pkcs1dump.py 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
  1. #!/usr/bin/env python
  2. #
  3. # This file is part of pyasn1-modules software.
  4. #
  5. # Copyright (c) 2005-2019, Ilya Etingof <etingof@gmail.com>
  6. # License: http://snmplabs.com/pyasn1/license.html
  7. #
  8. # Read unencrypted PKCS#1/PKIX-compliant, PEM&DER encoded private keys on
  9. # stdin, print them pretty and encode back into original wire format.
  10. # Private keys can be generated with "openssl genrsa|gendsa" commands.
  11. #
  12. import sys
  13. from pyasn1.codec.der import decoder
  14. from pyasn1.codec.der import encoder
  15. from pyasn1_modules import pem
  16. from pyasn1_modules import rfc2437
  17. from pyasn1_modules import rfc2459
  18. if len(sys.argv) != 1:
  19. print("""Usage:
  20. $ cat rsakey.pem | %s""" % sys.argv[0])
  21. sys.exit(-1)
  22. cnt = 0
  23. while True:
  24. idx, substrate = pem.readPemBlocksFromFile(
  25. sys.stdin,
  26. ('-----BEGIN RSA PRIVATE KEY-----', '-----END RSA PRIVATE KEY-----'),
  27. ('-----BEGIN DSA PRIVATE KEY-----', '-----END DSA PRIVATE KEY-----')
  28. )
  29. if not substrate:
  30. break
  31. if idx == 0:
  32. asn1Spec = rfc2437.RSAPrivateKey()
  33. elif idx == 1:
  34. asn1Spec = rfc2459.DSAPrivateKey()
  35. else:
  36. break
  37. key, rest = decoder.decode(substrate, asn1Spec=asn1Spec)
  38. if rest:
  39. substrate = substrate[:-len(rest)]
  40. print(key.prettyPrint())
  41. assert encoder.encode(key) == substrate, 'pkcs8 recode fails'
  42. cnt += 1
  43. print('*** %s key(s) re/serialized' % cnt)