Mercurial > hgrepos > Python2 > PyMuPDF
comparison mupdf-source/thirdparty/curl/lib/mk-ca-bundle.vbs @ 2:b50eed0cc0ef upstream
ADD: MuPDF v1.26.7: the MuPDF source as downloaded by a default build of PyMuPDF 1.26.4.
The directory name has changed: no version number in the expanded directory now.
| author | Franz Glasner <fzglas.hg@dom66.de> |
|---|---|
| date | Mon, 15 Sep 2025 11:43:07 +0200 |
| parents | |
| children |
comparison
equal
deleted
inserted
replaced
| 1:1d09e1dec1d9 | 2:b50eed0cc0ef |
|---|---|
| 1 '*************************************************************************** | |
| 2 '* _ _ ____ _ | |
| 3 '* Project ___| | | | _ \| | | |
| 4 '* / __| | | | |_) | | | |
| 5 '* | (__| |_| | _ <| |___ | |
| 6 '* \___|\___/|_| \_\_____| | |
| 7 '* | |
| 8 '* Copyright (C) 1998 - 2014, Daniel Stenberg, <daniel@haxx.se>, et al. | |
| 9 '* | |
| 10 '* This software is licensed as described in the file COPYING, which | |
| 11 '* you should have received as part of this distribution. The terms | |
| 12 '* are also available at https://curl.haxx.se/docs/copyright.html. | |
| 13 '* | |
| 14 '* You may opt to use, copy, modify, merge, publish, distribute and/or sell | |
| 15 '* copies of the Software, and permit persons to whom the Software is | |
| 16 '* furnished to do so, under the terms of the COPYING file. | |
| 17 '* | |
| 18 '* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY | |
| 19 '* KIND, either express or implied. | |
| 20 '* | |
| 21 '*************************************************************************** | |
| 22 '* Script to fetch certdata.txt from Mozilla.org site and create a | |
| 23 '* ca-bundle.crt for use with OpenSSL / libcurl / libcurl bindings | |
| 24 '* Requires WinHttp.WinHttpRequest.5.1 and ADODB.Stream which are part of | |
| 25 '* W2000 SP3 or later, WXP SP1 or later, W2003 Server SP1 or later. | |
| 26 '* Hacked by Guenter Knauf | |
| 27 '*************************************************************************** | |
| 28 Option Explicit | |
| 29 Const myVersion = "0.4.0" | |
| 30 | |
| 31 Const myUrl = "https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt" | |
| 32 | |
| 33 Const myOpenSSL = "openssl.exe" | |
| 34 Dim myUseOpenSSL | |
| 35 myUseOpenSSL = TRUE ' Flag: TRUE to use OpenSSL. If TRUE and is not | |
| 36 ' found then a warning is shown before continuing. | |
| 37 | |
| 38 Const myCdSavF = TRUE ' Flag: save downloaded data to file certdata.txt | |
| 39 Const myCaBakF = TRUE ' Flag: backup existing ca-bundle certificate | |
| 40 Const myAskLiF = TRUE ' Flag: display certdata.txt license agreement | |
| 41 Const myWrapLe = 76 ' Default length of base64 output lines | |
| 42 | |
| 43 ' cert info code doesn't work properly with any recent openssl, leave disabled. | |
| 44 ' Also: we want our certificate output by default to be as similar as possible | |
| 45 ' to mk-ca-bundle.pl and setting this TRUE changes the base64 width to | |
| 46 ' OpenSSL's built-in default width, which is not the same as mk-ca-bundle.pl. | |
| 47 Const myAskTiF = FALSE ' Flag: ask to include certificate text info | |
| 48 | |
| 49 ' | |
| 50 '******************* Nothing to configure below! ******************* | |
| 51 ' | |
| 52 Const adTypeBinary = 1 | |
| 53 Const adTypeText = 2 | |
| 54 Const adSaveCreateNotExist = 1 | |
| 55 Const adSaveCreateOverWrite = 2 | |
| 56 Dim objShell, objNetwork, objFSO, objHttp | |
| 57 Dim myBase, mySelf, myStream, myTmpFh, myCdData, myCdFile | |
| 58 Dim myCaFile, myTmpName, myBakNum, myOptTxt, i | |
| 59 Set objNetwork = WScript.CreateObject("WScript.Network") | |
| 60 Set objShell = WScript.CreateObject("WScript.Shell") | |
| 61 Set objFSO = WScript.CreateObject("Scripting.FileSystemObject") | |
| 62 Set objHttp = WScript.CreateObject("WinHttp.WinHttpRequest.5.1") | |
| 63 If objHttp Is Nothing Then Set objHttp = WScript.CreateObject("WinHttp.WinHttpRequest") | |
| 64 myBase = Left(WScript.ScriptFullName, InstrRev(WScript.ScriptFullName, "\")) | |
| 65 mySelf = Left(WScript.ScriptName, InstrRev(WScript.ScriptName, ".") - 1) & " " & myVersion | |
| 66 | |
| 67 myCdFile = Mid(myUrl, InstrRev(myUrl, "/") + 1) | |
| 68 myCaFile = "ca-bundle.crt" | |
| 69 myTmpName = InputBox("It will take a minute to download and parse the " & _ | |
| 70 "certificate data." & _ | |
| 71 vbLf & vbLf & _ | |
| 72 "Please enter the output filename:", mySelf, myCaFile) | |
| 73 If (myTmpName = "") Then | |
| 74 WScript.Quit 1 | |
| 75 End If | |
| 76 myCaFile = myTmpName | |
| 77 If (myCdFile = "") Then | |
| 78 MsgBox("URL does not contain filename!"), vbCritical, mySelf | |
| 79 WScript.Quit 1 | |
| 80 End If | |
| 81 | |
| 82 ' Don't use OpenSSL if it's not present. | |
| 83 If (myUseOpenSSL = TRUE) Then | |
| 84 Dim errnum | |
| 85 | |
| 86 On Error Resume Next | |
| 87 Call objShell.Run("""" & myOpenSSL & """ version", 0, TRUE) | |
| 88 errnum = Err.Number | |
| 89 On Error GoTo 0 | |
| 90 | |
| 91 If Not (errnum = 0) Then | |
| 92 myUseOpenSSL = FALSE | |
| 93 MsgBox("OpenSSL was not found so the certificate bundle will not " & _ | |
| 94 "include the SHA256 hash of the raw certificate data file " & _ | |
| 95 "that was used to generate the certificates in the bundle. " & _ | |
| 96 vbLf & vbLf & _ | |
| 97 "This does not have any effect on the certificate output, " & _ | |
| 98 "so this script will continue." & _ | |
| 99 vbLf & vbLf & _ | |
| 100 "If you want to set a custom location for OpenSSL or disable " & _ | |
| 101 "this message then edit the variables at the start of the " & _ | |
| 102 "script."), vbInformation, mySelf | |
| 103 End If | |
| 104 End If | |
| 105 | |
| 106 If (myAskTiF = TRUE) And (myUseOpenSSL = TRUE) Then | |
| 107 If (6 = objShell.PopUp("Do you want to include text information about " & _ | |
| 108 "each certificate?" & vbLf & _ | |
| 109 "(Requires OpenSSL.exe in the current directory " & _ | |
| 110 "or search path)",, _ | |
| 111 mySelf, vbQuestion + vbYesNo + vbDefaultButton2)) Then | |
| 112 myOptTxt = TRUE | |
| 113 Else | |
| 114 myOptTxt = FALSE | |
| 115 End If | |
| 116 End If | |
| 117 | |
| 118 ' Uncomment the line below to ignore SSL invalid cert errors | |
| 119 ' objHttp.Option(4) = 256 + 512 + 4096 + 8192 | |
| 120 objHttp.SetTimeouts 0, 5000, 10000, 10000 | |
| 121 objHttp.Open "GET", myUrl, FALSE | |
| 122 objHttp.setRequestHeader "User-Agent", WScript.ScriptName & "/" & myVersion | |
| 123 objHttp.Send "" | |
| 124 If Not (objHttp.Status = 200) Then | |
| 125 MsgBox("Failed to download '" & myCdFile & "': " & objHttp.Status & " - " & objHttp.StatusText), vbCritical, mySelf | |
| 126 WScript.Quit 1 | |
| 127 End If | |
| 128 ' Write received data to file if enabled | |
| 129 If (myCdSavF = TRUE) Then | |
| 130 Call SaveBinaryData(myCdFile, objHttp.ResponseBody) | |
| 131 End If | |
| 132 ' Convert data from ResponseBody instead of using ResponseText because of UTF-8 | |
| 133 myCdData = ConvertBinaryToUTF8(objHttp.ResponseBody) | |
| 134 Set objHttp = Nothing | |
| 135 ' Backup exitsing ca-bundle certificate file | |
| 136 If (myCaBakF = TRUE) Then | |
| 137 If objFSO.FileExists(myCaFile) Then | |
| 138 Dim myBakFile, b | |
| 139 b = 1 | |
| 140 myBakFile = myCaFile & ".~" & b & "~" | |
| 141 While objFSO.FileExists(myBakFile) | |
| 142 b = b + 1 | |
| 143 myBakFile = myCaFile & ".~" & b & "~" | |
| 144 Wend | |
| 145 Set myTmpFh = objFSO.GetFile(myCaFile) | |
| 146 myTmpFh.Move myBakFile | |
| 147 End If | |
| 148 End If | |
| 149 | |
| 150 ' Process the received data | |
| 151 Dim myLines, myPattern, myInsideCert, myInsideLicense, myLicenseText, myNumCerts, myNumSkipped | |
| 152 Dim myLabel, myOctets, myData, myPem, myRev, myUntrusted, j | |
| 153 myNumSkipped = 0 | |
| 154 myNumCerts = 0 | |
| 155 myData = "" | |
| 156 myLines = Split(myCdData, vbLf, -1) | |
| 157 Set myStream = CreateObject("ADODB.Stream") | |
| 158 myStream.Open | |
| 159 myStream.Type = adTypeText | |
| 160 myStream.Charset = "utf-8" | |
| 161 myStream.WriteText "##" & vbLf & _ | |
| 162 "## Bundle of CA Root Certificates" & vbLf & _ | |
| 163 "##" & vbLf & _ | |
| 164 "## Certificate data from Mozilla as of: " & _ | |
| 165 ConvertDateToString(LocalDateToUTC(Now)) & " GMT" & vbLf & _ | |
| 166 "##" & vbLf & _ | |
| 167 "## This is a bundle of X.509 certificates of public Certificate Authorities" & vbLf & _ | |
| 168 "## (CA). These were automatically extracted from Mozilla's root certificates" & vbLf & _ | |
| 169 "## file (certdata.txt). This file can be found in the mozilla source tree:" & vbLf & _ | |
| 170 "## " & myUrl & vbLf & _ | |
| 171 "##" & vbLf & _ | |
| 172 "## It contains the certificates in PEM format and therefore" & vbLf & _ | |
| 173 "## can be directly used with curl / libcurl / php_curl, or with" & vbLf & _ | |
| 174 "## an Apache+mod_ssl webserver for SSL client authentication." & vbLf & _ | |
| 175 "## Just configure this file as the SSLCACertificateFile." & vbLf & _ | |
| 176 "##" & vbLf & _ | |
| 177 "## Conversion done with mk-ca-bundle.vbs version " & myVersion & "." & vbLf | |
| 178 If (myCdSavF = TRUE) And (myUseOpenSSL = TRUE) Then | |
| 179 myStream.WriteText "## SHA256: " & FileSHA256(myCdFile) & vbLf | |
| 180 End If | |
| 181 myStream.WriteText "##" & vbLf & vbLf | |
| 182 | |
| 183 myStream.WriteText vbLf | |
| 184 For i = 0 To UBound(myLines) | |
| 185 If InstrRev(myLines(i), "CKA_LABEL ") Then | |
| 186 myPattern = "^CKA_LABEL\s+[A-Z0-9]+\s+""(.+?)""" | |
| 187 myLabel = RegExprFirst(myPattern, myLines(i)) | |
| 188 End If | |
| 189 If (myInsideCert = TRUE) Then | |
| 190 If InstrRev(myLines(i), "END") Then | |
| 191 myInsideCert = FALSE | |
| 192 While (i < UBound(myLines)) And Not (myLines(i) = "#") | |
| 193 i = i + 1 | |
| 194 If InstrRev(myLines(i), "CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NSS_TRUSTED_DELEGATOR") Then | |
| 195 myUntrusted = FALSE | |
| 196 End If | |
| 197 Wend | |
| 198 If (myUntrusted = TRUE) Then | |
| 199 myNumSkipped = myNumSkipped + 1 | |
| 200 Else | |
| 201 myStream.WriteText myLabel & vbLf | |
| 202 myStream.WriteText String(Len(myLabel), "=") & vbLf | |
| 203 myPem = "-----BEGIN CERTIFICATE-----" & vbLf & _ | |
| 204 Base64Encode(myData) & vbLf & _ | |
| 205 "-----END CERTIFICATE-----" & vbLf | |
| 206 If (myOptTxt = FALSE) Then | |
| 207 myStream.WriteText myPem & vbLf | |
| 208 Else | |
| 209 Dim myCmd, myRval, myTmpIn, myTmpOut | |
| 210 myTmpIn = objFSO.GetSpecialFolder(2).Path & "\" & objFSO.GetTempName | |
| 211 myTmpOut = objFSO.GetSpecialFolder(2).Path & "\" & objFSO.GetTempName | |
| 212 Set myTmpFh = objFSO.OpenTextFile(myTmpIn, 2, TRUE) | |
| 213 myTmpFh.Write myPem | |
| 214 myTmpFh.Close | |
| 215 myCmd = """" & myOpenSSL & """ x509 -md5 -fingerprint -text " & _ | |
| 216 "-inform PEM -in " & myTmpIn & " -out " & myTmpOut | |
| 217 myRval = objShell.Run (myCmd, 0, TRUE) | |
| 218 objFSO.DeleteFile myTmpIn, TRUE | |
| 219 If Not (myRval = 0) Then | |
| 220 MsgBox("Failed to process PEM cert with OpenSSL commandline!"), vbCritical, mySelf | |
| 221 objFSO.DeleteFile myTmpOut, TRUE | |
| 222 WScript.Quit 3 | |
| 223 End If | |
| 224 Set myTmpFh = objFSO.OpenTextFile(myTmpOut, 1) | |
| 225 myStream.WriteText myTmpFh.ReadAll & vbLf | |
| 226 myTmpFh.Close | |
| 227 objFSO.DeleteFile myTmpOut, TRUE | |
| 228 End If | |
| 229 myNumCerts = myNumCerts + 1 | |
| 230 End If | |
| 231 Else | |
| 232 myOctets = Split(myLines(i), "\") | |
| 233 For j = 1 To UBound(myOctets) | |
| 234 myData = myData & Chr(CByte("&o" & myOctets(j))) | |
| 235 Next | |
| 236 End If | |
| 237 End If | |
| 238 If InstrRev(myLines(i), "CVS_ID ") Then | |
| 239 myPattern = "^CVS_ID\s+""(.+?)""" | |
| 240 myRev = RegExprFirst(myPattern, myLines(i)) | |
| 241 myStream.WriteText "# " & myRev & vbLf & vbLf | |
| 242 End If | |
| 243 If InstrRev(myLines(i), "CKA_VALUE MULTILINE_OCTAL") Then | |
| 244 myInsideCert = TRUE | |
| 245 myUntrusted = TRUE | |
| 246 myData = "" | |
| 247 End If | |
| 248 If InstrRev(myLines(i), "***** BEGIN LICENSE BLOCK *****") Then | |
| 249 myInsideLicense = TRUE | |
| 250 End If | |
| 251 If (myInsideLicense = TRUE) Then | |
| 252 myStream.WriteText myLines(i) & vbLf | |
| 253 myLicenseText = myLicenseText & Mid(myLines(i), 2) & vbLf | |
| 254 End If | |
| 255 If InstrRev(myLines(i), "***** END LICENSE BLOCK *****") Then | |
| 256 myInsideLicense = FALSE | |
| 257 If (myAskLiF = TRUE) Then | |
| 258 If Not (6 = objShell.PopUp(myLicenseText & vbLf & _ | |
| 259 "Do you agree to the license shown above (required to proceed) ?",, _ | |
| 260 mySelf, vbQuestion + vbYesNo + vbDefaultButton1)) Then | |
| 261 myStream.Close | |
| 262 objFSO.DeleteFile myCaFile, TRUE | |
| 263 WScript.Quit 2 | |
| 264 End If | |
| 265 End If | |
| 266 End If | |
| 267 Next | |
| 268 | |
| 269 ' To stop the UTF-8 BOM from being written the stream has to be copied and | |
| 270 ' then saved as binary. | |
| 271 Dim myCopy | |
| 272 Set myCopy = CreateObject("ADODB.Stream") | |
| 273 myCopy.Type = adTypeBinary | |
| 274 myCopy.Open | |
| 275 myStream.Position = 3 ' Skip UTF-8 BOM | |
| 276 myStream.CopyTo myCopy | |
| 277 myCopy.SaveToFile myCaFile, adSaveCreateOverWrite | |
| 278 myCopy.Close | |
| 279 myStream.Close | |
| 280 Set myCopy = Nothing | |
| 281 Set myStream = Nothing | |
| 282 | |
| 283 ' Done | |
| 284 objShell.PopUp "Done (" & myNumCerts & " CA certs processed, " & myNumSkipped & _ | |
| 285 " untrusted skipped).", 20, mySelf, vbInformation | |
| 286 WScript.Quit 0 | |
| 287 | |
| 288 Function ConvertBinaryToUTF8(arrBytes) | |
| 289 Dim objStream | |
| 290 Set objStream = CreateObject("ADODB.Stream") | |
| 291 objStream.Open | |
| 292 objStream.Type = adTypeBinary | |
| 293 objStream.Write arrBytes | |
| 294 objStream.Position = 0 | |
| 295 objStream.Type = adTypeText | |
| 296 objStream.Charset = "utf-8" | |
| 297 ConvertBinaryToUTF8 = objStream.ReadText | |
| 298 Set objStream = Nothing | |
| 299 End Function | |
| 300 | |
| 301 Function SaveBinaryData(filename, data) | |
| 302 Dim objStream | |
| 303 Set objStream = CreateObject("ADODB.Stream") | |
| 304 objStream.Type = adTypeBinary | |
| 305 objStream.Open | |
| 306 objStream.Write data | |
| 307 objStream.SaveToFile filename, adSaveCreateOverWrite | |
| 308 objStream.Close | |
| 309 Set objStream = Nothing | |
| 310 End Function | |
| 311 | |
| 312 Function RegExprFirst(SearchPattern, TheString) | |
| 313 Dim objRegExp, Matches ' create variables. | |
| 314 Set objRegExp = New RegExp ' create a regular expression. | |
| 315 objRegExp.Pattern = SearchPattern ' sets the search pattern. | |
| 316 objRegExp.IgnoreCase = TRUE ' set to ignores case. | |
| 317 objRegExp.Global = TRUE ' set to global search. | |
| 318 Set Matches = objRegExp.Execute(TheString) ' do the search. | |
| 319 If (Matches.Count) Then | |
| 320 RegExprFirst = Matches(0).SubMatches(0) ' return first match. | |
| 321 Else | |
| 322 RegExprFirst = "" | |
| 323 End If | |
| 324 Set objRegExp = Nothing | |
| 325 End Function | |
| 326 | |
| 327 Function Base64Encode(inData) | |
| 328 Const Base64 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/" | |
| 329 Dim cOut, sOut, lWrap, I | |
| 330 lWrap = Int(myWrapLe * 3 / 4) | |
| 331 | |
| 332 'For each group of 3 bytes | |
| 333 For I = 1 To Len(inData) Step 3 | |
| 334 Dim nGroup, pOut, sGroup | |
| 335 | |
| 336 'Create one long from this 3 bytes. | |
| 337 nGroup = &H10000 * Asc(Mid(inData, I, 1)) + _ | |
| 338 &H100 * MyASC(Mid(inData, I + 1, 1)) + _ | |
| 339 MyASC(Mid(inData, I + 2, 1)) | |
| 340 | |
| 341 'Oct splits the long To 8 groups with 3 bits | |
| 342 nGroup = Oct(nGroup) | |
| 343 | |
| 344 'Add leading zeros | |
| 345 nGroup = String(8 - Len(nGroup), "0") & nGroup | |
| 346 | |
| 347 'Convert To base64 | |
| 348 pOut = Mid(Base64, CLng("&o" & Mid(nGroup, 1, 2)) + 1, 1) & _ | |
| 349 Mid(Base64, CLng("&o" & Mid(nGroup, 3, 2)) + 1, 1) & _ | |
| 350 Mid(Base64, CLng("&o" & Mid(nGroup, 5, 2)) + 1, 1) & _ | |
| 351 Mid(Base64, CLng("&o" & Mid(nGroup, 7, 2)) + 1, 1) | |
| 352 | |
| 353 'Add the part To OutPut string | |
| 354 sOut = sOut + pOut | |
| 355 | |
| 356 'Add a new line For Each myWrapLe chars In dest | |
| 357 If (I < Len(inData) - 2) Then | |
| 358 If (I + 2) Mod lWrap = 0 Then sOut = sOut & vbLf | |
| 359 End If | |
| 360 Next | |
| 361 Select Case Len(inData) Mod 3 | |
| 362 Case 1: '8 bit final | |
| 363 sOut = Left(sOut, Len(sOut) - 2) & "==" | |
| 364 Case 2: '16 bit final | |
| 365 sOut = Left(sOut, Len(sOut) - 1) & "=" | |
| 366 End Select | |
| 367 Base64Encode = sOut | |
| 368 End Function | |
| 369 | |
| 370 Function MyASC(OneChar) | |
| 371 If OneChar = "" Then MyASC = 0 Else MyASC = Asc(OneChar) | |
| 372 End Function | |
| 373 | |
| 374 ' Return the date in the same format as perl to match mk-ca-bundle.pl output: | |
| 375 ' Wed Sep 7 03:12:05 2016 | |
| 376 Function ConvertDateToString(input) | |
| 377 Dim output | |
| 378 output = WeekDayName(WeekDay(input), TRUE) & " " & _ | |
| 379 MonthName(Month(input), TRUE) & " " | |
| 380 If (Len(Day(input)) = 1) Then | |
| 381 output = output & " " | |
| 382 End If | |
| 383 output = output & _ | |
| 384 Day(input) & " " & _ | |
| 385 FormatDateTime(input, vbShortTime) & ":" | |
| 386 If (Len(Second(input)) = 1) Then | |
| 387 output = output & "0" | |
| 388 End If | |
| 389 output = output & _ | |
| 390 Second(input) & " " & _ | |
| 391 Year(input) | |
| 392 ConvertDateToString = output | |
| 393 End Function | |
| 394 | |
| 395 ' Convert local Date to UTC. Microsoft says: | |
| 396 ' Use Win32_ComputerSystem CurrentTimeZone property, because it automatically | |
| 397 ' adjusts the Time Zone bias for daylight saving time; Win32_Time Zone Bias | |
| 398 ' property does not. | |
| 399 ' https://msdn.microsoft.com/en-us/library/windows/desktop/ms696015.aspx | |
| 400 Function LocalDateToUTC(localdate) | |
| 401 Dim item, offset | |
| 402 For Each item In GetObject("winmgmts:").InstancesOf("Win32_ComputerSystem") | |
| 403 offset = item.CurrentTimeZone ' the offset in minutes | |
| 404 Next | |
| 405 If (offset < 0) Then | |
| 406 LocalDateToUTC = DateAdd("n", ABS(offset), localdate) | |
| 407 Else | |
| 408 LocalDateToUTC = DateAdd("n", -ABS(offset), localdate) | |
| 409 End If | |
| 410 'objShell.PopUp LocalDateToUTC | |
| 411 End Function | |
| 412 | |
| 413 Function FileSHA256(filename) | |
| 414 Dim cmd, rval, tmpOut, tmpFh | |
| 415 if (myUseOpenSSL = TRUE) Then | |
| 416 tmpOut = objFSO.GetSpecialFolder(2).Path & "\" & objFSO.GetTempName | |
| 417 cmd = """" & myOpenSSL & """ dgst -r -sha256 -out """ & tmpOut & """ """ & filename & """" | |
| 418 rval = objShell.Run(cmd, 0, TRUE) | |
| 419 If Not (rval = 0) Then | |
| 420 MsgBox("Failed to get sha256 of """ & filename & """ with OpenSSL commandline!"), vbCritical, mySelf | |
| 421 objFSO.DeleteFile tmpOut, TRUE | |
| 422 WScript.Quit 3 | |
| 423 End If | |
| 424 Set tmpFh = objFSO.OpenTextFile(tmpOut, 1) | |
| 425 FileSHA256 = RegExprFirst("^([0-9a-f]{64}) .+", tmpFh.ReadAll) | |
| 426 tmpFh.Close | |
| 427 objFSO.DeleteFile tmpOut, TRUE | |
| 428 Else | |
| 429 FileSHA256 = "" | |
| 430 End If | |
| 431 End Function |
