123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604 |
- #! /usr/bin/env perl
- # Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- use File::Spec::Functions;
- use File::Copy;
- use MIME::Base64;
- use OpenSSL::Test qw(:DEFAULT srctop_file srctop_dir bldtop_file bldtop_dir
- data_file);
- use OpenSSL::Test::Utils;
- my $test_name = "test_store";
- setup($test_name);
- my $use_md5 = !disabled("md5");
- my $use_des = !(disabled("des") || disabled("legacy")); # also affects 3des and pkcs12 app
- my $use_dsa = !disabled("dsa");
- my $use_ecc = !disabled("ec");
- my @noexist_files =
- ( "test/blahdiblah.pem",
- "test/blahdibleh.der" );
- my @src_files =
- ( "test/testx509.pem",
- "test/testrsa.pem",
- "test/testrsapub.pem",
- "test/testcrl.pem",
- "apps/server.pem" );
- my @data_files =
- ( "testrsa.msb" );
- push(@data_files,
- ( "testrsa.pvk" ))
- unless disabled("legacy") || disabled("rc4");
- my @src_rsa_files =
- ( "test/testrsa.pem",
- "test/testrsapub.pem" );
- my @generated_files =
- (
- ### generated from the source files
- "testx509.der",
- "testrsa.der",
- "testrsapub.der",
- "testcrl.der",
- ### generated locally
- "rsa-key-pkcs1.pem", "rsa-key-pkcs1.der",
- "rsa-key-pkcs1-aes128.pem",
- "rsa-key-pkcs8.pem", "rsa-key-pkcs8.der",
- "rsa-key-pkcs8-pbes2-sha1.pem", "rsa-key-pkcs8-pbes2-sha1.der",
- "rsa-key-pkcs8-pbes2-sha256.pem", "rsa-key-pkcs8-pbes2-sha256.der",
- );
- push(@generated_files, (
- "rsa-key-pkcs8-pbes1-sha1-3des.pem", "rsa-key-pkcs8-pbes1-sha1-3des.der",
- )) if $use_des;
- push(@generated_files, (
- "rsa-key-sha1-3des-sha1.p12", "rsa-key-sha1-3des-sha256.p12",
- "rsa-key-aes256-cbc-sha256.p12",
- "rsa-key-md5-des-sha1.p12",
- "rsa-key-aes256-cbc-md5-des-sha256.p12"
- )) if $use_des;
- push(@generated_files, (
- "rsa-key-pkcs8-pbes1-md5-des.pem", "rsa-key-pkcs8-pbes1-md5-des.der"
- )) if $use_md5 && $use_des;
- push(@generated_files, (
- "dsa-key-pkcs1.pem", "dsa-key-pkcs1.der",
- "dsa-key-pkcs1-aes128.pem",
- "dsa-key-pkcs8.pem", "dsa-key-pkcs8.der",
- "dsa-key-pkcs8-pbes2-sha1.pem", "dsa-key-pkcs8-pbes2-sha1.der",
- )) if $use_dsa;
- push(@generated_files, "dsa-key-aes256-cbc-sha256.p12") if $use_dsa && $use_des;
- push(@generated_files, (
- "ec-key-pkcs1.pem", "ec-key-pkcs1.der",
- "ec-key-pkcs1-aes128.pem",
- "ec-key-pkcs8.pem", "ec-key-pkcs8.der",
- "ec-key-pkcs8-pbes2-sha1.pem", "ec-key-pkcs8-pbes2-sha1.der",
- )) if $use_ecc;
- push(@generated_files, "ec-key-aes256-cbc-sha256.p12") if $use_ecc && $use_des;
- my %generated_file_files =
- $^O eq 'linux'
- ? ( "test/testx509.pem" => "file:testx509.pem",
- "test/testrsa.pem" => "file:testrsa.pem",
- "test/testrsapub.pem" => "file:testrsapub.pem",
- "test/testcrl.pem" => "file:testcrl.pem",
- "apps/server.pem" => "file:server.pem" )
- : ();
- my @noexist_file_files =
- ( "file:blahdiblah.pem",
- "file:test/blahdibleh.der" );
- # There is more than one method to get a 'file:' loader.
- # The default is a built-in provider implementation.
- # However, there is also an engine, specially for testing purposes.
- #
- # @methods is a collection of extra 'openssl storeutl' arguments used to
- # try the different methods.
- my @methods;
- my @prov_method = qw(-provider default);
- push @prov_method, qw(-provider legacy) unless disabled('legacy');
- push @methods, [ @prov_method ];
- push @methods, [qw(-engine loader_attic)]
- unless disabled('loadereng');
- my $n = scalar @methods
- * ( (3 * scalar @noexist_files)
- + (6 * scalar @src_files)
- + (2 * scalar @data_files)
- + (4 * scalar @generated_files)
- + (scalar keys %generated_file_files)
- + (scalar @noexist_file_files)
- + 3
- + 11 );
- # Test doesn't work under msys because the file name munging doesn't work
- # correctly with the "ot:" prefix
- my $do_test_ossltest_store =
- !(disabled("engine") || disabled("dynamic-engine") || $^O =~ /^msys$/);
- if ($do_test_ossltest_store) {
- # test loading with apps 'org.openssl.engine:' loader, using the
- # ossltest engine.
- $n += 4 * scalar @src_rsa_files;
- }
- plan skip_all => "No plan" if $n == 0;
- plan tests => $n;
- indir "store_$$" => sub {
- if ($do_test_ossltest_store) {
- # ossltest loads PEM files, with names prefixed with 'ot:'.
- # This prefix ensures that the files are, in fact, loaded through
- # that engine and not mistakenly going through the 'file:' loader.
- my $engine_scheme = 'org.openssl.engine:';
- $ENV{OPENSSL_ENGINES} = bldtop_dir("engines");
- foreach (@src_rsa_files) {
- my $file = srctop_file($_);
- my $file_abs = to_abs_file($file);
- my @pubin = $_ =~ m|pub\.pem$| ? ("-pubin") : ();
- ok(run(app(["openssl", "rsa", "-text", "-noout", @pubin,
- "-engine", "ossltest", "-inform", "engine",
- "-in", "ot:$file"])));
- ok(run(app(["openssl", "rsa", "-text", "-noout", @pubin,
- "-engine", "ossltest", "-inform", "engine",
- "-in", "ot:$file_abs"])));
- ok(run(app(["openssl", "rsa", "-text", "-noout", @pubin,
- "-in", "${engine_scheme}ossltest:ot:$file"])));
- ok(run(app(["openssl", "rsa", "-text", "-noout", @pubin,
- "-in", "${engine_scheme}ossltest:ot:$file_abs"])));
- }
- }
- SKIP:
- {
- init() or die "init failed";
- my $rehash = init_rehash();
- foreach my $method (@methods) {
- my @storeutl = ( qw(openssl storeutl), @$method );
- foreach (@noexist_files) {
- my $file = srctop_file($_);
- ok(!run(app([@storeutl, "-noout", $file])));
- ok(!run(app([@storeutl, "-noout", to_abs_file($file)])));
- {
- local $ENV{MSYS2_ARG_CONV_EXCL} = "file:";
- ok(!run(app([@storeutl, "-noout",
- to_abs_file_uri($file)])));
- }
- }
- foreach (@src_files) {
- my $file = srctop_file($_);
- ok(run(app([@storeutl, "-noout", $file])));
- ok(run(app([@storeutl, "-noout", to_abs_file($file)])));
- SKIP:
- {
- skip "file: tests disabled on MingW", 4 if $^O =~ /^msys$/;
- ok(run(app([@storeutl, "-noout",
- to_abs_file_uri($file)])));
- ok(run(app([@storeutl, "-noout",
- to_abs_file_uri($file, 0, "")])));
- ok(run(app([@storeutl, "-noout",
- to_abs_file_uri($file, 0, "localhost")])));
- ok(!run(app([@storeutl, "-noout",
- to_abs_file_uri($file, 0, "dummy")])));
- }
- }
- foreach (@data_files) {
- my $file = data_file($_);
- ok(run(app([@storeutl, "-noout", "-passin", "pass:password",
- $file])));
- ok(run(app([@storeutl, "-noout", "-passin", "pass:password",
- to_abs_file($file)])));
- }
- foreach (@generated_files) {
- ok(run(app([@storeutl, "-noout", "-passin", "pass:password",
- $_])));
- ok(run(app([@storeutl, "-noout", "-passin", "pass:password",
- to_abs_file($_)])));
- SKIP:
- {
- skip "file: tests disabled on MingW", 2 if $^O =~ /^msys$/;
- ok(run(app([@storeutl, "-noout", "-passin",
- "pass:password", to_abs_file_uri($_)])));
- ok(!run(app([@storeutl, "-noout", "-passin",
- "pass:password", to_file_uri($_)])));
- }
- }
- foreach (values %generated_file_files) {
- SKIP:
- {
- skip "file: tests disabled on MingW", 1 if $^O =~ /^msys$/;
- ok(run(app([@storeutl, "-noout", $_])));
- }
- }
- foreach (@noexist_file_files) {
- SKIP:
- {
- skip "file: tests disabled on MingW", 1 if $^O =~ /^msys$/;
- ok(!run(app([@storeutl, "-noout", $_])));
- }
- }
- {
- my $dir = srctop_dir("test", "certs");
- ok(run(app([@storeutl, "-noout", $dir])));
- ok(run(app([@storeutl, "-noout", to_abs_file($dir, 1)])));
- SKIP:
- {
- skip "file: tests disabled on MingW", 1 if $^O =~ /^msys$/;
- ok(run(app([@storeutl, "-noout",
- to_abs_file_uri($dir, 1)])));
- }
- }
- ok(!run(app([@storeutl, '-noout',
- '-subject', '/C=AU/ST=QLD/CN=SSLeay\/rsa test cert',
- srctop_file('test', 'testx509.pem')])),
- "Checking that -subject can't be used with a single file");
- ok(run(app([@storeutl, '-certs', '-noout',
- srctop_file('test', 'testx509.pem')])),
- "Checking that -certs returns 1 object on a certificate file");
- ok(run(app([@storeutl, '-certs', '-noout',
- srctop_file('test', 'testcrl.pem')])),
- "Checking that -certs returns 0 objects on a CRL file");
- ok(run(app([@storeutl, '-crls', '-noout',
- srctop_file('test', 'testx509.pem')])),
- "Checking that -crls returns 0 objects on a certificate file");
- ok(run(app([@storeutl, '-crls', '-noout',
- srctop_file('test', 'testcrl.pem')])),
- "Checking that -crls returns 1 object on a CRL file");
- SKIP: {
- skip "failed rehash initialisation", 6 unless $rehash;
- # subject from testx509.pem:
- # '/C=AU/ST=QLD/CN=SSLeay\/rsa test cert'
- # issuer from testcrl.pem:
- # '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority'
- ok(run(app([@storeutl, '-noout',
- '-subject', '/C=AU/ST=QLD/CN=SSLeay\/rsa test cert',
- catdir(curdir(), 'rehash')])));
- ok(run(app([@storeutl, '-noout',
- '-subject',
- '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority',
- catdir(curdir(), 'rehash')])));
- ok(run(app([@storeutl, '-noout', '-certs',
- '-subject', '/C=AU/ST=QLD/CN=SSLeay\/rsa test cert',
- catdir(curdir(), 'rehash')])));
- ok(run(app([@storeutl, '-noout', '-crls',
- '-subject', '/C=AU/ST=QLD/CN=SSLeay\/rsa test cert',
- catdir(curdir(), 'rehash')])));
- ok(run(app([@storeutl, '-noout', '-certs',
- '-subject',
- '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority',
- catdir(curdir(), 'rehash')])));
- ok(run(app([@storeutl, '-noout', '-crls',
- '-subject',
- '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority',
- catdir(curdir(), 'rehash')])));
- }
- }
- }
- }, create => 1, cleanup => 1;
- sub init {
- my $cnf = srctop_file('test', 'ca-and-certs.cnf');
- my $cakey = srctop_file('test', 'certs', 'ca-key.pem');
- my @std_args = qw(-provider default);
- push @std_args, qw(-provider legacy)
- unless disabled('legacy');
- return (
- # rsa-key-pkcs1.pem
- run(app(["openssl", "pkey", @std_args,
- "-in", data_file("rsa-key-2432.pem"),
- "-out", "rsa-key-pkcs1.pem"]))
- # rsa-key-pkcs1-aes128.pem
- && run(app(["openssl", "rsa", @std_args,
- "-passout", "pass:password", "-aes128",
- "-in", "rsa-key-pkcs1.pem",
- "-out", "rsa-key-pkcs1-aes128.pem"]))
- # dsa-key-pkcs1.pem
- && (!$use_dsa
- || run(app(["openssl", "gendsa", @std_args,
- "-out", "dsa-key-pkcs1.pem",
- data_file("dsaparam.pem")])))
- # dsa-key-pkcs1-aes128.pem
- && (!$use_dsa
- || run(app(["openssl", "dsa", @std_args,
- "-passout", "pass:password", "-aes128",
- "-in", "dsa-key-pkcs1.pem",
- "-out", "dsa-key-pkcs1-aes128.pem"])))
- # ec-key-pkcs1.pem (one might think that 'genec' would be practical)
- && (!$use_ecc
- || run(app(["openssl", "ecparam", @std_args,
- "-genkey",
- "-name", "prime256v1",
- "-out", "ec-key-pkcs1.pem"])))
- # ec-key-pkcs1-aes128.pem
- && (!$use_ecc
- || run(app(["openssl", "ec", @std_args,
- "-passout", "pass:password", "-aes128",
- "-in", "ec-key-pkcs1.pem",
- "-out", "ec-key-pkcs1-aes128.pem"])))
- # *-key-pkcs8.pem
- && runall(sub {
- my $dstfile = shift;
- (my $srcfile = $dstfile)
- =~ s/-key-pkcs8\.pem$/-key-pkcs1.pem/i;
- run(app(["openssl", "pkcs8", @std_args,
- "-topk8", "-nocrypt",
- "-in", $srcfile, "-out", $dstfile]));
- }, grep(/-key-pkcs8\.pem$/, @generated_files))
- # *-key-pkcs8-pbes1-sha1-3des.pem
- && runall(sub {
- my $dstfile = shift;
- (my $srcfile = $dstfile)
- =~ s/-key-pkcs8-pbes1-sha1-3des\.pem$
- /-key-pkcs8.pem/ix;
- run(app(["openssl", "pkcs8", @std_args,
- "-topk8",
- "-passout", "pass:password",
- "-v1", "pbeWithSHA1And3-KeyTripleDES-CBC",
- "-in", $srcfile, "-out", $dstfile]));
- }, grep(/-key-pkcs8-pbes1-sha1-3des\.pem$/, @generated_files))
- # *-key-pkcs8-pbes1-md5-des.pem
- && runall(sub {
- my $dstfile = shift;
- (my $srcfile = $dstfile)
- =~ s/-key-pkcs8-pbes1-md5-des\.pem$
- /-key-pkcs8.pem/ix;
- run(app(["openssl", "pkcs8", @std_args,
- "-topk8",
- "-passout", "pass:password",
- "-v1", "pbeWithSHA1And3-KeyTripleDES-CBC",
- "-in", $srcfile, "-out", $dstfile]));
- }, grep(/-key-pkcs8-pbes1-md5-des\.pem$/, @generated_files))
- # *-key-pkcs8-pbes2-sha1.pem
- && runall(sub {
- my $dstfile = shift;
- (my $srcfile = $dstfile)
- =~ s/-key-pkcs8-pbes2-sha1\.pem$
- /-key-pkcs8.pem/ix;
- run(app(["openssl", "pkcs8", @std_args,
- "-topk8",
- "-passout", "pass:password",
- "-v2", "aes256", "-v2prf", "hmacWithSHA1",
- "-in", $srcfile, "-out", $dstfile]));
- }, grep(/-key-pkcs8-pbes2-sha1\.pem$/, @generated_files))
- # *-key-pkcs8-pbes2-sha1.pem
- && runall(sub {
- my $dstfile = shift;
- (my $srcfile = $dstfile)
- =~ s/-key-pkcs8-pbes2-sha256\.pem$
- /-key-pkcs8.pem/ix;
- run(app(["openssl", "pkcs8", @std_args,
- "-topk8",
- "-passout", "pass:password",
- "-v2", "aes256", "-v2prf", "hmacWithSHA256",
- "-in", $srcfile, "-out", $dstfile]));
- }, grep(/-key-pkcs8-pbes2-sha256\.pem$/, @generated_files))
- # *-cert.pem (intermediary for the .p12 inits)
- && run(app(["openssl", "req", "-x509", @std_args,
- "-config", $cnf, "-noenc",
- "-key", $cakey, "-out", "cacert.pem"]))
- && runall(sub {
- my $srckey = shift;
- (my $dstfile = $srckey) =~ s|-key-pkcs8\.|-cert.|;
- (my $csr = $dstfile) =~ s|\.pem|.csr|;
- (run(app(["openssl", "req", "-new", @std_args,
- "-config", $cnf, "-section", "userreq",
- "-key", $srckey, "-out", $csr]))
- &&
- run(app(["openssl", "x509", @std_args,
- "-days", "3650",
- "-CA", "cacert.pem",
- "-CAkey", $cakey,
- "-set_serial", time(), "-req",
- "-in", $csr, "-out", $dstfile])));
- }, grep(/-key-pkcs8\.pem$/, @generated_files))
- # *.p12
- && runall(sub {
- my $dstfile = shift;
- my ($type, $certpbe_index, $keypbe_index,
- $macalg_index) =
- $dstfile =~ m{^(.*)-key-(?|
- # cert and key PBE are same
- () #
- ([^-]*-[^-]*)- # key & cert PBE
- ([^-]*) # MACalg
- |
- # cert and key PBE are not same
- ([^-]*-[^-]*)- # cert PBE
- ([^-]*-[^-]*)- # key PBE
- ([^-]*) # MACalg
- )\.}x;
- if (!$certpbe_index) {
- $certpbe_index = $keypbe_index;
- }
- my $srckey = "$type-key-pkcs8.pem";
- my $srccert = "$type-cert.pem";
- my %pbes =
- (
- "sha1-3des" => "pbeWithSHA1And3-KeyTripleDES-CBC",
- "md5-des" => "pbeWithMD5AndDES-CBC",
- "aes256-cbc" => "AES-256-CBC",
- );
- my %macalgs =
- (
- "sha1" => "SHA1",
- "sha256" => "SHA256",
- );
- my $certpbe = $pbes{$certpbe_index};
- my $keypbe = $pbes{$keypbe_index};
- my $macalg = $macalgs{$macalg_index};
- if (!defined($certpbe) || !defined($keypbe)
- || !defined($macalg)) {
- print STDERR "Cert PBE for $certpbe_index not defined\n"
- unless defined $certpbe;
- print STDERR "Key PBE for $keypbe_index not defined\n"
- unless defined $keypbe;
- print STDERR "MACALG for $macalg_index not defined\n"
- unless defined $macalg;
- print STDERR "(destination file was $dstfile)\n";
- return 0;
- }
- run(app(["openssl", "pkcs12", @std_args,
- "-inkey", $srckey,
- "-in", $srccert, "-passout", "pass:password",
- "-chain", "-CAfile", "cacert.pem",
- "-export", "-macalg", $macalg,
- "-certpbe", $certpbe, "-keypbe", $keypbe,
- "-out", $dstfile]));
- }, grep(/\.p12/, @generated_files))
- # *.der (the end all init)
- && runall(sub {
- my $dstfile = shift;
- (my $srcfile = $dstfile) =~ s/\.der$/.pem/i;
- if (! -f $srcfile) {
- $srcfile = srctop_file("test", $srcfile);
- }
- my $infh;
- unless (open $infh, $srcfile) {
- return 0;
- }
- my $l;
- while (($l = <$infh>) !~ /^-----BEGIN\s/
- || $l =~ /^-----BEGIN.*PARAMETERS-----/) {
- }
- my $b64 = "";
- while (($l = <$infh>) !~ /^-----END\s/) {
- $l =~ s|\R$||;
- $b64 .= $l unless $l =~ /:/;
- }
- close $infh;
- my $der = decode_base64($b64);
- unless (length($b64) / 4 * 3 - length($der) < 3) {
- print STDERR "Length error, ",length($b64),
- " bytes of base64 became ",length($der),
- " bytes of der? ($srcfile => $dstfile)\n";
- return 0;
- }
- my $outfh;
- unless (open $outfh, ">:raw", $dstfile) {
- return 0;
- }
- print $outfh $der;
- close $outfh;
- return 1;
- }, grep(/\.der$/, @generated_files))
- && runall(sub {
- my $srcfile = shift;
- my $dstfile = $generated_file_files{$srcfile};
- unless (copy srctop_file($srcfile), $dstfile) {
- warn "$!\n";
- return 0;
- }
- return 1;
- }, keys %generated_file_files)
- );
- }
- sub init_rehash {
- return (
- mkdir(catdir(curdir(), 'rehash'))
- && copy(srctop_file('test', 'testx509.pem'),
- catdir(curdir(), 'rehash'))
- && copy(srctop_file('test', 'testcrl.pem'),
- catdir(curdir(), 'rehash'))
- && run(app(['openssl', 'rehash', catdir(curdir(), 'rehash')]))
- );
- }
- sub runall {
- my ($function, @items) = @_;
- foreach (@items) {
- return 0 unless $function->($_);
- }
- return 1;
- }
- # According to RFC8089, a relative file: path is invalid. We still produce
- # them for testing purposes.
- sub to_file_uri {
- my ($file, $isdir, $authority) = @_;
- my $vol;
- my $dir;
- die "to_file_uri: No file given\n" if !defined($file) || $file eq '';
- ($vol, $dir, $file) = File::Spec->splitpath($file, $isdir // 0);
- # Make sure we have a Unix style directory.
- $dir = join('/', File::Spec->splitdir($dir));
- # Canonicalise it (note: it seems to be only needed on Unix)
- while (1) {
- my $newdir = $dir;
- $newdir =~ s|/[^/]*[^/\.]+[^/]*/\.\./|/|g;
- last if $newdir eq $dir;
- $dir = $newdir;
- }
- # Take care of the corner cases the loop can't handle, and that $dir
- # ends with a / unless it's empty
- $dir =~ s|/[^/]*[^/\.]+[^/]*/\.\.$|/|;
- $dir =~ s|^[^/]*[^/\.]+[^/]*/\.\./|/|;
- $dir =~ s|^[^/]*[^/\.]+[^/]*/\.\.$||;
- if ($isdir // 0) {
- $dir =~ s|/$|| if $dir ne '/';
- } else {
- $dir .= '/' if $dir ne '' && $dir !~ m|/$|;
- }
- # If the file system has separate volumes (at present, Windows and VMS)
- # we need to handle them. In URIs, they are invariably the first
- # component of the path, which is always absolute.
- # On VMS, user:[foo.bar] translates to /user/foo/bar
- # On Windows, c:\Users\Foo translates to /c:/Users/Foo
- if ($vol ne '') {
- $vol =~ s|:||g if ($^O eq "VMS");
- $dir = '/' . $dir if $dir ne '' && $dir !~ m|^/|;
- $dir = '/' . $vol . $dir;
- }
- $file = $dir . $file;
- return "file://$authority$file" if defined $authority;
- return "file:$file";
- }
- sub to_abs_file {
- my ($file) = @_;
- return File::Spec->rel2abs($file);
- }
- sub to_abs_file_uri {
- my ($file, $isdir, $authority) = @_;
- die "to_abs_file_uri: No file given\n" if !defined($file) || $file eq '';
- return to_file_uri(to_abs_file($file), $isdir, $authority);
- }
|