| Index: third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py
|
| diff --git a/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py b/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py
|
| new file mode 100755
|
| index 0000000000000000000000000000000000000000..7794871620d33f48b971601d578c3d9b5784fe3c
|
| --- /dev/null
|
| +++ b/third_party/gsutil/third_party/pyasn1-modules/tools/pkcs7dump.py
|
| @@ -0,0 +1,47 @@
|
| +#!/usr/bin/python
|
| +#
|
| +# Read ASN.1/PEM PKCS#7 on stdin, parse it into plain text,
|
| +# then build substrate from it
|
| +#
|
| +from pyasn1_modules import rfc2315, pem
|
| +from pyasn1.codec.der import encoder, decoder
|
| +import sys
|
| +
|
| +if len(sys.argv) != 1:
|
| + print("""Usage:
|
| +$ cat pkcs7Certificate.pem | %s""" % sys.argv[0])
|
| + sys.exit(-1)
|
| +
|
| +idx, substrate = pem.readPemBlocksFromFile(
|
| + sys.stdin, ('-----BEGIN PKCS7-----', '-----END PKCS7-----')
|
| + )
|
| +
|
| +assert substrate, 'bad PKCS7 data on input'
|
| +
|
| +contentInfo, rest = decoder.decode(substrate, asn1Spec=rfc2315.ContentInfo())
|
| +
|
| +if rest: substrate = substrate[:-len(rest)]
|
| +
|
| +print(contentInfo.prettyPrint())
|
| +
|
| +assert encoder.encode(contentInfo, defMode=False) == substrate or \
|
| + encoder.encode(contentInfo, defMode=True) == substrate, \
|
| + 're-encode fails'
|
| +
|
| +contentType = contentInfo.getComponentByName('contentType')
|
| +
|
| +contentInfoMap = {
|
| + (1, 2, 840, 113549, 1, 7, 1): rfc2315.Data(),
|
| + (1, 2, 840, 113549, 1, 7, 2): rfc2315.SignedData(),
|
| + (1, 2, 840, 113549, 1, 7, 3): rfc2315.EnvelopedData(),
|
| + (1, 2, 840, 113549, 1, 7, 4): rfc2315.SignedAndEnvelopedData(),
|
| + (1, 2, 840, 113549, 1, 7, 5): rfc2315.DigestedData(),
|
| + (1, 2, 840, 113549, 1, 7, 6): rfc2315.EncryptedData()
|
| + }
|
| +
|
| +content, _ = decoder.decode(
|
| + contentInfo.getComponentByName('content'),
|
| + asn1Spec=contentInfoMap[contentType]
|
| + )
|
| +
|
| +print(content.prettyPrint())
|
|
|