| Index: tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/ocspreqdump.py
|
| diff --git a/tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/ocspreqdump.py b/tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/ocspreqdump.py
|
| deleted file mode 100755
|
| index 3a03115ea4424b6f5ce466de8d7a4ac2ed443fdc..0000000000000000000000000000000000000000
|
| --- a/tools/telemetry/third_party/gsutilz/third_party/pyasn1-modules/tools/ocspreqdump.py
|
| +++ /dev/null
|
| @@ -1,27 +0,0 @@
|
| -#!/usr/bin/python
|
| -#
|
| -# Read ASN.1/PEM X.509 CRMF request on stdin, parse into
|
| -# plain text, then build substrate from it
|
| -#
|
| -from pyasn1.codec.der import decoder, encoder
|
| -from pyasn1_modules import rfc2560, pem
|
| -import sys
|
| -
|
| -if len(sys.argv) != 1:
|
| - print("""Usage:
|
| -$ cat ocsp-request.pem | %s""" % sys.argv[0])
|
| - sys.exit(-1)
|
| -
|
| -ocspReq = rfc2560.OCSPRequest()
|
| -
|
| -substrate = pem.readBase64FromFile(sys.stdin)
|
| -if not substrate:
|
| - sys.exit(0)
|
| -
|
| -cr, rest = decoder.decode(substrate, asn1Spec=ocspReq)
|
| -
|
| -print(cr.prettyPrint())
|
| -
|
| -assert encoder.encode(cr, defMode=False) == substrate or \
|
| - encoder.encode(cr, defMode=True) == substrate, \
|
| - 'OCSP request recode fails'
|
|
|