OXIESEC PANEL
- Current Dir:
/
/
opt
/
gsutil
/
third_party
/
pyasn1-modules
/
tools
Server IP: 2a02:4780:11:1594:0:ef5:22d7:a
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
12/11/2024 09:39:44 AM
rwxr-xr-x
📄
cmcdump.py
1.73 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
cmpdump.py
926 bytes
03/03/2018 11:03:26 PM
rw-r--r--
📄
crldump.py
1.05 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
crmfdump.py
795 bytes
03/03/2018 11:03:26 PM
rw-r--r--
📄
ocspclient.py
5.26 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
ocspreqdump.py
807 bytes
03/03/2018 11:03:26 PM
rw-r--r--
📄
ocsprspdump.py
804 bytes
03/03/2018 11:03:26 PM
rw-r--r--
📄
pkcs10dump.py
1.13 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
pkcs1dump.py
1.36 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
pkcs7dump.py
1.47 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
pkcs8dump.py
1.28 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
snmpget.py
1.41 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
x509dump-rfc5280.py
1.19 KB
03/03/2018 11:03:26 PM
rw-r--r--
📄
x509dump.py
1.11 KB
03/03/2018 11:03:26 PM
rw-r--r--
Editing: cmpdump.py
Close
#!/usr/bin/env python # # This file is part of pyasn1-modules software. # # Copyright (c) 2005-2017, Ilya Etingof <etingof@gmail.com> # License: http://pyasn1.sf.net/license.html # # Read ASN.1/PEM CMP message on stdin, parse into # plain text, then build substrate from it # import sys from pyasn1 import debug from pyasn1.codec.der import decoder from pyasn1.codec.der import encoder from pyasn1_modules import pem from pyasn1_modules import rfc4210 if len(sys.argv) == 2 and sys.argv[1] == '-d': debug.setLogger(debug.Debug('all')) elif len(sys.argv) != 1: print("""Usage: $ cat cmp.pem | %s [-d]""" % sys.argv[0]) sys.exit(-1) pkiMessage = rfc4210.PKIMessage() substrate = pem.readBase64FromFile(sys.stdin) if not substrate: sys.exit(0) pkiMsg, rest = decoder.decode(substrate, asn1Spec=pkiMessage) print(pkiMsg.prettyPrint()) assert encoder.encode(pkiMsg) == substrate, 'CMP message recode fails'