaVz7lcxG 7oWDTSEwjsrZqG9JGubaUeNgcGyEYRGhGshIPllDfU+VPaGLtwtimHp1it2ITk6e QNuozDJ0uW8NxuOzRAvZim+aKZuZGCg70eNAKJpaPNW15yAbi8qkq43pUdniTCxZ qdq5snUb9kLy78fyGPmJvKP/iiMucEc= -----END CERTIFICATE----- Crypt-OpenSSL-X509-1.813/certs/broken-utf8.pem000644 000765 000024 00000002443 13303327520 021340 0ustar00jonasbnstaff000000 000000 -----BEGIN CERTIFICATE----- MIIDnTCCAwagAwIBAgIQKQM11+L1GhYKQbep8+Y5ujANBgkqhkiG9w0BAQQFADCB zjELMAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJ Q2FwZSBUb3duMR0wGwYDVQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UE CxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjEhMB8GA1UEAxMYVGhh d3RlIFByZW1pdW0gU2VydmVyIENBMSgwJgYJKoZIhvcNAQkBFhlwcmVtaXVtLXNl cnZlckB0aGF3dGUuY29tMB4XDTA2MDIwOTA4NTQxN1oXDTA3MDIwOTA4NTQxN1ow gaExCzAJBgNVBAYTAlBMMRQwEgYDVQQIEwttYXpvd2llY2tpZTERMA8GA1UEBxMI V2Fyc3phd2ExPDA6BgNVBAoTM0QuQS5TLiBUb3dhcnp5c3R3byBVYmV6cGllY3pl biBPY2hyb255IFByYXduZWogUy5BLjEaMBgGA1UECwwRRHppYbMgSW5mb3JtYXR5 a2kxDzANBgNVBAMTBmRhcy5wbDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA uoJe0XE1mffdXAzATnDFxrrj/dvOj9vEAT2M1JmCHJw01QBgfepXeBZp8AUjT1f3 j1oQfRkHdpzkxK+R/1JPeABaRvoCU63HmhHCcAyQNPXeUa6MZq02yVdovOiPnjJw fkr2q9z8g2Vj62OZ1dtV+L/9k3cghf6jbcGDgOeCjkcCAwEAAaOBpjCBozAdBgNV HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwQAYDVR0fBDkwNzA1oDOgMYYvaHR0 cDovL2NybC50aGF3dGUuY29tL1RoYXd0ZVByZW1pdW1TZXJ2ZXJDQS5jcmwwMgYI KwYBBQUHAQEEJjAkMCIGCCsGAQUFBzABhhZodHRwOi8vb2NzcC50aGF3dGUuY29t MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQEEBQADgYEAgioOTV4f3NOSDYu1LwDm cMYG+wvRqZey7q+jJ06svqDz/YnYoe6f3QgEOkTjD+k/pIsRJrYHMfPHAUMU9x0Y twjvj0wm7NcCMzwwvFPCxNB4IhJJkOaaFHtHrV6mhsEPWA8aFk6JBD2rHz+BWeuW K/AytfjIuhll4Rw22RZu1Gg= -----END CERTIFICATE----- Crypt-OpenSSL-X509-1.813/t/pod.t000644 000765 000024 00000000201 13303327520 016551 0ustar00jonasbnstaff000000 000000 use Test::More; eval "use Test::Pod 1.00"; plan skip_all => "Test::Pod 1.00 required for testing POD" if $@; all_pod_files_ok(); Crypt-OpenSSL-X509-1.813/t/x509-ec.t000644 000765 000024 00000001027 13303327520 017070 0ustar00jonasbnstaff000000 000000 use Test::More tests => 7; BEGIN { use_ok('Crypt::OpenSSL::X509') }; my $x509 = Crypt::OpenSSL::X509->new_from_file('certs/thawte-ec.pem'); isa_ok($x509, 'Crypt::OpenSSL::X509'); my $type = $x509->pubkey_type; SKIP: { skip 'Test irrelevant without ec-support in openssl', 5 unless defined($type); is($type, 'ec', 'ec type'); is($x509->sig_alg_name, 'ecdsa-with-SHA384', 'sig algo'); is($x509->key_alg_name, 'id-ecPublicKey', 'key algo'); ok($x509->bit_length == 384, 'bit length'); is($x509->curve, 'secp384r1', 'curve'); } Crypt-OpenSSL-X509-1.813/t/00-version.t000644 000765 000024 00000000206 13303327520 017676 0ustar00jonasbnstaff000000 000000 use Test::More tests => 1; my $version = qx(openssl version); diag "Running Crypt::OpenSSL::X509 test suite against $version"; ok(1); Crypt-OpenSSL-X509-1.813/t/x509.t000644 000765 000024 00000013317 13303327520 016510 0ustar00jonasbnstaff000000 000000 use Test::More tests => 56; BEGIN { use_ok('Crypt::OpenSSL::X509') }; ok(my $x509 = Crypt::OpenSSL::X509->new_from_file('certs/vsign1.pem'), 'new_from_file()'); ok($x509->serial() eq '325033CF50D156F35C81AD655C4FC825', 'serial()'); ok($x509->fingerprint_md5() eq '51:86:E8:1F:BC:B1:C3:71:B5:18:10:DB:5F:DC:F6:20', 'fingerprint_md5()'); ok($x509->fingerprint_sha1() eq '78:E9:DD:06:50:62:4D:B9:CB:36:B5:07:67:F2:09:B8:43:BE:15:B3', 'fingerprint_sha1()'); ok($x509->fingerprint_sha224() eq '8F:18:C1:5A:56:E2:24:E4:32:F4:36:CF:2F:EA:C3:50:5A:13:C4:C9:43:B3:94:8A:C2:91:A4:C0', 'fingerprint_sha224()'); ok($x509->fingerprint_sha256() eq '13:B8:4A:BA:EC:A3:DE:8C:71:9A:06:7D:E8:CF:18:5F:65:DC:19:E0:3E:BD:92:C2:0B:D3:8C:75:09:7B:E1:13', 'fingerprint_sha256()'); ok($x509->fingerprint_sha384() eq 'B7:7D:3C:C4:0B:C6:09:76:2B:83:69:3A:38:0F:67:DD:14:8E:C7:AA:EC:49:FC:63:FD:CB:15:7D:F5:B3:41:B6:4D:78:59:CE:50:E8:EE:6D:9A:F3:22:22:B4:00:EB:41', 'fingerprint_sha384()'); ok($x509->fingerprint_sha512() eq 'DA:8E:92:6E:96:4C:BA:50:A7:2D:57:09:E4:07:E3:79:3A:CD:19:F9:76:1E:FA:85:20:98:9C:A7:19:D6:09:B8:51:E9:DE:8E:D1:A0:65:C8:83:3F:D1:7E:38:FF:DD:43:91:AC:07:4B:4E:B3:82:9B:39:A6:94:81:99:73:E7:A2', 'fingerprint_sha512()'); ok($x509->exponent() eq '10001', 'exponent()'); ok($x509->pub_exponent() eq '10001', 'pub_exponent()'); # Alias ok($x509->issuer() eq 'C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority', 'issuer()'); ok($x509->subject() eq 'C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority', 'subject()'); ok($x509->is_selfsigned(), 'is_selfsigned()'); # For some reason the hash hash changed with v1.0.0 # Verified with the openssl binary. if (Crypt::OpenSSL::X509::OPENSSL_VERSION_NUMBER >= 0x10000000) { ok($x509->hash() eq '24ad0b63', 'hash()'); ok($x509->subject_hash() eq '24ad0b63', 'subject_hash()'); ok($x509->issuer_hash() eq '24ad0b63', 'issuer_hash()'); } else { ok($x509->hash() eq '2edf7016', 'hash()'); ok($x509->subject_hash() eq '2edf7016', 'subject_hash()'); ok($x509->issuer_hash() eq '2edf7016', 'issuer_hash()'); } ok($x509 = Crypt::OpenSSL::X509->new_from_file('certs/thawte.pem'), 'new_from_file()'); ok($x509->email() eq 'server-certs@thawte.com', 'email()'); is($x509->version, '02', 'version'); is($x509->sig_alg_name, 'md5WithRSAEncryption', 'signature algorithm'); is($x509->key_alg_name, 'rsaEncryption', 'key algorithm'); is($x509->bit_length, 1024, 'bit_length()'); ok($x509->num_extensions() eq '1', 'num_extensions()'); ok($exts = $x509->extensions_by_oid(), 'extension_by_oid()'); ok($x509->has_extension_oid("2.5.29.19"), 'has_extension_oid(2.5.29.19)'); is($$exts{"2.5.29.19"}->object()->name(),"X509v3 Basic Constraints", "Extension->object()->name()"); ok($$exts{"2.5.29.19"}->is_critical(), "basic constraints is critical"); ok($$exts{"2.5.29.19"}->basicC("ca"), 'basicConstraints CA: TRUE 2.4.1'); ok($x509_b = Crypt::OpenSSL::X509->new_from_file('certs/balt.pem'), 'new_from_file()'); ok(my $exts_b = $x509_b->extensions_by_name(), "extensions_by_name()"); ok(not($$exts_b{'subjectKeyIdentifier'}->is_critical()), "subjectKeyIdentifier not critical"); my $subkeyid = (join ":", map{sprintf "%X", ord($_)} split //, $$exts_b{'subjectKeyIdentifier'}->keyid_data()); ok($subkeyid eq "E5:9D:59:30:82:47:58:CC:AC:FA:8:54:36:86:7B:3A:B5:4:4D:F0", "Extension{subjectKeyID}->keyid_data()"); ok($$exts_b{'keyUsage'}->is_critical(), "keyUsage is critical"); my %key_hash = $$exts_b{'keyUsage'}->hash_bit_string(); ok($key_hash{'Certificate Sign'}, "Extension->hash_bit_string()"); isa_ok($x509->subject_name(), "Crypt::OpenSSL::X509::Name", 'subject_name()'); isa_ok($x509->issuer_name(), "Crypt::OpenSSL::X509::Name", 'issuer_name()'); is($x509->subject_name()->as_string(), 'C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA, emailAddress=server-certs@thawte.com', 'subject_name()->as_string()'); is($x509->issuer_name()->as_string(), 'C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA, emailAddress=server-certs@thawte.com', 'issuer_name()->as_string()'); ok(my $subject_name_entries = $x509->subject_name()->entries(), 'subject_name()->entries()'); is(@$subject_name_entries[0]->as_string(),"C=ZA",'Name_Entry->as_string()'); is(@$subject_name_entries[2]->as_long_string(),"localityName=Cape Town",'Name_Entry->as_long_string()'); is(@$subject_name_entries[1]->type(),"ST",'Name_Entry->type'); is(@$subject_name_entries[1]->long_type(),"stateOrProvinceName",'Name_Entry->long_type'); is(@$subject_name_entries[1]->value(),"Western Cape",'Name_Entry->value'); ok($x509->subject_name()->has_entry("ST"),'Name->has_entry'); ok($x509->subject_name()->has_long_entry("stateOrProvinceName"),'Name->has_entry'); ok($x509->subject_name()->has_oid_entry("2.5.4.3"),'Name->has_oid_entry([CN])'); ok(not($x509->subject_name()->has_oid_entry("0.9.2342.19200300.100.1.25")),'not Name->has_oid_entry([DC])'); is($x509->subject_name()->get_index_by_type("ST"),1,'Name->get_index_by_type'); is($x509->subject_name()->get_index_by_long_type("localityName"),2,'Name->get_index_by_long_type'); isa_ok($x509->subject_name()->get_entry_by_type("ST"),"Crypt::OpenSSL::X509::Name_Entry",'Name->get_entry_by_type'); ok($x509->subject_name()->get_entry_by_type("ST")->is_printableString(),'Name_Entry->is_printableString'); ok(not($x509->subject_name()->get_entry_by_type("ST")->is_asn1_type(Crypt::OpenSSL::X509::V_ASN1_UTF8STRING)),'Name_Entry->is_asn1_type'); # Check new_from_string / as_string round trip. { my $x509 = Crypt::OpenSSL::X509->new_from_string( Crypt::OpenSSL::X509->new_from_file('certs/balt.pem')->as_string(1), 1); ok($x509); ok($x509->serial() eq '020000B9', 'serial()'); } Crypt-OpenSSL-X509-1.813/t/utf8.t000644 000765 000024 00000003255 13303327520 016671 0ustar00jonasbnstaff000000 000000 use Test::More tests => 11; use Encode; binmode(STDOUT, ":utf8"); binmode(STDERR, ":utf8"); # use Devel::Peek; my $debug = 0; BEGIN { use_ok('Crypt::OpenSSL::X509') }; my ($x509, $sub); ###### first a pure ascii cert ##### ok($x509 = Crypt::OpenSSL::X509->new_from_file('certs/vsign1.pem'), 'new_from_file()'); $sub = $x509->subject(); Dump($sub) if ($debug); ok(! utf8::is_utf8($sub), "ascii subject should not be an utf8 string"); ###### then a hardcore UTF8 cert ##### ok($x509 = Crypt::OpenSSL::X509->new_from_file('certs/turk.pem'), 'new_from_file()'); ok($x509->serial() eq '01', 'serial()'); ok($x509->fingerprint_md5() eq '37:A5:6E:D4:B1:25:84:97:B7:FD:56:15:7A:F9:A2:00', 'fingerprint_md5()'); $sub = $x509->subject(); Dump($sub) if ($debug); my $sub_ok = "CN=T\x{dc}RKTRUST Elektronik Sertifika Hizmet Sa\x{11f}lay\x{131}c\x{131}s\x{131}, C=TR, L=Ankara, O=T\x{dc}RKTRUST Bilgi \x{130}leti\x{15f}im ve Bili\x{15f}im G\x{fc}venli\x{11f}i Hizmetleri A.\x{15e}. (c) Kas\x{131}m 2005"; ok(utf8::is_utf8($sub), "subject is really an utf8 string"); is($sub, $sub_ok, "utf8 subject as expected"); ###### and a broken UTF8 cert ##### # OpenSSL v1.0.0 (and higher?) fails to read this cert. SKIP: { skip "OpenSSL v1.0.0 can't read broken certs.", 3 if Crypt::OpenSSL::X509::OPENSSL_VERSION_NUMBER >= 0x10000000; ok($x509 = Crypt::OpenSSL::X509->new_from_file('certs/broken-utf8.pem'), 'new_from_file()'); $sub = $x509->subject(); Dump($sub) if ($debug); ok(utf8::is_utf8($sub), "subject is utf8"); is($sub, "C=PL, ST=mazowieckie, L=Warszawa, O=D.A.S. Towarzystwo Ubezpieczen Ochrony Prawnej S.A., OU=Dzi\x{fffd} Informatyki, CN=das.pl", "utf8 subject as expected"); }; 0; Crypt-OpenSSL-X509-1.813/inc/Module/000755 000765 000024 00000000000 13554375627 017367 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/inc/Module/Install/000755 000765 000024 00000000000 13554375627 020775 5ustar00jonasbnstaff000000 000000 Crypt-OpenSSL-X509-1.813/inc/Module/AutoInstall.pm000644 000765 000024 00000062311 13554375447 022167 0ustar00jonasbnstaff000000 000000 #line 1 package Module::AutoInstall; use strict; use Cwd (); use File::Spec (); use ExtUtils::MakeMaker (); use vars qw{$VERSION}; BEGIN { $VERSION = '1.19'; } # special map on pre-defined feature sets my %FeatureMap = ( '' => 'Core Features', # XXX: deprecated '-core' => 'Core Features', ); # various lexical flags my ( @Missing, @Existing, %DisabledTests, $UnderCPAN, $InstallDepsTarget, $HasCPANPLUS ); my ( $Config, $CheckOnly, $SkipInstall, $AcceptDefault, $TestOnly, $AllDeps, $UpgradeDeps ); my ( $PostambleActions, $PostambleActionsNoTest, $PostambleActionsUpgradeDeps, $PostambleActionsUpgradeDepsNoTest, $PostambleActionsListDeps, $PostambleActionsListAllDeps, $PostambleUsed, $NoTest); # See if it's a testing or non-interactive session _accept_default( $ENV{AUTOMATED_TESTING} or ! -t STDIN ); _init(); sub _accept_default { $AcceptDefault = shift; } sub _installdeps_target { $InstallDepsTarget = shift; } sub missing_modules { return @Missing; } sub do_install { __PACKAGE__->install( [ $Config ? ( UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} ) : () ], @Missing, ); } # initialize various flags, and/or perform install sub _init { foreach my $arg ( @ARGV, split( /[\s\t]+/, $ENV{PERL_AUTOINSTALL} || $ENV{PERL_EXTUTILS_AUTOINSTALL} || '' ) ) { if ( $arg =~ /^--config=(.*)$/ ) { $Config = [ split( ',', $1 ) ]; } elsif ( $arg =~ /^--installdeps=(.*)$/ ) { __PACKAGE__->install( $Config, @Missing = split( /,/, $1 ) ); exit 0; } elsif ( $arg =~ /^--upgradedeps=(.*)$/ ) { $UpgradeDeps = 1; __PACKAGE__->install( $Config, @Missing = split( /,/, $1 ) ); exit 0; } elsif ( $arg =~ /^--default(?:deps)?$/ ) { $AcceptDefault = 1; } elsif ( $arg =~ /^--check(?:deps)?$/ ) { $CheckOnly = 1; } elsif ( $arg =~ /^--skip(?:deps)?$/ ) { $SkipInstall = 1; } elsif ( $arg =~ /^--test(?:only)?$/ ) { $TestOnly = 1; } elsif ( $arg =~ /^--all(?:deps)?$/ ) { $AllDeps = 1; } } } # overrides MakeMaker's prompt() to automatically accept the default choice sub _prompt { goto &ExtUtils::MakeMaker::prompt unless $AcceptDefault; my ( $prompt, $default ) = @_; my $y = ( $default =~ /^[Yy]/ ); print $prompt, ' [', ( $y ? 'Y' : 'y' ), '/', ( $y ? 'n' : 'N' ), '] '; print "$default\n"; return $default; } # the workhorse sub import { my $class = shift; my @args = @_ or return; my $core_all; print "*** $class version " . $class->VERSION . "\n"; print "*** Checking for Perl dependencies...\n"; my $cwd = Cwd::getcwd(); $Config = []; my $maxlen = length( ( sort { length($b) <=> length($a) } grep { /^[^\-]/ } map { ref($_) ? ( ( ref($_) eq 'HASH' ) ? keys(%$_) : @{$_} ) : '' } map { +{@args}->{$_} } grep { /^[^\-]/ or /^-core$/i } keys %{ +{@args} } )[0] ); # We want to know if we're under CPAN early to avoid prompting, but # if we aren't going to try and install anything anyway then skip the # check entirely since we don't want to have to load (and configure) # an old CPAN just for a cosmetic message $UnderCPAN = _check_lock(1) unless $SkipInstall || $InstallDepsTarget; while ( my ( $feature, $modules ) = splice( @args, 0, 2 ) ) { my ( @required, @tests, @skiptests ); my $default = 1; my $conflict = 0; if ( $feature =~ m/^-(\w+)$/ ) { my $option = lc($1); # check for a newer version of myself _update_to( $modules, @_ ) and return if $option eq 'version'; # sets CPAN configuration options $Config = $modules if $option eq 'config'; # promote every features to core status $core_all = ( $modules =~ /^all$/i ) and next if $option eq 'core'; next unless $option eq 'core'; } print "[" . ( $FeatureMap{ lc($feature) } || $feature ) . "]\n"; $modules = [ %{$modules} ] if UNIVERSAL::isa( $modules, 'HASH' ); unshift @$modules, -default => &{ shift(@$modules) } if ( ref( $modules->[0] ) eq 'CODE' ); # XXX: bugward compatibility while ( my ( $mod, $arg ) = splice( @$modules, 0, 2 ) ) { if ( $mod =~ m/^-(\w+)$/ ) { my $option = lc($1); $default = $arg if ( $option eq 'default' ); $conflict = $arg if ( $option eq 'conflict' ); @tests = @{$arg} if ( $option eq 'tests' ); @skiptests = @{$arg} if ( $option eq 'skiptests' ); next; } printf( "- %-${maxlen}s ...", $mod ); if ( $arg and $arg =~ /^\D/ ) { unshift @$modules, $arg; $arg = 0; } # XXX: check for conflicts and uninstalls(!) them. my $cur = _version_of($mod); if (_version_cmp ($cur, $arg) >= 0) { print "loaded. ($cur" . ( $arg ? " >= $arg" : '' ) . ")\n"; push @Existing, $mod => $arg; $DisabledTests{$_} = 1 for map { glob($_) } @skiptests; } else { if (not defined $cur) # indeed missing { print "missing." . ( $arg ? " (would need $arg)" : '' ) . "\n"; } else { # no need to check $arg as _version_cmp ($cur, undef) would satisfy >= above print "too old. ($cur < $arg)\n"; } push @required, $mod => $arg; } } next unless @required; my $mandatory = ( $feature eq '-core' or $core_all ); if ( !$SkipInstall and ( $CheckOnly or ($mandatory and $UnderCPAN) or $AllDeps or $InstallDepsTarget or _prompt( qq{==> Auto-install the } . ( @required / 2 ) . ( $mandatory ? ' mandatory' : ' optional' ) . qq{ module(s) from CPAN?}, $default ? 'y' : 'n', ) =~ /^[Yy]/ ) ) { push( @Missing, @required ); $DisabledTests{$_} = 1 for map { glob($_) } @skiptests; } elsif ( !$SkipInstall and $default and $mandatory and _prompt( qq{==> The module(s) are mandatory! Really skip?}, 'n', ) =~ /^[Nn]/ ) { push( @Missing, @required ); $DisabledTests{$_} = 1 for map { glob($_) } @skiptests; } else { $DisabledTests{$_} = 1 for map { glob($_) } @tests; } } if ( @Missing and not( $CheckOnly or $UnderCPAN) ) { require Config; my $make = $Config::Config{make}; if ($InstallDepsTarget) { print "*** To install dependencies type '$make installdeps' or '$make installdeps_notest'.\n"; } else { print "*** Dependencies will be installed the next time you type '$make'.\n"; } # make an educated guess of whether we'll need root permission. print " (You may need to do that as the 'root' user.)\n" if eval '$>'; } print "*** $class configuration finished.\n"; chdir $cwd; # import to main:: no strict 'refs'; *{'main::WriteMakefile'} = \&Write if caller(0) eq 'main'; return (@Existing, @Missing); } sub _running_under { my $thing = shift; print <<"END_MESSAGE"; *** Since we're running under ${thing}, I'll just let it take care of the dependency's installation later. END_MESSAGE return 1; } # Check to see if we are currently running under CPAN.pm and/or CPANPLUS; # if we are, then we simply let it taking care of our dependencies sub _check_lock { return unless @Missing or @_; if ($ENV{PERL5_CPANM_IS_RUNNING}) { return _running_under('cpanminus'); } my $cpan_env = $ENV{PERL5_CPAN_IS_RUNNING}; if ($ENV{PERL5_CPANPLUS_IS_RUNNING}) { return _running_under($cpan_env ? 'CPAN' : 'CPANPLUS'); } require CPAN; if ($CPAN::VERSION > '1.89') { if ($cpan_env) { return _running_under('CPAN'); } return; # CPAN.pm new enough, don't need to check further } # last ditch attempt, this -will- configure CPAN, very sorry _load_cpan(1); # force initialize even though it's already loaded # Find the CPAN lock-file my $lock = MM->catfile( $CPAN::Config->{cpan_home}, ".lock" ); return unless -f $lock; # Check the lock local *LOCK; return unless open(LOCK, $lock); if ( ( $^O eq 'MSWin32' ? _under_cpan() : == getppid() ) and ( $CPAN::Config->{prerequisites_policy} || '' ) ne 'ignore' ) { print <<'END_MESSAGE'; *** Since we're running under CPAN, I'll just let it take care of the dependency's installation later. END_MESSAGE return 1; } close LOCK; return; } sub install { my $class = shift; my $i; # used below to strip leading '-' from config keys my @config = ( map { s/^-// if ++$i; $_ } @{ +shift } ); my ( @modules, @installed, @modules_to_upgrade ); while (my ($pkg, $ver) = splice(@_, 0, 2)) { # grep out those already installed if (_version_cmp(_version_of($pkg), $ver) >= 0) { push @installed, $pkg; if ($UpgradeDeps) { push @modules_to_upgrade, $pkg, $ver; } } else { push @modules, $pkg, $ver; } } if ($UpgradeDeps) { push @modules, @modules_to_upgrade; @installed = (); @modules_to_upgrade = (); } return @installed unless @modules; # nothing to do return @installed if _check_lock(); # defer to the CPAN shell print "*** Installing dependencies...\n"; return unless _connected_to('cpan.org'); my %args = @config; my %failed; local *FAILED; if ( $args{do_once} and open( FAILED, '.#autoinstall.failed' ) ) { while () { chomp; $failed{$_}++ } close FAILED; my @newmod; while ( my ( $k, $v ) = splice( @modules, 0, 2 ) ) { push @newmod, ( $k => $v ) unless $failed{$k}; } @modules = @newmod; } if ( _has_cpanplus() and not $ENV{PERL_AUTOINSTALL_PREFER_CPAN} ) { _install_cpanplus( \@modules, \@config ); } else { _install_cpan( \@modules, \@config ); } print "*** $class installation finished.\n"; # see if we have successfully installed them while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) { if ( _version_cmp( _version_of($pkg), $ver ) >= 0 ) { push @installed, $pkg; } elsif ( $args{do_once} and open( FAILED, '>> .#autoinstall.failed' ) ) { print FAILED "$pkg\n"; } } close FAILED if $args{do_once}; return @installed; } sub _install_cpanplus { my @modules = @{ +shift }; my @config = _cpanplus_config( @{ +shift } ); my $installed = 0; require CPANPLUS::Backend; my $cp = CPANPLUS::Backend->new; my $conf = $cp->configure_object; return unless $conf->can('conf') # 0.05x+ with "sudo" support or _can_write($conf->_get_build('base')); # 0.04x # if we're root, set UNINST=1 to avoid trouble unless user asked for it. my $makeflags = $conf->get_conf('makeflags') || ''; if ( UNIVERSAL::isa( $makeflags, 'HASH' ) ) { # 0.03+ uses a hashref here $makeflags->{UNINST} = 1 unless exists $makeflags->{UNINST}; } else { # 0.02 and below uses a scalar $makeflags = join( ' ', split( ' ', $makeflags ), 'UNINST=1' ) if ( $makeflags !~ /\bUNINST\b/ and eval qq{ $> eq '0' } ); } $conf->set_conf( makeflags => $makeflags ); $conf->set_conf( prereqs => 1 ); while ( my ( $key, $val ) = splice( @config, 0, 2 ) ) { $conf->set_conf( $key, $val ); } my $modtree = $cp->module_tree; while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) { print "*** Installing $pkg...\n"; MY::preinstall( $pkg, $ver ) or next if defined &MY::preinstall; my $success; my $obj = $modtree->{$pkg}; if ( $obj and _version_cmp( $obj->{version}, $ver ) >= 0 ) { my $pathname = $pkg; $pathname =~ s/::/\\W/; foreach my $inc ( grep { m/$pathname.pm/i } keys(%INC) ) { delete $INC{$inc}; } my $rv = $cp->install( modules => [ $obj->{module} ] ); if ( $rv and ( $rv->{ $obj->{module} } or $rv->{ok} ) ) { print "*** $pkg successfully installed.\n"; $success = 1; } else { print "*** $pkg installation cancelled.\n"; $success = 0; } $installed += $success; } else { print << "."; *** Could not find a version $ver or above for $pkg; skipping. . } MY::postinstall( $pkg, $ver, $success ) if defined &MY::postinstall; } return $installed; } sub _cpanplus_config { my @config = (); while ( @_ ) { my ($key, $value) = (shift(), shift()); if ( $key eq 'prerequisites_policy' ) { if ( $value eq 'follow' ) { $value = CPANPLUS::Internals::Constants::PREREQ_INSTALL(); } elsif ( $value eq 'ask' ) { $value = CPANPLUS::Internals::Constants::PREREQ_ASK(); } elsif ( $value eq 'ignore' ) { $value = CPANPLUS::Internals::Constants::PREREQ_IGNORE(); } else { die "*** Cannot convert option $key = '$value' to CPANPLUS version.\n"; } push @config, 'prereqs', $value; } elsif ( $key eq 'force' ) { push @config, $key, $value; } elsif ( $key eq 'notest' ) { push @config, 'skiptest', $value; } else { die "*** Cannot convert option $key to CPANPLUS version.\n"; } } return @config; } sub _install_cpan { my @modules = @{ +shift }; my @config = @{ +shift }; my $installed = 0; my %args; _load_cpan(); require Config; if (CPAN->VERSION < 1.80) { # no "sudo" support, probe for writableness return unless _can_write( MM->catfile( $CPAN::Config->{cpan_home}, 'sources' ) ) and _can_write( $Config::Config{sitelib} ); } # if we're root, set UNINST=1 to avoid trouble unless user asked for it. my $makeflags = $CPAN::Config->{make_install_arg} || ''; $CPAN::Config->{make_install_arg} = join( ' ', split( ' ', $makeflags ), 'UNINST=1' ) if ( $makeflags !~ /\bUNINST\b/ and eval qq{ $> eq '0' } ); # don't show start-up info $CPAN::Config->{inhibit_startup_message} = 1; # set additional options while ( my ( $opt, $arg ) = splice( @config, 0, 2 ) ) { ( $args{$opt} = $arg, next ) if $opt =~ /^(?:force|notest)$/; # pseudo-option $CPAN::Config->{$opt} = $opt eq 'urllist' ? [$arg] : $arg; } if ($args{notest} && (not CPAN::Shell->can('notest'))) { die "Your version of CPAN is too old to support the 'notest' pragma"; } local $CPAN::Config->{prerequisites_policy} = 'follow'; while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) { MY::preinstall( $pkg, $ver ) or next if defined &MY::preinstall; print "*** Installing $pkg...\n"; my $obj = CPAN::Shell->expand( Module => $pkg ); my $success = 0; if ( $obj and _version_cmp( $obj->cpan_version, $ver ) >= 0 ) { my $pathname = $pkg; $pathname =~ s/::/\\W/; foreach my $inc ( grep { m/$pathname.pm/i } keys(%INC) ) { delete $INC{$inc}; } my $rv = do { if ($args{force}) { CPAN::Shell->force( install => $pkg ) } elsif ($args{notest}) { CPAN::Shell->notest( install => $pkg ) } else { CPAN::Shell->install($pkg) } }; $rv ||= eval { $CPAN::META->instance( 'CPAN::Distribution', $obj->cpan_file, ) ->{install} if $CPAN::META; }; if ( $rv eq 'YES' ) { print "*** $pkg successfully installed.\n"; $success = 1; } else { print "*** $pkg installation failed.\n"; $success = 0; } $installed += $success; } else { print << "."; *** Could not find a version $ver or above for $pkg; skipping. . } MY::postinstall( $pkg, $ver, $success ) if defined &MY::postinstall; } return $installed; } sub _has_cpanplus { return ( $HasCPANPLUS = ( $INC{'CPANPLUS/Config.pm'} or _load('CPANPLUS::Shell::Default') ) ); } # make guesses on whether we're under the CPAN installation directory sub _under_cpan { require Cwd; require File::Spec; my $cwd = File::Spec->canonpath( Cwd::getcwd() ); my $cpan = File::Spec->canonpath( $CPAN::Config->{cpan_home} ); return ( index( $cwd, $cpan ) > -1 ); } sub _update_to { my $class = __PACKAGE__; my $ver = shift; return if _version_cmp( _version_of($class), $ver ) >= 0; # no need to upgrade if ( _prompt( "==> A newer version of $class ($ver) is required. Install?", 'y' ) =~ /^[Nn]/ ) { die "*** Please install $class $ver manually.\n"; } print << "."; *** Trying to fetch it from CPAN... . # install ourselves _load($class) and return $class->import(@_) if $class->install( [], $class, $ver ); print << '.'; exit 1; *** Cannot bootstrap myself. :-( Installation terminated. . } # check if we're connected to some host, using inet_aton sub _connected_to { my $site = shift; return ( ( _load('Socket') and Socket::inet_aton($site) ) or _prompt( qq( *** Your host cannot resolve the domain name '$site', which probably means the Internet connections are unavailable. ==> Should we try to install the required module(s) anyway?), 'n' ) =~ /^[Yy]/ ); } # check if a directory is writable; may create it on demand sub _can_write { my $path = shift; mkdir( $path, 0755 ) unless -e $path; return 1 if -w $path; print << "."; *** You are not allowed to write to the directory '$path'; the installation may fail due to insufficient permissions. . if ( eval '$>' and lc(`sudo -V`) =~ /version/ and _prompt( qq( ==> Should we try to re-execute the autoinstall process with 'sudo'?), ((-t STDIN) ? 'y' : 'n') ) =~ /^[Yy]/ ) { # try to bootstrap ourselves from sudo print << "."; *** Trying to re-execute the autoinstall process with 'sudo'... . my $missing = join( ',', @Missing ); my $config = join( ',', UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} ) if $Config; return unless system( 'sudo', $^X, $0, "--config=$config", "--installdeps=$missing" ); print << "."; *** The 'sudo' command exited with error! Resuming... . } return _prompt( qq( ==> Should we try to install the required module(s) anyway?), 'n' ) =~ /^[Yy]/; } # load a module and return the version it reports sub _load { my $mod = pop; # method/function doesn't matter my $file = $mod; $file =~ s|::|/|g; $file .= '.pm'; local $@; return eval { require $file; $mod->VERSION } || ( $@ ? undef: 0 ); } # report version without loading a module sub _version_of { my $mod = pop; # method/function doesn't matter my $file = $mod; $file =~ s|::|/|g; $file .= '.pm'; foreach my $dir ( @INC ) { next if ref $dir; my $path = File::Spec->catfile($dir, $file); next unless -e $path; require ExtUtils::MM_Unix; return ExtUtils::MM_Unix->parse_version($path); } return undef; } # Load CPAN.pm and it's configuration sub _load_cpan { return if $CPAN::VERSION and $CPAN::Config and not @_; require CPAN; # CPAN-1.82+ adds CPAN::Config::AUTOLOAD to redirect to # CPAN::HandleConfig->load. CPAN reports that the redirection # is deprecated in a warning printed at the user. # CPAN-1.81 expects CPAN::HandleConfig->load, does not have # $CPAN::HandleConfig::VERSION but cannot handle # CPAN::Config->load # Which "versions expect CPAN::Config->load? if ( $CPAN::HandleConfig::VERSION || CPAN::HandleConfig->can('load') ) { # Newer versions of CPAN have a HandleConfig module CPAN::HandleConfig->load; } else { # Older versions had the load method in Config directly CPAN::Config->load; } } # compare two versions, either use Sort::Versions or plain comparison # return values same as <=> sub _version_cmp { my ( $cur, $min ) = @_; return -1 unless defined $cur; # if 0 keep comparing return 1 unless $min; $cur =~ s/\s+$//; # check for version numbers that are not in decimal format if ( ref($cur) or ref($min) or $cur =~ /v|\..*\./ or $min =~ /v|\..*\./ ) { if ( ( $version::VERSION or defined( _load('version') )) and version->can('new') ) { # use version.pm if it is installed. return version->new($cur) <=> version->new($min); } elsif ( $Sort::Versions::VERSION or defined( _load('Sort::Versions') ) ) { # use Sort::Versions as the sorting algorithm for a.b.c versions return Sort::Versions::versioncmp( $cur, $min ); } warn "Cannot reliably compare non-decimal formatted versions.\n" . "Please install version.pm or Sort::Versions.\n"; } # plain comparison local $^W = 0; # shuts off 'not numeric' bugs return $cur <=> $min; } # nothing; this usage is deprecated. sub main::PREREQ_PM { return {}; } sub _make_args { my %args = @_; $args{PREREQ_PM} = { %{ $args{PREREQ_PM} || {} }, @Existing, @Missing } if $UnderCPAN or $TestOnly; if ( $args{EXE_FILES} and -e 'MANIFEST' ) { require ExtUtils::Manifest; my $manifest = ExtUtils::Manifest::maniread('MANIFEST'); $args{EXE_FILES} = [ grep { exists $manifest->{$_} } @{ $args{EXE_FILES} } ]; } $args{test}{TESTS} ||= 't/*.t'; $args{test}{TESTS} = join( ' ', grep { !exists( $DisabledTests{$_} ) } map { glob($_) } split( /\s+/, $args{test}{TESTS} ) ); my $missing = join( ',', @Missing ); my $config = join( ',', UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} ) if $Config; $PostambleActions = ( ($missing and not $UnderCPAN) ? "\$(PERL) $0 --config=$config --installdeps=$missing" : "\$(NOECHO) \$(NOOP)" ); my $deps_list = join( ',', @Missing, @Existing ); $PostambleActionsUpgradeDeps = "\$(PERL) $0 --config=$config --upgradedeps=$deps_list"; my $config_notest = join( ',', (UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config}), 'notest', 1 ) if $Config; $PostambleActionsNoTest = ( ($missing and not $UnderCPAN) ? "\$(PERL) $0 --config=$config_notest --installdeps=$missing" : "\$(NOECHO) \$(NOOP)" ); $PostambleActionsUpgradeDepsNoTest = "\$(PERL) $0 --config=$config_notest --upgradedeps=$deps_list"; $PostambleActionsListDeps = '@$(PERL) -le "print for @ARGV" ' . join(' ', map $Missing[$_], grep $_ % 2 == 0, 0..$#Missing); my @all = (@Missing, @Existing); $PostambleActionsListAllDeps = '@$(PERL) -le "print for @ARGV" ' . join(' ', map $all[$_], grep $_ % 2 == 0, 0..$#all); return %args; } # a wrapper to ExtUtils::MakeMaker::WriteMakefile sub Write { require Carp; Carp::croak "WriteMakefile: Need even number of args" if @_ % 2; if ($CheckOnly) { print << "."; *** Makefile not written in check-only mode. . return; } my %args = _make_args(@_); no strict 'refs'; $PostambleUsed = 0; local *MY::postamble = \&postamble unless defined &MY::postamble; ExtUtils::MakeMaker::WriteMakefile(%args); print << "." unless $PostambleUsed; *** WARNING: Makefile written with customized MY::postamble() without including contents from Module::AutoInstall::postamble() -- auto installation features disabled. Please contact the author. . return 1; } sub postamble { $PostambleUsed = 1; my $fragment; $fragment .= <<"AUTO_INSTALL" if !$InstallDepsTarget; config :: installdeps \t\$(NOECHO) \$(NOOP) AUTO_INSTALL $fragment .= <<"END_MAKE"; checkdeps :: \t\$(PERL) $0 --checkdeps installdeps :: \t$PostambleActions installdeps_notest :: \t$PostambleActionsNoTest upgradedeps :: \t$PostambleActionsUpgradeDeps upgradedeps_notest :: \t$PostambleActionsUpgradeDepsNoTest listdeps :: \t$PostambleActionsListDeps listalldeps :: \t$PostambleActionsListAllDeps END_MAKE return $fragment; } 1; __END__ #line 1197 Crypt-OpenSSL-X509-1.813/inc/Module/Install.pm000644 000765 000024 00000027145 13554375447 021344 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install; # For any maintainers: # The load order for Module::Install is a bit magic. # It goes something like this... # # IF ( host has Module::Install installed, creating author mode ) { # 1. Makefile.PL calls "use inc::Module::Install" # 2. $INC{inc/Module/Install.pm} set to installed version of inc::Module::Install # 3. The installed version of inc::Module::Install loads # 4. inc::Module::Install calls "require Module::Install" # 5. The ./inc/ version of Module::Install loads # } ELSE { # 1. Makefile.PL calls "use inc::Module::Install" # 2. $INC{inc/Module/Install.pm} set to ./inc/ version of Module::Install # 3. The ./inc/ version of Module::Install loads # } use 5.006; use strict 'vars'; use Cwd (); use File::Find (); use File::Path (); use vars qw{$VERSION $MAIN}; BEGIN { # All Module::Install core packages now require synchronised versions. # This will be used to ensure we don't accidentally load old or # different versions of modules. # This is not enforced yet, but will be some time in the next few # releases once we can make sure it won't clash with custom # Module::Install extensions. $VERSION = '1.19'; # Storage for the pseudo-singleton $MAIN = undef; *inc::Module::Install::VERSION = *VERSION; @inc::Module::Install::ISA = __PACKAGE__; } sub import { my $class = shift; my $self = $class->new(@_); my $who = $self->_caller; #------------------------------------------------------------- # all of the following checks should be included in import(), # to allow "eval 'require Module::Install; 1' to test # installation of Module::Install. (RT #51267) #------------------------------------------------------------- # Whether or not inc::Module::Install is actually loaded, the # $INC{inc/Module/Install.pm} is what will still get set as long as # the caller loaded module this in the documented manner. # If not set, the caller may NOT have loaded the bundled version, and thus # they may not have a MI version that works with the Makefile.PL. This would # result in false errors or unexpected behaviour. And we don't want that. my $file = join( '/', 'inc', split /::/, __PACKAGE__ ) . '.pm'; unless ( $INC{$file} ) { die <<"END_DIE" } Please invoke ${\__PACKAGE__} with: use inc::${\__PACKAGE__}; not: use ${\__PACKAGE__}; END_DIE # This reportedly fixes a rare Win32 UTC file time issue, but # as this is a non-cross-platform XS module not in the core, # we shouldn't really depend on it. See RT #24194 for detail. # (Also, this module only supports Perl 5.6 and above). eval "use Win32::UTCFileTime" if $^O eq 'MSWin32' && $] >= 5.006; # If the script that is loading Module::Install is from the future, # then make will detect this and cause it to re-run over and over # again. This is bad. Rather than taking action to touch it (which # is unreliable on some platforms and requires write permissions) # for now we should catch this and refuse to run. if ( -f $0 ) { my $s = (stat($0))[9]; # If the modification time is only slightly in the future, # sleep briefly to remove the problem. my $a = $s - time; if ( $a > 0 and $a < 5 ) { sleep 5 } # Too far in the future, throw an error. my $t = time; if ( $s > $t ) { die <<"END_DIE" } Your installer $0 has a modification time in the future ($s > $t). This is known to create infinite loops in make. Please correct this, then run $0 again. END_DIE } # Build.PL was formerly supported, but no longer is due to excessive # difficulty in implementing every single feature twice. if ( $0 =~ /Build.PL$/i ) { die <<"END_DIE" } Module::Install no longer supports Build.PL. It was impossible to maintain duel backends, and has been deprecated. Please remove all Build.PL files and only use the Makefile.PL installer. END_DIE #------------------------------------------------------------- # To save some more typing in Module::Install installers, every... # use inc::Module::Install # ...also acts as an implicit use strict. $^H |= strict::bits(qw(refs subs vars)); #------------------------------------------------------------- unless ( -f $self->{file} ) { foreach my $key (keys %INC) { delete $INC{$key} if $key =~ /Module\/Install/; } local $^W; require "$self->{path}/$self->{dispatch}.pm"; File::Path::mkpath("$self->{prefix}/$self->{author}"); $self->{admin} = "$self->{name}::$self->{dispatch}"->new( _top => $self ); $self->{admin}->init; @_ = ($class, _self => $self); goto &{"$self->{name}::import"}; } local $^W; *{"${who}::AUTOLOAD"} = $self->autoload; $self->preload; # Unregister loader and worker packages so subdirs can use them again delete $INC{'inc/Module/Install.pm'}; delete $INC{'Module/Install.pm'}; # Save to the singleton $MAIN = $self; return 1; } sub autoload { my $self = shift; my $who = $self->_caller; my $cwd = Cwd::getcwd(); my $sym = "${who}::AUTOLOAD"; $sym->{$cwd} = sub { my $pwd = Cwd::getcwd(); if ( my $code = $sym->{$pwd} ) { # Delegate back to parent dirs goto &$code unless $cwd eq $pwd; } unless ($$sym =~ s/([^:]+)$//) { # XXX: it looks like we can't retrieve the missing function # via $$sym (usually $main::AUTOLOAD) in this case. # I'm still wondering if we should slurp Makefile.PL to # get some context or not ... my ($package, $file, $line) = caller; die <<"EOT"; Unknown function is found at $file line $line. Execution of $file aborted due to runtime errors. If you're a contributor to a project, you may need to install some Module::Install extensions from CPAN (or other repository). If you're a user of a module, please contact the author. EOT } my $method = $1; if ( uc($method) eq $method ) { # Do nothing return; } elsif ( $method =~ /^_/ and $self->can($method) ) { # Dispatch to the root M:I class return $self->$method(@_); } # Dispatch to the appropriate plugin unshift @_, ( $self, $1 ); goto &{$self->can('call')}; }; } sub preload { my $self = shift; unless ( $self->{extensions} ) { $self->load_extensions( "$self->{prefix}/$self->{path}", $self ); } my @exts = @{$self->{extensions}}; unless ( @exts ) { @exts = $self->{admin}->load_all_extensions; } my %seen; foreach my $obj ( @exts ) { while (my ($method, $glob) = each %{ref($obj) . '::'}) { next unless $obj->can($method); next if $method =~ /^_/; next if $method eq uc($method); $seen{$method}++; } } my $who = $self->_caller; foreach my $name ( sort keys %seen ) { local $^W; *{"${who}::$name"} = sub { ${"${who}::AUTOLOAD"} = "${who}::$name"; goto &{"${who}::AUTOLOAD"}; }; } } sub new { my ($class, %args) = @_; delete $INC{'FindBin.pm'}; { # to suppress the redefine warning local $SIG{__WARN__} = sub {}; require FindBin; } # ignore the prefix on extension modules built from top level. my $base_path = Cwd::abs_path($FindBin::Bin); unless ( Cwd::abs_path(Cwd::getcwd()) eq $base_path ) { delete $args{prefix}; } return $args{_self} if $args{_self}; $base_path = VMS::Filespec::unixify($base_path) if $^O eq 'VMS'; $args{dispatch} ||= 'Admin'; $args{prefix} ||= 'inc'; $args{author} ||= ($^O eq 'VMS' ? '_author' : '.author'); $args{bundle} ||= 'inc/BUNDLES'; $args{base} ||= $base_path; $class =~ s/^\Q$args{prefix}\E:://; $args{name} ||= $class; $args{version} ||= $class->VERSION; unless ( $args{path} ) { $args{path} = $args{name}; $args{path} =~ s!::!/!g; } $args{file} ||= "$args{base}/$args{prefix}/$args{path}.pm"; $args{wrote} = 0; bless( \%args, $class ); } sub call { my ($self, $method) = @_; my $obj = $self->load($method) or return; splice(@_, 0, 2, $obj); goto &{$obj->can($method)}; } sub load { my ($self, $method) = @_; $self->load_extensions( "$self->{prefix}/$self->{path}", $self ) unless $self->{extensions}; foreach my $obj (@{$self->{extensions}}) { return $obj if $obj->can($method); } my $admin = $self->{admin} or die <<"END_DIE"; The '$method' method does not exist in the '$self->{prefix}' path! Please remove the '$self->{prefix}' directory and run $0 again to load it. END_DIE my $obj = $admin->load($method, 1); push @{$self->{extensions}}, $obj; $obj; } sub load_extensions { my ($self, $path, $top) = @_; my $should_reload = 0; unless ( grep { ! ref $_ and lc $_ eq lc $self->{prefix} } @INC ) { unshift @INC, $self->{prefix}; $should_reload = 1; } foreach my $rv ( $self->find_extensions($path) ) { my ($file, $pkg) = @{$rv}; next if $self->{pathnames}{$pkg}; local $@; my $new = eval { local $^W; require $file; $pkg->can('new') }; unless ( $new ) { warn $@ if $@; next; } $self->{pathnames}{$pkg} = $should_reload ? delete $INC{$file} : $INC{$file}; push @{$self->{extensions}}, &{$new}($pkg, _top => $top ); } $self->{extensions} ||= []; } sub find_extensions { my ($self, $path) = @_; my @found; File::Find::find( {no_chdir => 1, wanted => sub { my $file = $File::Find::name; return unless $file =~ m!^\Q$path\E/(.+)\.pm\Z!is; my $subpath = $1; return if lc($subpath) eq lc($self->{dispatch}); $file = "$self->{path}/$subpath.pm"; my $pkg = "$self->{name}::$subpath"; $pkg =~ s!/!::!g; # If we have a mixed-case package name, assume case has been preserved # correctly. Otherwise, root through the file to locate the case-preserved # version of the package name. if ( $subpath eq lc($subpath) || $subpath eq uc($subpath) ) { my $content = Module::Install::_read($File::Find::name); my $in_pod = 0; foreach ( split /\n/, $content ) { $in_pod = 1 if /^=\w/; $in_pod = 0 if /^=cut/; next if ($in_pod || /^=cut/); # skip pod text next if /^\s*#/; # and comments if ( m/^\s*package\s+($pkg)\s*;/i ) { $pkg = $1; last; } } } push @found, [ $file, $pkg ]; }}, $path ) if -d $path; @found; } ##################################################################### # Common Utility Functions sub _caller { my $depth = 0; my $call = caller($depth); while ( $call eq __PACKAGE__ ) { $depth++; $call = caller($depth); } return $call; } sub _read { local *FH; open( FH, '<', $_[0] ) or die "open($_[0]): $!"; binmode FH; my $string = do { local $/; }; close FH or die "close($_[0]): $!"; return $string; } sub _readperl { my $string = Module::Install::_read($_[0]); $string =~ s/(?:\015{1,2}\012|\015|\012)/\n/sg; $string =~ s/(\n)\n*__(?:DATA|END)__\b.*\z/$1/s; $string =~ s/\n\n=\w+.+?\n\n=cut\b.+?\n+/\n\n/sg; return $string; } sub _readpod { my $string = Module::Install::_read($_[0]); $string =~ s/(?:\015{1,2}\012|\015|\012)/\n/sg; return $string if $_[0] =~ /\.pod\z/; $string =~ s/(^|\n=cut\b.+?\n+)[^=\s].+?\n(\n=\w+|\z)/$1$2/sg; $string =~ s/\n*=pod\b[^\n]*\n+/\n\n/sg; $string =~ s/\n*=cut\b[^\n]*\n+/\n\n/sg; $string =~ s/^\n+//s; return $string; } sub _write { local *FH; open( FH, '>', $_[0] ) or die "open($_[0]): $!"; binmode FH; foreach ( 1 .. $#_ ) { print FH $_[$_] or die "print($_[0]): $!"; } close FH or die "close($_[0]): $!"; } # _version is for processing module versions (eg, 1.03_05) not # Perl versions (eg, 5.8.1). sub _version { my $s = shift || 0; my $d =()= $s =~ /(\.)/g; if ( $d >= 2 ) { # Normalise multipart versions $s =~ s/(\.)(\d{1,3})/sprintf("$1%03d",$2)/eg; } $s =~ s/^(\d+)\.?//; my $l = $1 || 0; my @v = map { $_ . '0' x (3 - length $_) } $s =~ /(\d{1,3})\D?/g; $l = $l . '.' . join '', @v if @v; return $l + 0; } sub _cmp { _version($_[1]) <=> _version($_[2]); } # Cloned from Params::Util::_CLASS sub _CLASS { ( defined $_[0] and ! ref $_[0] and $_[0] =~ m/^[^\W\d]\w*(?:::\w+)*\z/s ) ? $_[0] : undef; } 1; # Copyright 2008 - 2012 Adam Kennedy. Crypt-OpenSSL-X509-1.813/inc/Module/Install/Fetch.pm000644 000765 000024 00000004627 13554375447 022375 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Fetch; use strict; use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } sub get_file { my ($self, %args) = @_; my ($scheme, $host, $path, $file) = $args{url} =~ m|^(\w+)://([^/]+)(.+)/(.+)| or return; if ( $scheme eq 'http' and ! eval { require LWP::Simple; 1 } ) { $args{url} = $args{ftp_url} or (warn("LWP support unavailable!\n"), return); ($scheme, $host, $path, $file) = $args{url} =~ m|^(\w+)://([^/]+)(.+)/(.+)| or return; } $|++; print "Fetching '$file' from $host... "; unless (eval { require Socket; Socket::inet_aton($host) }) { warn "'$host' resolve failed!\n"; return; } return unless $scheme eq 'ftp' or $scheme eq 'http'; require Cwd; my $dir = Cwd::getcwd(); chdir $args{local_dir} or return if exists $args{local_dir}; if (eval { require LWP::Simple; 1 }) { LWP::Simple::mirror($args{url}, $file); } elsif (eval { require Net::FTP; 1 }) { eval { # use Net::FTP to get past firewall my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600); $ftp->login("anonymous", 'anonymous@example.com'); $ftp->cwd($path); $ftp->binary; $ftp->get($file) or (warn("$!\n"), return); $ftp->quit; } } elsif (my $ftp = $self->can_run('ftp')) { eval { # no Net::FTP, fallback to ftp.exe require FileHandle; my $fh = FileHandle->new; local $SIG{CHLD} = 'IGNORE'; unless ($fh->open("|$ftp -n")) { warn "Couldn't open ftp: $!\n"; chdir $dir; return; } my @dialog = split(/\n/, <<"END_FTP"); open $host user anonymous anonymous\@example.com cd $path binary get $file $file quit END_FTP foreach (@dialog) { $fh->print("$_\n") } $fh->close; } } else { warn "No working 'ftp' program available!\n"; chdir $dir; return; } unless (-f $file) { warn "Fetching failed: $@\n"; chdir $dir; return; } return if exists $args{size} and -s $file != $args{size}; system($args{run}) if exists $args{run}; unlink($file) if $args{remove}; print(((!exists $args{check_for} or -e $args{check_for}) ? "done!" : "failed! ($!)"), "\n"); chdir $dir; return !$?; } 1; Crypt-OpenSSL-X509-1.813/inc/Module/Install/Compiler.pm000644 000765 000024 00000002126 13554375447 023106 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Compiler; use strict; use File::Basename (); use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } sub ppport { my $self = shift; if ( $self->is_admin ) { return $self->admin->ppport(@_); } else { # Fallback to just a check my $file = shift || 'ppport.h'; unless ( -f $file ) { die "Packaging error, $file is missing"; } } } sub cc_files { require Config; my $self = shift; $self->makemaker_args( OBJECT => join ' ', map { substr($_, 0, -2) . $Config::Config{_o} } @_ ); } sub cc_inc_paths { my $self = shift; $self->makemaker_args( INC => join ' ', map { "-I$_" } @_ ); } sub cc_lib_paths { my $self = shift; $self->makemaker_args( LIBS => join ' ', map { "-L$_" } @_ ); } sub cc_lib_links { my $self = shift; $self->makemaker_args( LIBS => join ' ', $self->makemaker_args->{LIBS}, map { "-l$_" } @_ ); } sub cc_optimize_flags { my $self = shift; $self->makemaker_args( OPTIMIZE => join ' ', @_ ); } 1; __END__ #line 123 Crypt-OpenSSL-X509-1.813/inc/Module/Install/Metadata.pm000644 000765 000024 00000043302 13554375447 023055 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Metadata; use strict 'vars'; use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } my @boolean_keys = qw{ sign }; my @scalar_keys = qw{ name module_name abstract version distribution_type tests installdirs }; my @tuple_keys = qw{ configure_requires build_requires requires recommends bundles resources }; my @resource_keys = qw{ homepage bugtracker repository }; my @array_keys = qw{ keywords author }; *authors = \&author; sub Meta { shift } sub Meta_BooleanKeys { @boolean_keys } sub Meta_ScalarKeys { @scalar_keys } sub Meta_TupleKeys { @tuple_keys } sub Meta_ResourceKeys { @resource_keys } sub Meta_ArrayKeys { @array_keys } foreach my $key ( @boolean_keys ) { *$key = sub { my $self = shift; if ( defined wantarray and not @_ ) { return $self->{values}->{$key}; } $self->{values}->{$key} = ( @_ ? $_[0] : 1 ); return $self; }; } foreach my $key ( @scalar_keys ) { *$key = sub { my $self = shift; return $self->{values}->{$key} if defined wantarray and !@_; $self->{values}->{$key} = shift; return $self; }; } foreach my $key ( @array_keys ) { *$key = sub { my $self = shift; return $self->{values}->{$key} if defined wantarray and !@_; $self->{values}->{$key} ||= []; push @{$self->{values}->{$key}}, @_; return $self; }; } foreach my $key ( @resource_keys ) { *$key = sub { my $self = shift; unless ( @_ ) { return () unless $self->{values}->{resources}; return map { $_->[1] } grep { $_->[0] eq $key } @{ $self->{values}->{resources} }; } return $self->{values}->{resources}->{$key} unless @_; my $uri = shift or die( "Did not provide a value to $key()" ); $self->resources( $key => $uri ); return 1; }; } foreach my $key ( grep { $_ ne "resources" } @tuple_keys) { *$key = sub { my $self = shift; return $self->{values}->{$key} unless @_; my @added; while ( @_ ) { my $module = shift or last; my $version = shift || 0; push @added, [ $module, $version ]; } push @{ $self->{values}->{$key} }, @added; return map {@$_} @added; }; } # Resource handling my %lc_resource = map { $_ => 1 } qw{ homepage license bugtracker repository }; sub resources { my $self = shift; while ( @_ ) { my $name = shift or last; my $value = shift or next; if ( $name eq lc $name and ! $lc_resource{$name} ) { die("Unsupported reserved lowercase resource '$name'"); } $self->{values}->{resources} ||= []; push @{ $self->{values}->{resources} }, [ $name, $value ]; } $self->{values}->{resources}; } # Aliases for build_requires that will have alternative # meanings in some future version of META.yml. sub test_requires { shift->build_requires(@_) } sub install_requires { shift->build_requires(@_) } # Aliases for installdirs options sub install_as_core { $_[0]->installdirs('perl') } sub install_as_cpan { $_[0]->installdirs('site') } sub install_as_site { $_[0]->installdirs('site') } sub install_as_vendor { $_[0]->installdirs('vendor') } sub dynamic_config { my $self = shift; my $value = @_ ? shift : 1; if ( $self->{values}->{dynamic_config} ) { # Once dynamic we never change to static, for safety return 0; } $self->{values}->{dynamic_config} = $value ? 1 : 0; return 1; } # Convenience command sub static_config { shift->dynamic_config(0); } sub perl_version { my $self = shift; return $self->{values}->{perl_version} unless @_; my $version = shift or die( "Did not provide a value to perl_version()" ); # Normalize the version $version = $self->_perl_version($version); # We don't support the really old versions unless ( $version >= 5.005 ) { die "Module::Install only supports 5.005 or newer (use ExtUtils::MakeMaker)\n"; } $self->{values}->{perl_version} = $version; } sub all_from { my ( $self, $file ) = @_; unless ( defined($file) ) { my $name = $self->name or die( "all_from called with no args without setting name() first" ); $file = join('/', 'lib', split(/-/, $name)) . '.pm'; $file =~ s{.*/}{} unless -e $file; unless ( -e $file ) { die("all_from cannot find $file from $name"); } } unless ( -f $file ) { die("The path '$file' does not exist, or is not a file"); } $self->{values}{all_from} = $file; # Some methods pull from POD instead of code. # If there is a matching .pod, use that instead my $pod = $file; $pod =~ s/\.pm$/.pod/i; $pod = $file unless -e $pod; # Pull the different values $self->name_from($file) unless $self->name; $self->version_from($file) unless $self->version; $self->perl_version_from($file) unless $self->perl_version; $self->author_from($pod) unless @{$self->author || []}; $self->license_from($pod) unless $self->license; $self->abstract_from($pod) unless $self->abstract; return 1; } sub provides { my $self = shift; my $provides = ( $self->{values}->{provides} ||= {} ); %$provides = (%$provides, @_) if @_; return $provides; } sub auto_provides { my $self = shift; return $self unless $self->is_admin; unless (-e 'MANIFEST') { warn "Cannot deduce auto_provides without a MANIFEST, skipping\n"; return $self; } # Avoid spurious warnings as we are not checking manifest here. local $SIG{__WARN__} = sub {1}; require ExtUtils::Manifest; local *ExtUtils::Manifest::manicheck = sub { return }; require Module::Build; my $build = Module::Build->new( dist_name => $self->name, dist_version => $self->version, license => $self->license, ); $self->provides( %{ $build->find_dist_packages || {} } ); } sub feature { my $self = shift; my $name = shift; my $features = ( $self->{values}->{features} ||= [] ); my $mods; if ( @_ == 1 and ref( $_[0] ) ) { # The user used ->feature like ->features by passing in the second # argument as a reference. Accomodate for that. $mods = $_[0]; } else { $mods = \@_; } my $count = 0; push @$features, ( $name => [ map { ref($_) ? ( ref($_) eq 'HASH' ) ? %$_ : @$_ : $_ } @$mods ] ); return @$features; } sub features { my $self = shift; while ( my ( $name, $mods ) = splice( @_, 0, 2 ) ) { $self->feature( $name, @$mods ); } return $self->{values}->{features} ? @{ $self->{values}->{features} } : (); } sub no_index { my $self = shift; my $type = shift; push @{ $self->{values}->{no_index}->{$type} }, @_ if $type; return $self->{values}->{no_index}; } sub read { my $self = shift; $self->include_deps( 'YAML::Tiny', 0 ); require YAML::Tiny; my $data = YAML::Tiny::LoadFile('META.yml'); # Call methods explicitly in case user has already set some values. while ( my ( $key, $value ) = each %$data ) { next unless $self->can($key); if ( ref $value eq 'HASH' ) { while ( my ( $module, $version ) = each %$value ) { $self->can($key)->($self, $module => $version ); } } else { $self->can($key)->($self, $value); } } return $self; } sub write { my $self = shift; return $self unless $self->is_admin; $self->admin->write_meta; return $self; } sub version_from { require ExtUtils::MM_Unix; my ( $self, $file ) = @_; $self->version( ExtUtils::MM_Unix->parse_version($file) ); # for version integrity check $self->makemaker_args( VERSION_FROM => $file ); } sub abstract_from { require ExtUtils::MM_Unix; my ( $self, $file ) = @_; $self->abstract( bless( { DISTNAME => $self->name }, 'ExtUtils::MM_Unix' )->parse_abstract($file) ); } # Add both distribution and module name sub name_from { my ($self, $file) = @_; if ( Module::Install::_read($file) =~ m/ ^ \s* package \s* ([\w:]+) [\s|;]* /ixms ) { my ($name, $module_name) = ($1, $1); $name =~ s{::}{-}g; $self->name($name); unless ( $self->module_name ) { $self->module_name($module_name); } } else { die("Cannot determine name from $file\n"); } } sub _extract_perl_version { if ( $_[0] =~ m/ ^\s* (?:use|require) \s* v? ([\d_\.]+) \s* ; /ixms ) { my $perl_version = $1; $perl_version =~ s{_}{}g; return $perl_version; } else { return; } } sub perl_version_from { my $self = shift; my $perl_version=_extract_perl_version(Module::Install::_read($_[0])); if ($perl_version) { $self->perl_version($perl_version); } else { warn "Cannot determine perl version info from $_[0]\n"; return; } } sub author_from { my $self = shift; my $content = Module::Install::_read($_[0]); if ($content =~ m/ =head \d \s+ (?:authors?)\b \s* ([^\n]*) | =head \d \s+ (?:licen[cs]e|licensing|copyright|legal)\b \s* .*? copyright .*? \d\d\d[\d.]+ \s* (?:\bby\b)? \s* ([^\n]*) /ixms) { my $author = $1 || $2; # XXX: ugly but should work anyway... if (eval "require Pod::Escapes; 1") { # Pod::Escapes has a mapping table. # It's in core of perl >= 5.9.3, and should be installed # as one of the Pod::Simple's prereqs, which is a prereq # of Pod::Text 3.x (see also below). $author =~ s{ E<( (\d+) | ([A-Za-z]+) )> } { defined $2 ? chr($2) : defined $Pod::Escapes::Name2character_number{$1} ? chr($Pod::Escapes::Name2character_number{$1}) : do { warn "Unknown escape: E<$1>"; "E<$1>"; }; }gex; } elsif (eval "require Pod::Text; 1" && $Pod::Text::VERSION < 3) { # Pod::Text < 3.0 has yet another mapping table, # though the table name of 2.x and 1.x are different. # (1.x is in core of Perl < 5.6, 2.x is in core of # Perl < 5.9.3) my $mapping = ($Pod::Text::VERSION < 2) ? \%Pod::Text::HTML_Escapes : \%Pod::Text::ESCAPES; $author =~ s{ E<( (\d+) | ([A-Za-z]+) )> } { defined $2 ? chr($2) : defined $mapping->{$1} ? $mapping->{$1} : do { warn "Unknown escape: E<$1>"; "E<$1>"; }; }gex; } else { $author =~ s{E}{<}g; $author =~ s{E}{>}g; } $self->author($author); } else { warn "Cannot determine author info from $_[0]\n"; } } #Stolen from M::B my %license_urls = ( perl => 'http://dev.perl.org/licenses/', apache => 'http://apache.org/licenses/LICENSE-2.0', apache_1_1 => 'http://apache.org/licenses/LICENSE-1.1', artistic => 'http://opensource.org/licenses/artistic-license.php', artistic_2 => 'http://opensource.org/licenses/artistic-license-2.0.php', lgpl => 'http://opensource.org/licenses/lgpl-license.php', lgpl2 => 'http://opensource.org/licenses/lgpl-2.1.php', lgpl3 => 'http://opensource.org/licenses/lgpl-3.0.html', bsd => 'http://opensource.org/licenses/bsd-license.php', gpl => 'http://opensource.org/licenses/gpl-license.php', gpl2 => 'http://opensource.org/licenses/gpl-2.0.php', gpl3 => 'http://opensource.org/licenses/gpl-3.0.html', mit => 'http://opensource.org/licenses/mit-license.php', mozilla => 'http://opensource.org/licenses/mozilla1.1.php', open_source => undef, unrestricted => undef, restrictive => undef, unknown => undef, ); sub license { my $self = shift; return $self->{values}->{license} unless @_; my $license = shift or die( 'Did not provide a value to license()' ); $license = __extract_license($license) || lc $license; $self->{values}->{license} = $license; # Automatically fill in license URLs if ( $license_urls{$license} ) { $self->resources( license => $license_urls{$license} ); } return 1; } sub _extract_license { my $pod = shift; my $matched; return __extract_license( ($matched) = $pod =~ m/ (=head \d \s+ L(?i:ICEN[CS]E|ICENSING)\b.*?) (=head \d.*|=cut.*|)\z /xms ) || __extract_license( ($matched) = $pod =~ m/ (=head \d \s+ (?:C(?i:OPYRIGHTS?)|L(?i:EGAL))\b.*?) (=head \d.*|=cut.*|)\z /xms ); } sub __extract_license { my $license_text = shift or return; my @phrases = ( '(?:under )?the same (?:terms|license) as (?:perl|the perl (?:\d )?programming language)' => 'perl', 1, '(?:under )?the terms of (?:perl|the perl programming language) itself' => 'perl', 1, 'Artistic and GPL' => 'perl', 1, 'GNU general public license' => 'gpl', 1, 'GNU public license' => 'gpl', 1, 'GNU lesser general public license' => 'lgpl', 1, 'GNU lesser public license' => 'lgpl', 1, 'GNU library general public license' => 'lgpl', 1, 'GNU library public license' => 'lgpl', 1, 'GNU Free Documentation license' => 'unrestricted', 1, 'GNU Affero General Public License' => 'open_source', 1, '(?:Free)?BSD license' => 'bsd', 1, 'Artistic license 2\.0' => 'artistic_2', 1, 'Artistic license' => 'artistic', 1, 'Apache (?:Software )?license' => 'apache', 1, 'GPL' => 'gpl', 1, 'LGPL' => 'lgpl', 1, 'BSD' => 'bsd', 1, 'Artistic' => 'artistic', 1, 'MIT' => 'mit', 1, 'Mozilla Public License' => 'mozilla', 1, 'Q Public License' => 'open_source', 1, 'OpenSSL License' => 'unrestricted', 1, 'SSLeay License' => 'unrestricted', 1, 'zlib License' => 'open_source', 1, 'proprietary' => 'proprietary', 0, ); while ( my ($pattern, $license, $osi) = splice(@phrases, 0, 3) ) { $pattern =~ s#\s+#\\s+#gs; if ( $license_text =~ /\b$pattern\b/i ) { return $license; } } return ''; } sub license_from { my $self = shift; if (my $license=_extract_license(Module::Install::_read($_[0]))) { $self->license($license); } else { warn "Cannot determine license info from $_[0]\n"; return 'unknown'; } } sub _extract_bugtracker { my @links = $_[0] =~ m#L<( https?\Q://rt.cpan.org/\E[^>]+| https?\Q://github.com/\E[\w_]+/[\w_]+/issues| https?\Q://code.google.com/p/\E[\w_\-]+/issues/list )>#gx; my %links; @links{@links}=(); @links=keys %links; return @links; } sub bugtracker_from { my $self = shift; my $content = Module::Install::_read($_[0]); my @links = _extract_bugtracker($content); unless ( @links ) { warn "Cannot determine bugtracker info from $_[0]\n"; return 0; } if ( @links > 1 ) { warn "Found more than one bugtracker link in $_[0]\n"; return 0; } # Set the bugtracker bugtracker( $links[0] ); return 1; } sub requires_from { my $self = shift; my $content = Module::Install::_readperl($_[0]); my @requires = $content =~ m/^use\s+([^\W\d]\w*(?:::\w+)*)\s+(v?[\d\.]+)/mg; while ( @requires ) { my $module = shift @requires; my $version = shift @requires; $self->requires( $module => $version ); } } sub test_requires_from { my $self = shift; my $content = Module::Install::_readperl($_[0]); my @requires = $content =~ m/^use\s+([^\W\d]\w*(?:::\w+)*)\s+([\d\.]+)/mg; while ( @requires ) { my $module = shift @requires; my $version = shift @requires; $self->test_requires( $module => $version ); } } # Convert triple-part versions (eg, 5.6.1 or 5.8.9) to # numbers (eg, 5.006001 or 5.008009). # Also, convert double-part versions (eg, 5.8) sub _perl_version { my $v = $_[-1]; $v =~ s/^([1-9])\.([1-9]\d?\d?)$/sprintf("%d.%03d",$1,$2)/e; $v =~ s/^([1-9])\.([1-9]\d?\d?)\.(0|[1-9]\d?\d?)$/sprintf("%d.%03d%03d",$1,$2,$3 || 0)/e; $v =~ s/(\.\d\d\d)000$/$1/; $v =~ s/_.+$//; if ( ref($v) ) { # Numify $v = $v + 0; } return $v; } sub add_metadata { my $self = shift; my %hash = @_; for my $key (keys %hash) { warn "add_metadata: $key is not prefixed with 'x_'.\n" . "Use appopriate function to add non-private metadata.\n" unless $key =~ /^x_/; $self->{values}->{$key} = $hash{$key}; } } ###################################################################### # MYMETA Support sub WriteMyMeta { die "WriteMyMeta has been deprecated"; } sub write_mymeta_yaml { my $self = shift; # We need YAML::Tiny to write the MYMETA.yml file unless ( eval { require YAML::Tiny; 1; } ) { return 1; } # Generate the data my $meta = $self->_write_mymeta_data or return 1; # Save as the MYMETA.yml file print "Writing MYMETA.yml\n"; YAML::Tiny::DumpFile('MYMETA.yml', $meta); } sub write_mymeta_json { my $self = shift; # We need JSON to write the MYMETA.json file unless ( eval { require JSON; 1; } ) { return 1; } # Generate the data my $meta = $self->_write_mymeta_data or return 1; # Save as the MYMETA.yml file print "Writing MYMETA.json\n"; Module::Install::_write( 'MYMETA.json', JSON->new->pretty(1)->canonical->encode($meta), ); } sub _write_mymeta_data { my $self = shift; # If there's no existing META.yml there is nothing we can do return undef unless -f 'META.yml'; # We need Parse::CPAN::Meta to load the file unless ( eval { require Parse::CPAN::Meta; 1; } ) { return undef; } # Merge the perl version into the dependencies my $val = $self->Meta->{values}; my $perl = delete $val->{perl_version}; if ( $perl ) { $val->{requires} ||= []; my $requires = $val->{requires}; # Canonize to three-dot version after Perl 5.6 if ( $perl >= 5.006 ) { $perl =~ s{^(\d+)\.(\d\d\d)(\d*)}{join('.', $1, int($2||0), int($3||0))}e } unshift @$requires, [ perl => $perl ]; } # Load the advisory META.yml file my @yaml = Parse::CPAN::Meta::LoadFile('META.yml'); my $meta = $yaml[0]; # Overwrite the non-configure dependency hashes delete $meta->{requires}; delete $meta->{build_requires}; delete $meta->{recommends}; if ( exists $val->{requires} ) { $meta->{requires} = { map { @$_ } @{ $val->{requires} } }; } if ( exists $val->{build_requires} ) { $meta->{build_requires} = { map { @$_ } @{ $val->{build_requires} } }; } return $meta; } 1; Crypt-OpenSSL-X509-1.813/inc/Module/Install/AutoInstall.pm000644 000765 000024 00000004162 13554375447 023575 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::AutoInstall; use strict; use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } sub AutoInstall { $_[0] } sub run { my $self = shift; $self->auto_install_now(@_); } sub write { my $self = shift; $self->auto_install(@_); } sub auto_install { my $self = shift; return if $self->{done}++; # Flatten array of arrays into a single array my @core = map @$_, map @$_, grep ref, $self->build_requires, $self->requires; my @config = @_; # We'll need Module::AutoInstall $self->include('Module::AutoInstall'); require Module::AutoInstall; my @features_require = Module::AutoInstall->import( (@config ? (-config => \@config) : ()), (@core ? (-core => \@core) : ()), $self->features, ); my %seen; my @requires = map @$_, map @$_, grep ref, $self->requires; while (my ($mod, $ver) = splice(@requires, 0, 2)) { $seen{$mod}{$ver}++; } my @build_requires = map @$_, map @$_, grep ref, $self->build_requires; while (my ($mod, $ver) = splice(@build_requires, 0, 2)) { $seen{$mod}{$ver}++; } my @configure_requires = map @$_, map @$_, grep ref, $self->configure_requires; while (my ($mod, $ver) = splice(@configure_requires, 0, 2)) { $seen{$mod}{$ver}++; } my @deduped; while (my ($mod, $ver) = splice(@features_require, 0, 2)) { push @deduped, $mod => $ver unless $seen{$mod}{$ver}++; } $self->requires(@deduped); $self->makemaker_args( Module::AutoInstall::_make_args() ); my $class = ref($self); $self->postamble( "# --- $class section:\n" . Module::AutoInstall::postamble() ); } sub installdeps_target { my ($self, @args) = @_; $self->include('Module::AutoInstall'); require Module::AutoInstall; Module::AutoInstall::_installdeps_target(1); $self->auto_install(@args); } sub auto_install_now { my $self = shift; $self->auto_install(@_); Module::AutoInstall::do_install(); } 1; Crypt-OpenSSL-X509-1.813/inc/Module/Install/Win32.pm000644 000765 000024 00000003403 13554375447 022235 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Win32; use strict; use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } # determine if the user needs nmake, and download it if needed sub check_nmake { my $self = shift; $self->load('can_run'); $self->load('get_file'); require Config; return unless ( $^O eq 'MSWin32' and $Config::Config{make} and $Config::Config{make} =~ /^nmake\b/i and ! $self->can_run('nmake') ); print "The required 'nmake' executable not found, fetching it...\n"; require File::Basename; my $rv = $self->get_file( url => 'http://download.microsoft.com/download/vc15/Patch/1.52/W95/EN-US/Nmake15.exe', ftp_url => 'ftp://ftp.microsoft.com/Softlib/MSLFILES/Nmake15.exe', local_dir => File::Basename::dirname($^X), size => 51928, run => 'Nmake15.exe /o > nul', check_for => 'Nmake.exe', remove => 1, ); die <<'END_MESSAGE' unless $rv; ------------------------------------------------------------------------------- Since you are using Microsoft Windows, you will need the 'nmake' utility before installation. It's available at: http://download.microsoft.com/download/vc15/Patch/1.52/W95/EN-US/Nmake15.exe or ftp://ftp.microsoft.com/Softlib/MSLFILES/Nmake15.exe Please download the file manually, save it to a directory in %PATH% (e.g. C:\WINDOWS\COMMAND\), then launch the MS-DOS command line shell, "cd" to that directory, and run "Nmake15.exe" from there; that will create the 'nmake.exe' file needed by this module. You may then resume the installation process described in README. ------------------------------------------------------------------------------- END_MESSAGE } 1; Crypt-OpenSSL-X509-1.813/inc/Module/Install/WriteAll.pm000644 000765 000024 00000002376 13554375447 023066 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::WriteAll; use strict; use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = qw{Module::Install::Base}; $ISCORE = 1; } sub WriteAll { my $self = shift; my %args = ( meta => 1, sign => 0, inline => 0, check_nmake => 1, @_, ); $self->sign(1) if $args{sign}; $self->admin->WriteAll(%args) if $self->is_admin; $self->check_nmake if $args{check_nmake}; unless ( $self->makemaker_args->{PL_FILES} ) { # XXX: This still may be a bit over-defensive... unless ($self->makemaker(6.25)) { $self->makemaker_args( PL_FILES => {} ) if -f 'Build.PL'; } } # Until ExtUtils::MakeMaker support MYMETA.yml, make sure # we clean it up properly ourself. $self->realclean_files('MYMETA.yml'); if ( $args{inline} ) { $self->Inline->write; } else { $self->Makefile->write; } # The Makefile write process adds a couple of dependencies, # so write the META.yml files after the Makefile. if ( $args{meta} ) { $self->Meta->write; } # Experimental support for MYMETA if ( $ENV{X_MYMETA} ) { if ( $ENV{X_MYMETA} eq 'JSON' ) { $self->Meta->write_mymeta_json; } else { $self->Meta->write_mymeta_yaml; } } return 1; } 1; Crypt-OpenSSL-X509-1.813/inc/Module/Install/Can.pm000644 000765 000024 00000006405 13554375447 022041 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Can; use strict; use Config (); use ExtUtils::MakeMaker (); use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } # check if we can load some module ### Upgrade this to not have to load the module if possible sub can_use { my ($self, $mod, $ver) = @_; $mod =~ s{::|\\}{/}g; $mod .= '.pm' unless $mod =~ /\.pm$/i; my $pkg = $mod; $pkg =~ s{/}{::}g; $pkg =~ s{\.pm$}{}i; local $@; eval { require $mod; $pkg->VERSION($ver || 0); 1 }; } # Check if we can run some command sub can_run { my ($self, $cmd) = @_; my $_cmd = $cmd; return $_cmd if (-x $_cmd or $_cmd = MM->maybe_command($_cmd)); for my $dir ((split /$Config::Config{path_sep}/, $ENV{PATH}), '.') { next if $dir eq ''; require File::Spec; my $abs = File::Spec->catfile($dir, $cmd); return $abs if (-x $abs or $abs = MM->maybe_command($abs)); } return; } # Can our C compiler environment build XS files sub can_xs { my $self = shift; # Ensure we have the CBuilder module $self->configure_requires( 'ExtUtils::CBuilder' => 0.27 ); # Do we have the configure_requires checker? local $@; eval "require ExtUtils::CBuilder;"; if ( $@ ) { # They don't obey configure_requires, so it is # someone old and delicate. Try to avoid hurting # them by falling back to an older simpler test. return $self->can_cc(); } # Do we have a working C compiler my $builder = ExtUtils::CBuilder->new( quiet => 1, ); unless ( $builder->have_compiler ) { # No working C compiler return 0; } # Write a C file representative of what XS becomes require File::Temp; my ( $FH, $tmpfile ) = File::Temp::tempfile( "compilexs-XXXXX", SUFFIX => '.c', ); binmode $FH; print $FH <<'END_C'; #include "EXTERN.h" #include "perl.h" #include "XSUB.h" int main(int argc, char **argv) { return 0; } int boot_sanexs() { return 1; } END_C close $FH; # Can the C compiler access the same headers XS does my @libs = (); my $object = undef; eval { local $^W = 0; $object = $builder->compile( source => $tmpfile, ); @libs = $builder->link( objects => $object, module_name => 'sanexs', ); }; my $result = $@ ? 0 : 1; # Clean up all the build files foreach ( $tmpfile, $object, @libs ) { next unless defined $_; 1 while unlink; } return $result; } # Can we locate a (the) C compiler sub can_cc { my $self = shift; if ($^O eq 'VMS') { require ExtUtils::CBuilder; my $builder = ExtUtils::CBuilder->new( quiet => 1, ); return $builder->have_compiler; } my @chunks = split(/ /, $Config::Config{cc}) or return; # $Config{cc} may contain args; try to find out the program part while (@chunks) { return $self->can_run("@chunks") || (pop(@chunks), next); } return; } # Fix Cygwin bug on maybe_command(); if ( $^O eq 'cygwin' ) { require ExtUtils::MM_Cygwin; require ExtUtils::MM_Win32; if ( ! defined(&ExtUtils::MM_Cygwin::maybe_command) ) { *ExtUtils::MM_Cygwin::maybe_command = sub { my ($self, $file) = @_; if ($file =~ m{^/cygdrive/}i and ExtUtils::MM_Win32->can('maybe_command')) { ExtUtils::MM_Win32->maybe_command($file); } else { ExtUtils::MM_Unix->maybe_command($file); } } } } 1; __END__ #line 245 Crypt-OpenSSL-X509-1.813/inc/Module/Install/Include.pm000644 000765 000024 00000001015 13554375447 022713 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Include; use strict; use Module::Install::Base (); use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } sub include { shift()->admin->include(@_); } sub include_deps { shift()->admin->include_deps(@_); } sub auto_include { shift()->admin->auto_include(@_); } sub auto_include_deps { shift()->admin->auto_include_deps(@_); } sub auto_include_dependent_dists { shift()->admin->auto_include_dependent_dists(@_); } 1; Crypt-OpenSSL-X509-1.813/inc/Module/Install/Makefile.pm000644 000765 000024 00000027437 13554375447 023065 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Makefile; use strict 'vars'; use ExtUtils::MakeMaker (); use Module::Install::Base (); use Fcntl qw/:flock :seek/; use vars qw{$VERSION @ISA $ISCORE}; BEGIN { $VERSION = '1.19'; @ISA = 'Module::Install::Base'; $ISCORE = 1; } sub Makefile { $_[0] } my %seen = (); sub prompt { shift; # Infinite loop protection my @c = caller(); if ( ++$seen{"$c[1]|$c[2]|$_[0]"} > 3 ) { die "Caught an potential prompt infinite loop ($c[1]|$c[2]|$_[0])"; } # In automated testing or non-interactive session, always use defaults if ( ($ENV{AUTOMATED_TESTING} or -! -t STDIN) and ! $ENV{PERL_MM_USE_DEFAULT} ) { local $ENV{PERL_MM_USE_DEFAULT} = 1; goto &ExtUtils::MakeMaker::prompt; } else { goto &ExtUtils::MakeMaker::prompt; } } # Store a cleaned up version of the MakeMaker version, # since we need to behave differently in a variety of # ways based on the MM version. my $makemaker = eval $ExtUtils::MakeMaker::VERSION; # If we are passed a param, do a "newer than" comparison. # Otherwise, just return the MakeMaker version. sub makemaker { ( @_ < 2 or $makemaker >= eval($_[1]) ) ? $makemaker : 0 } # Ripped from ExtUtils::MakeMaker 6.56, and slightly modified # as we only need to know here whether the attribute is an array # or a hash or something else (which may or may not be appendable). my %makemaker_argtype = ( C => 'ARRAY', CONFIG => 'ARRAY', # CONFIGURE => 'CODE', # ignore DIR => 'ARRAY', DL_FUNCS => 'HASH', DL_VARS => 'ARRAY', EXCLUDE_EXT => 'ARRAY', EXE_FILES => 'ARRAY', FUNCLIST => 'ARRAY', H => 'ARRAY', IMPORTS => 'HASH', INCLUDE_EXT => 'ARRAY', LIBS => 'ARRAY', # ignore '' MAN1PODS => 'HASH', MAN3PODS => 'HASH', META_ADD => 'HASH', META_MERGE => 'HASH', PL_FILES => 'HASH', PM => 'HASH', PMLIBDIRS => 'ARRAY', PMLIBPARENTDIRS => 'ARRAY', PREREQ_PM => 'HASH', CONFIGURE_REQUIRES => 'HASH', SKIP => 'ARRAY', TYPEMAPS => 'ARRAY', XS => 'HASH', # VERSION => ['version',''], # ignore # _KEEP_AFTER_FLUSH => '', clean => 'HASH', depend => 'HASH', dist => 'HASH', dynamic_lib=> 'HASH', linkext => 'HASH', macro => 'HASH', postamble => 'HASH', realclean => 'HASH', test => 'HASH', tool_autosplit => 'HASH', # special cases where you can use makemaker_append CCFLAGS => 'APPENDABLE', DEFINE => 'APPENDABLE', INC => 'APPENDABLE', LDDLFLAGS => 'APPENDABLE', LDFROM => 'APPENDABLE', ); sub makemaker_args { my ($self, %new_args) = @_; my $args = ( $self->{makemaker_args} ||= {} ); foreach my $key (keys %new_args) { if ($makemaker_argtype{$key}) { if ($makemaker_argtype{$key} eq 'ARRAY') { $args->{$key} = [] unless defined $args->{$key}; unless (ref $args->{$key} eq 'ARRAY') { $args->{$key} = [$args->{$key}] } push @{$args->{$key}}, ref $new_args{$key} eq 'ARRAY' ? @{$new_args{$key}} : $new_args{$key}; } elsif ($makemaker_argtype{$key} eq 'HASH') { $args->{$key} = {} unless defined $args->{$key}; foreach my $skey (keys %{ $new_args{$key} }) { $args->{$key}{$skey} = $new_args{$key}{$skey}; } } elsif ($makemaker_argtype{$key} eq 'APPENDABLE') { $self->makemaker_append($key => $new_args{$key}); } } else { if (defined $args->{$key}) { warn qq{MakeMaker attribute "$key" is overriden; use "makemaker_append" to append values\n}; } $args->{$key} = $new_args{$key}; } } return $args; } # For mm args that take multiple space-separated args, # append an argument to the current list. sub makemaker_append { my $self = shift; my $name = shift; my $args = $self->makemaker_args; $args->{$name} = defined $args->{$name} ? join( ' ', $args->{$name}, @_ ) : join( ' ', @_ ); } sub build_subdirs { my $self = shift; my $subdirs = $self->makemaker_args->{DIR} ||= []; for my $subdir (@_) { push @$subdirs, $subdir; } } sub clean_files { my $self = shift; my $clean = $self->makemaker_args->{clean} ||= {}; %$clean = ( %$clean, FILES => join ' ', grep { length $_ } ($clean->{FILES} || (), @_), ); } sub realclean_files { my $self = shift; my $realclean = $self->makemaker_args->{realclean} ||= {}; %$realclean = ( %$realclean, FILES => join ' ', grep { length $_ } ($realclean->{FILES} || (), @_), ); } sub libs { my $self = shift; my $libs = ref $_[0] ? shift : [ shift ]; $self->makemaker_args( LIBS => $libs ); } sub inc { my $self = shift; $self->makemaker_args( INC => shift ); } sub _wanted_t { } sub tests_recursive { my $self = shift; my $dir = shift || 't'; unless ( -d $dir ) { die "tests_recursive dir '$dir' does not exist"; } my %tests = map { $_ => 1 } split / /, ($self->tests || ''); require File::Find; File::Find::find( sub { /\.t$/ and -f $_ and $tests{"$File::Find::dir/*.t"} = 1 }, $dir ); $self->tests( join ' ', sort keys %tests ); } sub write { my $self = shift; die "&Makefile->write() takes no arguments\n" if @_; # Check the current Perl version my $perl_version = $self->perl_version; if ( $perl_version ) { eval "use $perl_version; 1" or die "ERROR: perl: Version $] is installed, " . "but we need version >= $perl_version"; } # Make sure we have a new enough MakeMaker require ExtUtils::MakeMaker; if ( $perl_version and $self->_cmp($perl_version, '5.006') >= 0 ) { # This previous attempted to inherit the version of # ExtUtils::MakeMaker in use by the module author, but this # was found to be untenable as some authors build releases # using future dev versions of EU:MM that nobody else has. # Instead, #toolchain suggests we use 6.59 which is the most # stable version on CPAN at time of writing and is, to quote # ribasushi, "not terminally fucked, > and tested enough". # TODO: We will now need to maintain this over time to push # the version up as new versions are released. $self->build_requires( 'ExtUtils::MakeMaker' => 6.59 ); $self->configure_requires( 'ExtUtils::MakeMaker' => 6.59 ); } else { # Allow legacy-compatibility with 5.005 by depending on the # most recent EU:MM that supported 5.005. $self->build_requires( 'ExtUtils::MakeMaker' => 6.36 ); $self->configure_requires( 'ExtUtils::MakeMaker' => 6.36 ); } # Generate the MakeMaker params my $args = $self->makemaker_args; $args->{DISTNAME} = $self->name; $args->{NAME} = $self->module_name || $self->name; $args->{NAME} =~ s/-/::/g; $args->{VERSION} = $self->version or die <<'EOT'; ERROR: Can't determine distribution version. Please specify it explicitly via 'version' in Makefile.PL, or set a valid $VERSION in a module, and provide its file path via 'version_from' (or 'all_from' if you prefer) in Makefile.PL. EOT if ( $self->tests ) { my @tests = split ' ', $self->tests; my %seen; $args->{test} = { TESTS => (join ' ', grep {!$seen{$_}++} @tests), }; } elsif ( $Module::Install::ExtraTests::use_extratests ) { # Module::Install::ExtraTests doesn't set $self->tests and does its own tests via harness. # So, just ignore our xt tests here. } elsif ( -d 'xt' and ($Module::Install::AUTHOR or $ENV{RELEASE_TESTING}) ) { $args->{test} = { TESTS => join( ' ', map { "$_/*.t" } grep { -d $_ } qw{ t xt } ), }; } if ( $] >= 5.005 ) { $args->{ABSTRACT} = $self->abstract; $args->{AUTHOR} = join ', ', @{$self->author || []}; } if ( $self->makemaker(6.10) ) { $args->{NO_META} = 1; #$args->{NO_MYMETA} = 1; } if ( $self->makemaker(6.17) and $self->sign ) { $args->{SIGN} = 1; } unless ( $self->is_admin ) { delete $args->{SIGN}; } if ( $self->makemaker(6.31) and $self->license ) { $args->{LICENSE} = $self->license; } my $prereq = ($args->{PREREQ_PM} ||= {}); %$prereq = ( %$prereq, map { @$_ } # flatten [module => version] map { @$_ } grep $_, ($self->requires) ); # Remove any reference to perl, PREREQ_PM doesn't support it delete $args->{PREREQ_PM}->{perl}; # Merge both kinds of requires into BUILD_REQUIRES my $build_prereq = ($args->{BUILD_REQUIRES} ||= {}); %$build_prereq = ( %$build_prereq, map { @$_ } # flatten [module => version] map { @$_ } grep $_, ($self->configure_requires, $self->build_requires) ); # Remove any reference to perl, BUILD_REQUIRES doesn't support it delete $args->{BUILD_REQUIRES}->{perl}; # Delete bundled dists from prereq_pm, add it to Makefile DIR my $subdirs = ($args->{DIR} || []); if ($self->bundles) { my %processed; foreach my $bundle (@{ $self->bundles }) { my ($mod_name, $dist_dir) = @$bundle; delete $prereq->{$mod_name}; $dist_dir = File::Basename::basename($dist_dir); # dir for building this module if (not exists $processed{$dist_dir}) { if (-d $dist_dir) { # List as sub-directory to be processed by make push @$subdirs, $dist_dir; } # Else do nothing: the module is already present on the system $processed{$dist_dir} = undef; } } } unless ( $self->makemaker('6.55_03') ) { %$prereq = (%$prereq,%$build_prereq); delete $args->{BUILD_REQUIRES}; } if ( my $perl_version = $self->perl_version ) { eval "use $perl_version; 1" or die "ERROR: perl: Version $] is installed, " . "but we need version >= $perl_version"; if ( $self->makemaker(6.48) ) { $args->{MIN_PERL_VERSION} = $perl_version; } } if ($self->installdirs) { warn qq{old INSTALLDIRS (probably set by makemaker_args) is overriden by installdirs\n} if $args->{INSTALLDIRS}; $args->{INSTALLDIRS} = $self->installdirs; } my %args = map { ( $_ => $args->{$_} ) } grep {defined($args->{$_} ) } keys %$args; my $user_preop = delete $args{dist}->{PREOP}; if ( my $preop = $self->admin->preop($user_preop) ) { foreach my $key ( keys %$preop ) { $args{dist}->{$key} = $preop->{$key}; } } my $mm = ExtUtils::MakeMaker::WriteMakefile(%args); $self->fix_up_makefile($mm->{FIRST_MAKEFILE} || 'Makefile'); } sub fix_up_makefile { my $self = shift; my $makefile_name = shift; my $top_class = ref($self->_top) || ''; my $top_version = $self->_top->VERSION || ''; my $preamble = $self->preamble ? "# Preamble by $top_class $top_version\n" . $self->preamble : ''; my $postamble = "# Postamble by $top_class $top_version\n" . ($self->postamble || ''); local *MAKEFILE; open MAKEFILE, "+< $makefile_name" or die "fix_up_makefile: Couldn't open $makefile_name: $!"; eval { flock MAKEFILE, LOCK_EX }; my $makefile = do { local $/; }; $makefile =~ s/\b(test_harness\(\$\(TEST_VERBOSE\), )/$1'inc', /; $makefile =~ s/( -I\$\(INST_ARCHLIB\))/ -Iinc$1/g; $makefile =~ s/( "-I\$\(INST_LIB\)")/ "-Iinc"$1/g; $makefile =~ s/^(FULLPERL = .*)/$1 "-Iinc"/m; $makefile =~ s/^(PERL = .*)/$1 "-Iinc"/m; # Module::Install will never be used to build the Core Perl # Sometimes PERL_LIB and PERL_ARCHLIB get written anyway, which breaks # PREFIX/PERL5LIB, and thus, install_share. Blank them if they exist $makefile =~ s/^PERL_LIB = .+/PERL_LIB =/m; #$makefile =~ s/^PERL_ARCHLIB = .+/PERL_ARCHLIB =/m; # Perl 5.005 mentions PERL_LIB explicitly, so we have to remove that as well. $makefile =~ s/(\"?)-I\$\(PERL_LIB\)\1//g; # XXX - This is currently unused; not sure if it breaks other MM-users # $makefile =~ s/^pm_to_blib\s+:\s+/pm_to_blib :: /mg; seek MAKEFILE, 0, SEEK_SET; truncate MAKEFILE, 0; print MAKEFILE "$preamble$makefile$postamble" or die $!; close MAKEFILE or die $!; 1; } sub preamble { my ($self, $text) = @_; $self->{preamble} = $text . $self->{preamble} if defined $text; $self->{preamble}; } sub postamble { my ($self, $text) = @_; $self->{postamble} ||= $self->admin->postamble; $self->{postamble} .= $text if defined $text; $self->{postamble} } 1; __END__ #line 544 Crypt-OpenSSL-X509-1.813/inc/Module/Install/External.pm000644 000765 000024 00000003545 13554375447 023124 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::External; # Provides dependency declarations for external non-Perl things use strict; use Module::Install::Base (); use vars qw{$VERSION $ISCORE @ISA}; BEGIN { $VERSION = '1.19'; $ISCORE = 1; @ISA = qw{Module::Install::Base}; } sub requires_xs { my $self = shift; # First check for the basic C compiler $self->requires_external_cc; # We need a C compiler that can build XS files unless ( $self->can_xs ) { print "Unresolvable missing external dependency.\n"; print "This package requires perl's header files.\n"; print STDERR "NA: Unable to build distribution on this platform.\n"; exit(0); } 1; } sub requires_external_cc { my $self = shift; # We need a C compiler, use the can_cc method for this unless ( $self->can_cc ) { print "Unresolvable missing external dependency.\n"; print "This package requires a C compiler.\n"; print STDERR "NA: Unable to build distribution on this platform.\n"; exit(0); } # Unlike some of the other modules, while we need to specify a # C compiler as a dep, it needs to be a build-time dependency. 1; } sub requires_external_bin { my ($self, $bin, $version) = @_; if ( $version ) { die "requires_external_bin does not support versions yet"; } # Load the package containing can_run early, # to avoid breaking the message below. $self->load('can_run'); # Locate the bin print "Locating bin:$bin..."; my $found_bin = $self->can_run( $bin ); if ( $found_bin ) { print " found at $found_bin.\n"; } else { print " missing.\n"; print "Unresolvable missing external dependency.\n"; print "Please install '$bin' seperately and try again.\n"; print STDERR "NA: Unable to build distribution on this platform.\n"; exit(0); } # Once we have some way to specify external deps, do it here. # In the mean time, continue as normal. 1; } 1; __END__ #line 171 Crypt-OpenSSL-X509-1.813/inc/Module/Install/Base.pm000644 000765 000024 00000002147 13554375447 022211 0ustar00jonasbnstaff000000 000000 #line 1 package Module::Install::Base; use strict 'vars'; use vars qw{$VERSION}; BEGIN { $VERSION = '1.19'; } # Suspend handler for "redefined" warnings BEGIN { my $w = $SIG{__WARN__}; $SIG{__WARN__} = sub { $w }; } #line 42 sub new { my $class = shift; unless ( defined &{"${class}::call"} ) { *{"${class}::call"} = sub { shift->_top->call(@_) }; } unless ( defined &{"${class}::load"} ) { *{"${class}::load"} = sub { shift->_top->load(@_) }; } bless { @_ }, $class; } #line 61 sub AUTOLOAD { local $@; my $func = eval { shift->_top->autoload } or return; goto &$func; } #line 75 sub _top { $_[0]->{_top}; } #line 90 sub admin { $_[0]->_top->{admin} or Module::Install::Base::FakeAdmin->new; } #line 106 sub is_admin { ! $_[0]->admin->isa('Module::Install::Base::FakeAdmin'); } sub DESTROY {} package Module::Install::Base::FakeAdmin; use vars qw{$VERSION}; BEGIN { $VERSION = $Module::Install::Base::VERSION; } my $fake; sub new { $fake ||= bless(\@_, $_[0]); } sub AUTOLOAD {} sub DESTROY {} # Restore warning handler BEGIN { $SIG{__WARN__} = $SIG{__WARN__}->(); } 1; #line 159