OXIESEC PANEL
- Current Dir:
/
/
opt
/
gsutil
/
third_party
/
pyasn1-modules
/
pyasn1_modules
Server IP: 2a02:4780:11:1594:0:ef5:22d7:a
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
12/11/2024 09:39:44 AM
rwxr-xr-x
📄
__init__.py
65 bytes
03/03/2018 11:03:26 PM
rw-r--r--
📁
__pycache__
-
02/11/2025 08:19:48 AM
rwxr-xr-x
📄
pem.py
2 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc1155.py
2.61 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc1157.py
3.46 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc1901.py
640 bytes
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc1902.py
3.61 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc1905.py
4.72 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2251.py
26.29 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2314.py
1.28 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2315.py
9.42 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2437.py
2.56 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2459.py
48.84 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2511.py
10.12 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc2560.py
8.2 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3279.py
5.83 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3280.py
45.57 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3281.py
9.63 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3412.py
1.9 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3414.py
1.13 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3447.py
1.57 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc3852.py
19.64 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc4210.py
27.71 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc4211.py
11.83 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc5208.py
1.39 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc5280.py
48.34 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc5652.py
19.64 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
rfc6402.py
14.67 KB
03/03/2018 11:03:26 PM
rw-r--r--
Editing: pem.py
Close
# # This file is part of pyasn1-modules software. # # Copyright (c) 2005-2017, Ilya Etingof <etingof@gmail.com> # License: http://pyasn1.sf.net/license.html # import base64 import sys stSpam, stHam, stDump = 0, 1, 2 # The markers parameters is in form ('start1', 'stop1'), ('start2', 'stop2')... # Return is (marker-index, substrate) def readPemBlocksFromFile(fileObj, *markers): startMarkers = dict(map(lambda x: (x[1], x[0]), enumerate(map(lambda y: y[0], markers)))) stopMarkers = dict(map(lambda x: (x[1], x[0]), enumerate(map(lambda y: y[1], markers)))) idx = -1 substrate = '' certLines = [] state = stSpam while True: certLine = fileObj.readline() if not certLine: break certLine = certLine.strip() if state == stSpam: if certLine in startMarkers: certLines = [] idx = startMarkers[certLine] state = stHam continue if state == stHam: if certLine in stopMarkers and stopMarkers[certLine] == idx: state = stDump else: certLines.append(certLine) if state == stDump: if sys.version_info[0] <= 2: substrate = ''.join([base64.b64decode(x) for x in certLines]) else: substrate = ''.encode().join([base64.b64decode(x.encode()) for x in certLines]) break return idx, substrate # Backward compatibility routine def readPemFromFile(fileObj, startMarker='-----BEGIN CERTIFICATE-----', endMarker='-----END CERTIFICATE-----'): idx, substrate = readPemBlocksFromFile(fileObj, (startMarker, endMarker)) return substrate def readBase64fromText(text): if sys.version_info[0] <= 2: return base64.b64decode(text) else: return base64.b64decode(text.encode()) def readBase64FromFile(fileObj): return readBase64fromText(fileObj.read())