From ea52c5951a109a33d2c825f98bb59a021b3a61a0 Mon Sep 17 00:00:00 2001
From: jD91mZM2 <me@krake.one>
Date: Tue, 8 May 2018 14:40:00 +0200
Subject: [PATCH] Delete accidentally commited dir

---
 recipes/ca-certificates/source2/make-ca.sh | 732 ---------------------
 1 file changed, 732 deletions(-)
 delete mode 100644 recipes/ca-certificates/source2/make-ca.sh

diff --git a/recipes/ca-certificates/source2/make-ca.sh b/recipes/ca-certificates/source2/make-ca.sh
deleted file mode 100644
index 473d00a9e..000000000
--- a/recipes/ca-certificates/source2/make-ca.sh
+++ /dev/null
@@ -1,732 +0,0 @@
-#!/usr/bin/env bash
-# Begin /usr/sbin/make-ca.sh
-#
-# Script to create OpenSSL certs directory, GnuTLS certificate bundle, NSS
-# shared DB, and Java cacerts from upstream certdata.txt and local sources
-# 
-# Authors: DJ Lucas
-#          Bruce Dubbs
-#
-# Changes:
-#
-# 20170425 - Use p11-kit format anchors
-#          - Add CKA_NSS_MOZILLA_CA_POLICY attribute for p11-kit anchors
-#          - Add clientAuth OpenSSL attribute and (currently unused) NSS
-#            CKA_TRUST_CLIENT_AUTH
-# 20170119 - Show trust bits on local certs
-#          - Add version output for help2man
-# 20161210 - Add note about --force swich when same version
-# 20161126 - Add -D/--destdir switch
-# 20161124 - Add -f/--force switch to bypass version check
-#          - Add multiple switches to allow for alternate localtions
-#          - Add help text
-# 20161118 - Drop make-cert.pl script
-#          - Add support for Java and NSSDB
-
-# Set defaults
-VERSION="20170425"
-CERTDATA="certdata.txt"
-PKIDIR="/etc/pki"
-SSLDIR="/etc/ssl"
-CERTUTIL="certutil"
-KEYTOOL="keytool"
-OPENSSL="openssl"
-ANCHORDIR="${PKIDIR}/anchors"
-CABUNDLE="${SSLDIR}/ca-bundle.crt"
-CERTDIR="${SSLDIR}/certs"
-KEYSTORE="${SSLDIR}/java/cacerts"
-NSSDB="${PKIDIR}/nssdb"
-LOCALDIR="${SSLDIR}/local"
-DESTDIR=""
-
-# Some data in the certs have UTF-8 characters
-export LANG=en_US.utf8
-
-TEMPDIR=$(mktemp -d)
-WORKDIR="${TEMPDIR}/work"
-WITH_NSS=1
-WITH_JAVA=1
-FORCE=0
-
-function get_args(){
-  while test -n "${1}" ; do
-    case "${1}" in
-      -C | --certdata)
-        check_arg $1 $2
-        CERTDATA="${2}"
-        shift 2
-      ;;
-      -D | --destdir)
-        check_arg $1 $2
-        DESTDIR="${2}"
-        shift 2
-      ;;
-      -P | --pkidir)
-        check_arg $1 $2
-        PKIDIR="${2}"
-        ANCHORDIR="${PKIDIR}/anchors"
-        NSSDB="${PKIDIR}/nssdb"
-        echo "${@}" | grep -e "-a " -e "--anchordir" \
-                           -e "-n " -e "--nssdb" > /dev/null
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -a/--anchordir or -n/--nssdb switches."
-          echo ""
-          exit 3
-        fi
-        shift 2
-      ;;
-      -S | --ssldir)
-        check_arg $1 $2
-        SSLDIR="${2}"
-        CABUNDLE="${SSLDIR}/ca-bundle.crt"
-        CERTDIR="${SSLDIR}/certs"
-        KEYSTORE="${SSLDIR}/java/cacerts"
-        LOCALDIR="${SSLDIR}/local"
-        echo "${@}" | grep -e "-c " -e "--cafile" \
-                           -e "-d " -e "--cadir"  \
-                           -e "-j " -e "--javacerts" > /dev/null
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -c/--cafile, -d/--cadir, or"
-          echo "-j/--javacerts switches."
-          echo ""
-          exit 3
-        fi
-
-        shift 2
-      ;;
-      -a | --anchordir)
-        check_arg $1 $2
-        ANCHORDIR="${2}"
-        echo "${@}" | grep -e "-P " -e "--pkidir" > /dev/null
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -P/--pkidir switch."
-          echo ""
-          exit 3
-        fi
-        shift 2
-      ;;
-      -c | --cafile)
-        check_arg $1 $2
-        CABUNDLE="${2}"
-        echo "${@}" | grep -e "-S " -e "--ssldir" > /dev/null
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -S/--ssldir switch."
-          echo ""
-          exit 3
-        fi
-        shift 2
-      ;;
-      -d | --cadir)
-        check_arg $1 $2
-        CADIR="${2}"
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -S/--ssldir switch."
-          echo ""
-          exit 3
-        fi
-        shift 2
-      ;;
-      -j | --javacerts)
-        check_arg $1 $2
-        KEYSTORE="${2}"
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -S/--ssldir switch."
-          echo ""
-          exit 3
-        fi
-        shift 2
-      ;;
-      -l | --localdir)
-        check_arg $1 $2
-        LOCALDIR="${2}"
-        shift 2
-      ;;
-      -n | --nssdb)
-        check_arg $1 $2
-        NSSDB="${2}"
-        echo "${@}" | grep -e "-P " -e "--pkidir" > /dev/null
-        if test "${?}" == "0"; then
-          echo "Error! ${1} cannot be used with the -P/--pkidir switch."
-          echo ""
-          exit 3
-        fi
-        shift 2
-      ;;
-      -k | --keytool)
-        check_arg $1 $2
-        KEYTOOL="${2}"
-        shift 2
-      ;;
-      -s | --openssl)
-        check_arg $1 $2
-        OPENSSL="${2}"
-        shift 2
-      ;;
-      -t | --certutil)
-        check_arg $1 $2
-        CERTUTIL="${2}"
-        shift 2
-      ;;
-      -f | --force)
-        FORCE="1"
-        shift 1
-      ;;
-      -h | --help)
-        showhelp
-        exit 0
-      ;;
-      -v | --version)
-        echo -e "$(basename ${0}) ${VERSION}\n"
-        exit 0
-      ;;
-      *)
-        showhelp
-        exit 1
-      ;;
-    esac
-  done
-}
-
-function check_arg(){
-  echo "${2}" | grep -v "^-" > /dev/null
-  if [ -z "$?" -o ! -n "$2" ]; then
-    echo "Error:  $1 requires a valid argument."
-    exit 1
-  fi
-}
-
-function showhelp(){
-  echo ""
-  echo "`basename ${0}` converts certdata.txt (provided by the Mozilla Foundation)"
-  echo "into a complete PKI distribution for use with LFS or like distributions."
-  echo ""
-  echo "        -C  --certdata   The certdata.txt file (provided by Mozilla)"
-  echo "                         Default: ./certdata.txt"
-  echo ""
-  echo "        -D  --destdir    Change the output directory and use relative"
-  echo "                         paths for all other values."
-  echo "                         Default: unset"
-  echo ""
-  echo "        -P  --pkidir     The output PKI directory - Cannot be used with"
-  echo "                         the -a/--anchordir or -n/--nssdb switches"
-  echo "                         Default: /etc/pki"
-  echo ""
-  echo "        -S  --ssldir     The output SSL root direcotry - Cannot be used"
-  echo "                         with the -c/--cafile, -d/--cadir, or"
-  echo "                         -j/--javacerts switches"
-  echo "                         Defualt: /etc/ssl"
-  echo ""
-  echo "        -a  --anchordir  The output directory for OpenSSL trusted"
-  echo "                         CA certificates used as trust anchors."
-  echo "                         Default: \$PKIDIR/anchors"
-  echo ""
-  echo "        -c  --cafile     The output filename for the PEM formated bundle"
-  echo "                         Default: \$SSLDIR/ca-bundle.crt"
-  echo ""
-  echo "        -d  --cadir      The output directory for the OpenSSL trusted"
-  echo "                         CA certificates"
-  echo "                         Deault: \$SSLDIR/certs/"
-  echo ""
-  echo "        -j  --javacerts  The output path for the Java cacerts file"
-  echo "                         Default: \$SSLDIR/java/cacerts"
-  echo ""
-  echo "        -l  --localdir   The path to a local set of OpenSSL trusted"
-  echo "                         certificates to include in the output"
-  echo "                         Default: \$SSLDIR/local"
-  echo ""
-  echo "        -n  --nssdb      The output path for the shared NSS DB"
-  echo "                         Default: \$PKIDIR/nssdb"
-  echo ""
-  echo "        -k  --keytool    The path to the java keytool utility"
-  echo ""
-  echo "        -s  --openssl    The path to the openssl utility"
-  echo ""
-  echo "        -t  --certutil   The path the certutil utility"
-  echo ""
-  echo "        -f  --force      Force run, even if source is not newer"
-  echo ""
-  echo "        -h  --help       Show this help message and exit"
-  echo ""
-  echo "        -v  --version    Show version information and exit"
-  echo ""
-  echo "Example: `basename ${0}` -f -C ~/certdata.txt"
-  echo ""
-}
-
-# Convert CKA_TRUST values to trust flags for certutil
-function convert_trust(){
-  case $1 in
-    CKT_NSS_TRUSTED_DELEGATOR)
-      echo "C"
-    ;;
-    CKT_NSS_NOT_TRUSTED)
-      echo "p"
-    ;;
-    CKT_NSS_MUST_VERIFY_TRUST)
-      echo ""
-    ;;
-  esac
-}
-
-function convert_trust_arg(){
-  case $1 in
-    C)
-      case $2 in
-        sa)
-          echo "-addtrust serverAuth"
-        ;;
-        sm)
-          echo "-addtrust emailProtection"
-        ;;
-        cs)
-          echo "-addtrust codeSigning"
-        ;;
-        ca)
-          echo "-addtrust clientAuth"
-        ;;
-      esac
-    ;;
-    p)
-      case $2 in
-        sa)
-          echo "-addreject serverAuth"
-        ;;
-        sm)
-          echo "-addreject emailProtection"
-        ;;
-        cs)
-          echo "-addreject codeSigning"
-        ;;
-        ca)
-          echo "-addreject clientAuth"
-        ;;
-      esac
-    ;;
-    *)
-      echo ""
-    ;;
-  esac
-}
-    
-# Define p11-kit ext value constants (see p11-kit API documentation)
-get-p11-val() {
-  case $1 in
-    p11sasmcs)
-      p11value="0%2a%06%03U%1d%25%01%01%ff%04 0%1e%06%08%2b%06%01%05%05%07%03%04%06%08%2b%06%01%05%05%07%03%01%06%08%2b%06%01%05%05%07%03%03"
-    ;;
-
-    p11sasm)
-      p11value="0 %06%03U%1d%25%01%01%ff%04%160%14%06%08%2b%06%01%05%05%07%03%04%06%08%2b%06%01%05%05%07%03%01"
-    ;;
-
-    p11sacs)
-      p11value="0 %06%03U%1d%25%01%01%ff%04%160%14%06%08%2b%06%01%05%05%07%03%01%06%08%2b%06%01%05%05%07%03%03"
-    ;;
-
-    p11sa)
-      p11value="0%16%06%03U%1d%25%01%01%ff%04%0c0%0a%06%08%2b%06%01%05%05%07%03%01"
-    ;;
-
-    p11smcs)
-      p11value="0 %06%03U%1d%25%01%01%ff%04%160%14%06%08%2b%06%01%05%05%07%03%04%06%08%2b%06%01%05%05%07%03%03"
-    ;;
-
-    p11sm)
-      p11value="0%16%06%03U%1d%25%01%01%ff%04%0c0%0a%06%08%2b%06%01%05%05%07%03%04"
-    ;;
-
-    p11cs)
-      p11value="0%16%06%03U%1d%25%01%01%ff%04%0c0%0a%06%08%2b%06%01%05%05%07%03%03"
-    ;;
-
-    p11)
-      p11value="0%18%06%03U%1d%25%01%01%ff%04%0e0%0c%06%0a%2b%06%01%04%01%99w%06%0a%10"
-    ;;
-  esac
-}
-
-# Process command line arguments
-get_args $@
-
-if test ! -r "${CERTDATA}"; then
-  echo "${CERTDATA} was not found. The certdata.txt file must be in the local"
-  echo "directory, or speficied with the --certdata switch."
-  exit 1
-fi
-
-test -f "${CERTUTIL}" || WITH_NSS=0
-test -f "${KEYTOOL}" || WITH_JAVA=0
-
-VERSION=$(grep CVS_ID "${CERTDATA}" | cut -d " " -f 8)
-
-if test "${VERSION}x" == "x"; then
-  echo "WARNING! ${CERTDATA} has no 'Revision' in CVS_ID"
-  echo "Will run conversion unconditionally."
-  sleep 2
-  VERSION="$(date -u +%Y%m%d-%H%M)"
-else
-  if test "${FORCE}" == "1"; then
-    echo "Output forced. Will run conversion unconditionally."
-    sleep 2
-  elif test "${DESTDIR}x" == "x"; then
-    test -f "${CABUNDLE}" &&
-    OLDVERSION=$(grep "^VERSION:" "${CABUNDLE}" | cut -d ":" -f 2)
-  fi
-fi
-
-if test "${OLDVERSION}x" == "${VERSION}x"; then
-  echo "No update required! Use --force to update anyway."
-  exit 0
-fi
-
-mkdir -p "${TEMPDIR}"/{certs,ssl/{certs,java},pki/{nssdb,anchors},work}
-cp "${CERTDATA}" "${WORKDIR}/certdata.txt"
-pushd "${WORKDIR}" > /dev/null
-
-if test "${WITH_NSS}" == "1"; then
-  # Create a blank NSS DB
-  "${CERTUTIL}" -N --empty-password -d "sql:${TEMPDIR}/pki/nssdb"
-fi
-
-# Get a list of starting lines for each cert
-CERTBEGINLIST=`grep -n "^# Certificate" "${WORKDIR}/certdata.txt" | \
-                      cut -d ":" -f1`
-
-# Dump individual certs to temp file
-for certbegin in ${CERTBEGINLIST}; do
-  awk "NR==$certbegin,/^CKA_TRUST_STEP_UP_APPROVED/" "${WORKDIR}/certdata.txt" \
-      > "${TEMPDIR}/certs/${certbegin}.tmp" 
-done
-
-unset CERTBEGINLIST certbegin
-
-for tempfile in ${TEMPDIR}/certs/*.tmp; do
-  # Get a name for the cert
-  certname="$(grep "^# Certificate" "${tempfile}" | cut -d '"' -f 2)"
-
-  # Determine certificate trust values for SSL/TLS, S/MIME, and Code Signing
-  satrust="$(convert_trust `grep '^CKA_TRUST_SERVER_AUTH' ${tempfile} | \
-                  cut -d " " -f 3`)"
-  smtrust="$(convert_trust `grep '^CKA_TRUST_EMAIL_PROTECTION' ${tempfile} | \
-                  cut -d " " -f 3`)"
-  cstrust="$(convert_trust `grep '^CKA_TRUST_CODE_SIGNING' ${tempfile} | \
-                  cut -d " " -f 3`)"
-  # Not currently included in NSS certdata.txt
-  #catrust="$(convert_trust `grep '^CKA_TRUST_CLIENT_AUTH' ${tempfile} | \
-  #                cut -d " " -f 3`)"
-
-  # Get args for OpenSSL trust settings
-  saarg="$(convert_trust_arg "${satrust}" sa)"
-  smarg="$(convert_trust_arg "${smtrust}" sm)"
-  csarg="$(convert_trust_arg "${cstrust}" cs)"
-  # Not currently included in NSS certdata.txt
-  #caarg="$(convert_trust_arg "${catrust}" ca)"
-
-  # Convert to a PEM formated certificate
-  printf $(awk '/^CKA_VALUE/{flag=1;next}/^END/{flag=0}flag{printf $0}' \
-  "${tempfile}") | "${OPENSSL}" x509 -text -inform DER -fingerprint \
-  > tempfile.crt
-
-  # Get individual values for certificates
-  certkey="$(${OPENSSL} x509 -in tempfile.crt -noout -pubkey)"
-  certcer="$(${OPENSSL} x509 -in tempfile.crt)"
-  certtxt="$(${OPENSSL} x509 -in tempfile.crt -noout -text)"
-
-  # Get p11-kit label, oid, and values
-  p11label="$(grep -m1 "Issuer" ${tempfile} | grep -o CN=.*$ | \
-              cut -d ',' -f 1 | sed 's@CN=@@')"
-
-  # if distrusted at all, x-distrusted
-  if test "${satrust}" == "p" -o "${smtrust}" == "p" -o "${cstrust}" == "p"
-  then
-      # if any distrusted, x-distrusted
-      p11trust="x-distrusted: true"
-      p11oid="1.3.6.1.4.1.3319.6.10.1"
-      p11value="0.%06%0a%2b%06%01%04%01%99w%06%0a%01%04 0%1e%06%08%2b%06%01%05%05%07%03%04%06%08%2b%06%01%05%05%07%03%01%06%08%2b%06%01%05%05%07%03%03"
-  else
-      p11trust="trusted: true"
-      p11oid="2.5.29.37"
-      trustp11="p11"
-      if test "${satrust}" == "C"; then
-          trustp11="${trustp11}sa"
-      fi
-      if test "${smtrust}" == "C"; then
-          trustp11="${trustp11}sm"
-      fi
-      if test "${cstrust}" == "C"; then
-          trustp11="${trustp11}cs"
-      fi
-      get-p11-val "${trustp11}"
-  fi
-
-  # Get a hash for the cert
-  keyhash=$("${OPENSSL}" x509 -noout -in tempfile.crt -hash)
-
-  # Print information about cert
-  echo "Certificate:  ${certname}"
-  echo "Keyhash:      ${keyhash}"
-
-  # Place certificate into trust anchors dir
-  anchorfile="${TEMPDIR}/pki/anchors/${keyhash}.pem"
-  echo "[p11-kit-object-v1]" >> "${anchorfile}"
-  echo "label: \"${p11label}\"" >> "${anchorfile}"
-  echo "class: x-certificate-extension" >> "${anchorfile}"
-  echo "object-id: ${p11oid}" >> "${anchorfile}"
-  echo "value: \"${p11value}\"" >> "${anchorfile}"
-  echo "modifiable: false" >> "${anchorfile}"
-  echo "${certkey}" >> "${anchorfile}"
-  echo "" >> "${anchorfile}"
-  echo "[p11-kit-object-v1]" >> "${anchorfile}"
-  echo "label: \"${p11label}\"" >> "${anchorfile}"
-  echo "${p11trust}" >> "${anchorfile}"
-  echo "nss-mozilla-ca-policy: true" >> "${anchorfile}"
-  echo "modifiable: false" >> "${anchorfile}"
-  echo "${certcer}" >> "${anchorfile}"
-  echo "${certtxt}" | sed 's@^@#@' >> "${anchorfile}"
-  echo "Added to p11-kit anchor directory with trust '${satrust},${smtrust},${cstrust}'."
-  
-  
-  # Import certificates trusted for SSL/TLS into the Java keystore and 
-  # GnuTLS certificate bundle
-  if test "${satrust}x" == "Cx"; then
-    # Java keystore
-    if test "${WITH_JAVA}" == "1"; then
-      "${KEYTOOL}" -import -noprompt -alias "${certname}"   \
-                   -keystore "${TEMPDIR}/ssl/java/cacerts"  \
-                   -storepass 'changeit' -file tempfile.crt \
-      2>&1> /dev/null | \
-      sed -e 's@Certificate was a@A@' -e 's@keystore@Java keystore.@'
-    fi
-
-    # GnuTLS certificate bundle
-    cat tempfile.crt >> "${TEMPDIR}/ssl/ca-bundle.crt.tmp"
-    echo "Added to GnuTLS ceritificate bundle."
-  fi
-
-  # Import certificate into the temporary certificate directory with
-  # trust arguments
-  "${OPENSSL}" x509 -in tempfile.crt -text -fingerprint \
-      -setalias "${certname}" ${saarg} ${smarg} ${csarg}    \
-      > "${TEMPDIR}/ssl/certs/${keyhash}.pem"
-  echo "Added to OpenSSL certificate directory with trust '${satrust},${smtrust},${cstrust}'."
-
-  # Import all certificates with trust args to the temporary NSS DB
-  if test "${WITH_NSS}" == "1"; then
-    "${CERTUTIL}" -d "sql:${TEMPDIR}/pki/nssdb" -A \
-                  -t "${satrust},${smtrust},${cstrust}" \
-                  -n "${certname}" -i tempfile.crt
-    echo "Added to NSS shared DB with trust '${satrust},${smtrust},${cstrust}'."
-  fi
-
-  # Clean up the directory and environment as we go
-  rm -f tempfile.crt
-  unset keyhash subject certname
-  unset satrust smtrust cstrust catrust sarg smarg csarg caarg
-  unset p11trust p11oid p11value trustp11 certkey certcer certtxt
-  echo -e "\n"
-done
-unset tempfile
-
-# Sanity check
-count=$(ls "${TEMPDIR}"/ssl/certs/*.pem | wc -l)
-# Historically there have been between 152 and 165 certs
-# A minimum of 140 should be safe for a rudimentry sanity check
-if test "${count}" -lt "140" ; then
-    echo "Error! Only ${count} certificates were generated!"
-    echo "Exiting without update!"
-    echo ""
-    echo "${TEMPDIR} is the temporary working directory"
-    exit 2
-fi
-unset count
-
-# Generate the bundle
-bundlefile=`basename "${CABUNDLE}"`
-bundledir=`echo "${CABUNDLE}" | sed "s@/${bundlefile}@@"`
-install -vdm755 "${DESTDIR}${bundledir}" 2>&1>/dev/null
-test -f "${DESTDIR}${CABUNDLE}" && mv "${DESTDIR}${CABUNDLE}" \
-                                      "${DESTDIR}${CABUNDLE}.old"
-echo "VERSION:${VERSION}" > "${DESTDIR}${CABUNDLE}"
-cat "${TEMPDIR}/ssl/ca-bundle.crt.tmp" >> "${DESTDIR}${CABUNDLE}" &&
-rm -f "${DESTDIR}${CABUNDLE}.old"
-unset bundlefile bundledir
-
-# Install Java Cacerts
-if test "${WITH_JAVA}" == "1"; then
-  javafile=`basename "${KEYSTORE}"`
-  javadir=`echo "${KEYSTORE}" | sed "s@/${javafile}@@"`
-  install -vdm755 "${DESTDIR}${javadir}" 2>&1>/dev/null
-  test -f "${DESTDIR}${KEYSTORE}" && mv "${DESTDIR}${KEYSTORE}" \
-                                        "${DESTDIR}${KEYSTORE}.old"
-  install -m644 "${TEMPDIR}/ssl/java/cacerts" "${DESTDIR}${KEYSTORE}" &&
-  rm -f "${DESTDIR}${KEYSTORE}.old"
-  unset javafile javadir
-fi
-
-# Install NSS Shared DB
-if test "${WITH_NSS}" == "1"; then
-  sed -e "s@${TEMPDIR}/pki/nssdb@${NSSDB}@"              \
-      -e 's/library=/library=libnsssysinit.so/'          \
-      -e 's/Flags=internal/Flags=internal,moduleDBOnly/' \
-      -i "${TEMPDIR}/pki/nssdb/pkcs11.txt" 
-  test -d "${DESTDIR}${NSSDB}" && mv "${DESTDIR}${NSSDB}" \
-                                     "${DESTDIR}${NSSDB}.old"
-  install -dm755 "${DESTDIR}${NSSDB}" 2>&1>/dev/null
-  install -m644 "${TEMPDIR}"/pki/nssdb/{cert9.db,key4.db,pkcs11.txt} \
-                 "${DESTDIR}${NSSDB}" &&
-  rm -rf "${DESTDIR}${NSSDB}.old"
-fi
-
-# Install anchors in $ANCHORDIR
-test -d "${DESTDIR}${ANCHORDIR}" && mv "${DESTDIR}${ANCHORDIR}"\
-                                       "${DESTDIR}${ANCHORDIR}.old"
-install -dm755 "${DESTDIR}${ANCHORDIR}" 2>&1>/dev/null
-install -m644 "${TEMPDIR}"/pki/anchors/*.pem "${DESTDIR}${ANCHORDIR}" &&
-rm -rf "${DESTDIR}${ANCHORDIR}.old"
-
-# Install certificates in $CERTDIR
-test -d "${DESTDIR}${CERTDIR}" && mv "${DESTDIR}${CERTDIR}" \
-                                     "${DESTDIR}${CERTDIR}.old"
-install -dm755 "${DESTDIR}${CERTDIR}" 2>&1>/dev/null
-install -m644 "${TEMPDIR}"/ssl/certs/*.pem "${DESTDIR}${CERTDIR}" &&
-rm -rf "${DESTDIR}${CERTDIR}.old"
-
-# Import any certs in $LOCALDIR
-# Don't do any checking, just trust the admin
-if test -d "${LOCALDIR}"; then
-  for cert in `find "${LOCALDIR}" -name "*.pem"`; do
-    # Get some information about the certificate
-    keyhash=$("${OPENSSL}" x509 -noout -in "${cert}" -hash)
-    subject=$("${OPENSSL}" x509 -noout -in "${cert}" -subject)
-    count=1
-    while test "${count}" -lt 10; do
-      echo "${subject}" | cut -d "/" -f "${count}" | grep "CN=" >/dev/null \
-           && break
-      let count++
-    done
-    certname=$(echo "${subject}" | cut -d "/" -f "${count}" | sed 's@CN=@@')
-
-    echo "Certificate:  ${certname}"
-    echo "Keyhash:      ${keyhash}"
-
-    # Get trust information
-    trustlist=$("${OPENSSL}" x509 -in "${cert}" -text -trustout | \
-                       grep -A1 "Trusted Uses")
-    satrust=""
-    smtrust=""
-    cstrust=""
-    catrust=""
-    satrust=$(echo "${trustlist}" | \
-              grep "TLS Web Server" 2>&1> /dev/null && echo "C")
-    smtrust=$(echo "${trustlist}" | \
-              grep "E-mail Protection" 2>&1 >/dev/null && echo "C")
-    cstrust=$(echo "${trustlist}" | \
-              grep "Code Signing" 2>&1 >/dev/null && echo "C")
-    catrust=$(echo "${trustlist}" | \
-              grep "Client Auth" 2>&1 >/dev/null && echo "C")
-
-    # Get reject information
-    rejectlist=$("${OPENSSL}" x509 -in "${cert}" -text -trustout | \
-                     grep -A1 "Rejected Uses")
-    if test "${satrust}" == ""; then satrust=$(echo "${rejectlist}" | \
-              grep "TLS Web Server" 2>&1> /dev/null && echo "p"); fi
-    if test "${smtrust}" == ""; then smtrust=$(echo "${rejectlist}" | \
-              grep "E-mail Protection" 2>&1> /dev/null && echo "p"); fi
-    if test "${cstrust}" == ""; then cstrust=$(echo "${rejectlist}" | \
-              grep "Code Signing" 2>&1> /dev/null && echo "p"); fi
-    if test "${catrust}" == ""; then catrust=$(echo "${rejectlist}" | \
-              grep "Client Auth" 2>&1> /dev/null && echo "p"); fi
-
-
-    # Place certificate into trust anchors dir
-    p11label="$(grep -m1 "Issuer" ${cert} | grep -o CN=.*$ | \
-                cut -d ',' -f 1 | sed 's@CN=@@')"
-
-    # if distrusted at all, x-distrusted
-    if test "${satrust}" == "p" -o "${smtrust}" == "p" -o "${cstrust}" == "p"
-    then
-        # if any distrusted, x-distrusted
-        p11trust="x-distrusted: true"
-        p11oid="1.3.6.1.4.1.3319.6.10.1"
-        p11value="0.%06%0a%2b%06%01%04%01%99w%06%0a%01%04 0%1e%06%08%2b%06%01%05%05%07%03%04%06%08%2b%06%01%05%05%07%03%01%06%08%2b%06%01%05%05%07%03%03"
-    else
-        p11trust="trusted: true"
-        p11oid="2.5.29.37"
-        trustp11="p11"
-        if test "${satrust}" == "C"; then
-            trustp11="${trustp11}sa"
-        fi
-        if test "${smtrust}" == "C"; then
-            trustp11="${trustp11}sm"
-        fi
-        if test "${cstrust}" == "C"; then
-            trustp11="${trustp11}cs"
-        fi
-        get-p11-val "${trustp11}"
-    fi
-
-    anchorfile="${DESTDIR}${ANCHORDIR}/${keyhash}.pem"
-
-    echo "[p11-kit-object-v1]" >> "${anchorfile}"
-    echo "label: \"${p11label}\"" >> "${anchorfile}"
-    echo "class: x-certificate-extension" >> "${anchorfile}"
-    echo "object-id: ${p11oid}" >> "${anchorfile}"
-    echo "value: \"${p11value}\"" >> "${anchorfile}"
-    echo "modifiable: false" >> "${anchorfile}"
-    echo "${certkey}" >> "${anchorfile}"
-    echo "" >> "${anchorfile}"
-    echo "[p11-kit-object-v1]" >> "${anchorfile}"
-    echo "label: \"${p11label}\"" >> "${anchorfile}"
-    echo "${p11trust}" >> "${anchorfile}"
-    echo "modifiable: false" >> "${anchorfile}"
-    echo "${certcer}" >> "${anchorfile}"
-    echo "${certtxt}" | sed 's@^@#@' >> "${anchorfile}"
-    echo "Added to p11-kit anchor directory with trust '${satrust},${smtrust},${cstrust}'."
-
-    # Install in Java keystore
-    if test "${WITH_JAVA}" == "1" -a "${satrust}x" == "Cx"; then
-      "${KEYTOOL}" -import -noprompt -alias "${certname}"                  \
-                   -keystore "${DESTDIR}${KEYSTORE}"                       \
-                   -storepass 'changeit' -file "${cert}" 2>&1> /dev/null | \
-      sed -e 's@Certificate was a@A@' -e 's@keystore@Java keystore.@'
-    fi
-
-    # Append to the bundle - source should have trust info, process with
-    # openssl x509 to strip
-    if test "${satrust}x" == "Cx"; then
-      "${OPENSSL}" x509 -in "${cert}" -text -fingerprint \
-           >> "${DESTDIR}${CABUNDLE}"
-      echo "Added to GnuTLS certificate bundle."
-    fi
-
-    # Install into OpenSSL certificate store
-    "${OPENSSL}" x509 -in "${cert}" -text -fingerprint \
-                      -setalias "${certname}"          \
-                      >> "${DESTDIR}${CERTDIR}/${keyhash}.pem"
-    echo "Added to OpenSSL certificate directory with trust '${satrust},${smtrust},${cstrust},${catrust}'."
-
-    # Add to Shared NSS DB
-    if test "${WITH_NSS}" == "1"; then
-      "${OPENSSL}" x509 -in "${cert}" -text -fingerprint | \
-      "${CERTUTIL}" -d "sql:${DESTDIR}${NSSDB}" -A                   \
-                    -t "${satrust},${smtrust},${cstrust}"  \
-                    -n "${certname}"
-      echo "Added to NSS shared DB with trust '${satrust},${smtrust},${cstrust}'."
-    fi
-
-    unset keyhash subject count certname
-    unset trustlist rejectlist satrust smtrust cstrust catrust
-    unset p11trust p11oid p11value trustp11 certkey certcer certtxt
-    echo ""
-
-  done
-  unset cert
-fi
-
-/usr/bin/c_rehash "${DESTDIR}${CERTDIR}" 2>&1>/dev/null
-popd > /dev/null
-
-# Clean up the mess
-rm -rf "${TEMPDIR}"
-
-# End /usr/sbin/make-ca.sh
-- 
GitLab