Index: tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/x509dump.py |
diff --git a/tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/x509dump.py b/tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/x509dump.py |
new file mode 100755 |
index 0000000000000000000000000000000000000000..64cba7e3053cbf478cbe128b1c357fdc2c5de76f |
--- /dev/null |
+++ b/tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/x509dump.py |
@@ -0,0 +1,40 @@ |
+#!/usr/bin/python |
+# |
+# Read ASN.1/PEM X.509 certificates on stdin, parse each into plain text, |
+# then build substrate from it |
+# |
+from pyasn1.codec.der import decoder, encoder |
+from pyasn1_modules import rfc2459, pem |
+import sys |
+ |
+if len(sys.argv) != 1: |
+ print("""Usage: |
+$ cat CACertificate.pem | %s |
+$ cat userCertificate.pem | %s""" % (sys.argv[0], sys.argv[0])) |
+ sys.exit(-1) |
+ |
+certType = rfc2459.Certificate() |
+ |
+certCnt = 0 |
+ |
+while 1: |
+ idx, substrate = pem.readPemBlocksFromFile( |
+ sys.stdin, ('-----BEGIN CERTIFICATE-----', |
+ '-----END CERTIFICATE-----') |
+ ) |
+ if not substrate: |
+ break |
+ |
+ cert, rest = decoder.decode(substrate, asn1Spec=certType) |
+ |
+ if rest: substrate = substrate[:-len(rest)] |
+ |
+ print(cert.prettyPrint()) |
+ |
+ assert encoder.encode(cert, defMode=False) == substrate or \ |
+ encoder.encode(cert, defMode=True) == substrate, \ |
+ 'cert recode fails' |
+ |
+ certCnt = certCnt + 1 |
+ |
+print('*** %s PEM cert(s) de/serialized' % certCnt) |