diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 14:29:10 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 14:29:10 +0000 |
commit | 2aa4a82499d4becd2284cdb482213d541b8804dd (patch) | |
tree | b80bf8bf13c3766139fbacc530efd0dd9d54394c /third_party/python/pyasn1-modules/tools/pkcs1dump.py | |
parent | Initial commit. (diff) | |
download | firefox-upstream.tar.xz firefox-upstream.zip |
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'third_party/python/pyasn1-modules/tools/pkcs1dump.py')
-rwxr-xr-x | third_party/python/pyasn1-modules/tools/pkcs1dump.py | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/third_party/python/pyasn1-modules/tools/pkcs1dump.py b/third_party/python/pyasn1-modules/tools/pkcs1dump.py new file mode 100755 index 0000000000..f205d779cc --- /dev/null +++ b/third_party/python/pyasn1-modules/tools/pkcs1dump.py @@ -0,0 +1,50 @@ +#!/usr/bin/env python +# +# This file is part of pyasn1-modules software. +# +# Copyright (c) 2005-2017, Ilya Etingof <etingof@gmail.com> +# License: http://pyasn1.sf.net/license.html +# +# Read unencrypted PKCS#1/PKIX-compliant, PEM&DER encoded private keys on +# stdin, print them pretty and encode back into original wire format. +# Private keys can be generated with "openssl genrsa|gendsa" commands. +# +from pyasn1_modules import rfc2459, rfc2437, pem +from pyasn1.codec.der import encoder, decoder +import sys + +if len(sys.argv) != 1: + print("""Usage: +$ cat rsakey.pem | %s""" % sys.argv[0]) + sys.exit(-1) + +cnt = 0 + +while True: + idx, substrate = pem.readPemBlocksFromFile( + sys.stdin, + ('-----BEGIN RSA PRIVATE KEY-----', '-----END RSA PRIVATE KEY-----'), + ('-----BEGIN DSA PRIVATE KEY-----', '-----END DSA PRIVATE KEY-----') + ) + if not substrate: + break + + if idx == 0: + asn1Spec = rfc2437.RSAPrivateKey() + elif idx == 1: + asn1Spec = rfc2459.DSAPrivateKey() + else: + break + + key, rest = decoder.decode(substrate, asn1Spec=asn1Spec) + + if rest: + substrate = substrate[:-len(rest)] + + print(key.prettyPrint()) + + assert encoder.encode(key) == substrate, 'pkcs8 recode fails' + + cnt += 1 + +print('*** %s key(s) re/serialized' % cnt) |