Index: tools/telemetry/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py |
diff --git a/tools/telemetry/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py b/tools/telemetry/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py |
deleted file mode 100644 |
index 7794871620d33f48b971601d578c3d9b5784fe3c..0000000000000000000000000000000000000000 |
--- a/tools/telemetry/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py |
+++ /dev/null |
@@ -1,47 +0,0 @@ |
-#!/usr/bin/python |
-# |
-# Read ASN.1/PEM PKCS#7 on stdin, parse it into plain text, |
-# then build substrate from it |
-# |
-from pyasn1_modules import rfc2315, pem |
-from pyasn1.codec.der import encoder, decoder |
-import sys |
- |
-if len(sys.argv) != 1: |
- print("""Usage: |
-$ cat pkcs7Certificate.pem | %s""" % sys.argv[0]) |
- sys.exit(-1) |
- |
-idx, substrate = pem.readPemBlocksFromFile( |
- sys.stdin, ('-----BEGIN PKCS7-----', '-----END PKCS7-----') |
- ) |
- |
-assert substrate, 'bad PKCS7 data on input' |
- |
-contentInfo, rest = decoder.decode(substrate, asn1Spec=rfc2315.ContentInfo()) |
- |
-if rest: substrate = substrate[:-len(rest)] |
- |
-print(contentInfo.prettyPrint()) |
- |
-assert encoder.encode(contentInfo, defMode=False) == substrate or \ |
- encoder.encode(contentInfo, defMode=True) == substrate, \ |
- 're-encode fails' |
- |
-contentType = contentInfo.getComponentByName('contentType') |
- |
-contentInfoMap = { |
- (1, 2, 840, 113549, 1, 7, 1): rfc2315.Data(), |
- (1, 2, 840, 113549, 1, 7, 2): rfc2315.SignedData(), |
- (1, 2, 840, 113549, 1, 7, 3): rfc2315.EnvelopedData(), |
- (1, 2, 840, 113549, 1, 7, 4): rfc2315.SignedAndEnvelopedData(), |
- (1, 2, 840, 113549, 1, 7, 5): rfc2315.DigestedData(), |
- (1, 2, 840, 113549, 1, 7, 6): rfc2315.EncryptedData() |
- } |
- |
-content, _ = decoder.decode( |
- contentInfo.getComponentByName('content'), |
- asn1Spec=contentInfoMap[contentType] |
- ) |
- |
-print(content.prettyPrint()) |