OXIESEC PANEL
- Current Dir:
/
/
usr
/
lib
/
python3
/
dist-packages
/
pyasn1_modules
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
03/17/2025 09:32:20 AM
rwxr-xr-x
📄
__init__.py
65 bytes
11/21/2017 09:42:52 PM
rw-r--r--
📁
__pycache__
-
10/21/2019 03:49:49 PM
rwxr-xr-x
📄
pem.py
2 KB
08/05/2017 02:18:37 PM
rw-r--r--
📄
rfc1155.py
2.61 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc1157.py
3.46 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc1901.py
640 bytes
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc1902.py
3.61 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc1905.py
4.72 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc2251.py
26.29 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc2314.py
1.28 KB
01/26/2017 06:49:02 PM
rw-r--r--
📄
rfc2315.py
9.42 KB
11/21/2017 09:42:52 PM
rw-r--r--
📄
rfc2437.py
2.56 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc2459.py
48.84 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc2511.py
10.12 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc2560.py
8.2 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3279.py
5.83 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3280.py
45.57 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3281.py
9.63 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3412.py
1.9 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3414.py
1.13 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3447.py
1.57 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc3852.py
19.64 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc4210.py
27.71 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc4211.py
11.83 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc5208.py
1.39 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc5280.py
48.34 KB
11/23/2017 10:59:48 AM
rw-r--r--
📄
rfc5652.py
19.64 KB
08/05/2017 02:18:37 PM
rw-r--r--
📄
rfc6402.py
14.67 KB
11/23/2017 10:59:48 AM
rw-r--r--
Editing: pem.py
Close
# # This file is part of pyasn1-modules software. # # Copyright (c) 2005-2017, Ilya Etingof <etingof@gmail.com> # License: http://pyasn1.sf.net/license.html # import base64 import sys stSpam, stHam, stDump = 0, 1, 2 # The markers parameters is in form ('start1', 'stop1'), ('start2', 'stop2')... # Return is (marker-index, substrate) def readPemBlocksFromFile(fileObj, *markers): startMarkers = dict(map(lambda x: (x[1], x[0]), enumerate(map(lambda y: y[0], markers)))) stopMarkers = dict(map(lambda x: (x[1], x[0]), enumerate(map(lambda y: y[1], markers)))) idx = -1 substrate = '' certLines = [] state = stSpam while True: certLine = fileObj.readline() if not certLine: break certLine = certLine.strip() if state == stSpam: if certLine in startMarkers: certLines = [] idx = startMarkers[certLine] state = stHam continue if state == stHam: if certLine in stopMarkers and stopMarkers[certLine] == idx: state = stDump else: certLines.append(certLine) if state == stDump: if sys.version_info[0] <= 2: substrate = ''.join([base64.b64decode(x) for x in certLines]) else: substrate = ''.encode().join([base64.b64decode(x.encode()) for x in certLines]) break return idx, substrate # Backward compatibility routine def readPemFromFile(fileObj, startMarker='-----BEGIN CERTIFICATE-----', endMarker='-----END CERTIFICATE-----'): idx, substrate = readPemBlocksFromFile(fileObj, (startMarker, endMarker)) return substrate def readBase64fromText(text): if sys.version_info[0] <= 2: return base64.b64decode(text) else: return base64.b64decode(text.encode()) def readBase64FromFile(fileObj): return readBase64fromText(fileObj.read())