From 2618c3fc1d91109602570baad582f985650de7bb Mon Sep 17 00:00:00 2001 From: elie Date: Wed, 11 Apr 2012 14:26:46 +0000 Subject: made executable --- tools/crmfdump.py | 1 + tools/ocspclient.py | 2 ++ tools/pkcs10dump.py | 5 ++++- tools/pkcs1dump.py | 3 +++ tools/pkcs7dump.py | 3 +++ tools/pkcs8dump.py | 3 +++ tools/snmpget.py | 3 +++ tools/x509dump.py | 3 +++ 8 files changed, 22 insertions(+), 1 deletion(-) (limited to 'tools') diff --git a/tools/crmfdump.py b/tools/crmfdump.py index f710cb3..22bfc9d 100644 --- a/tools/crmfdump.py +++ b/tools/crmfdump.py @@ -1,3 +1,4 @@ +#!/usr/bin/python # Read ASN.1/PEM X.509 CRMF request on stdin, parse into # plain text, then build substrate from it from pyasn1.codec.der import decoder, encoder diff --git a/tools/ocspclient.py b/tools/ocspclient.py index 4dcb231..24a824b 100644 --- a/tools/ocspclient.py +++ b/tools/ocspclient.py @@ -1,3 +1,5 @@ +#!/usr/bin/python +# from pyasn1.codec.der import decoder, encoder from pyasn1_modules import rfc2560, rfc2459, pem from pyasn1.type import univ diff --git a/tools/pkcs10dump.py b/tools/pkcs10dump.py index c6c6b92..f3a4e67 100644 --- a/tools/pkcs10dump.py +++ b/tools/pkcs10dump.py @@ -1,12 +1,15 @@ +#!/usr/bin/python +# # Read ASN.1/PEM X.509 certificate requests (PKCS#10 format) on stdin, # parse each into plain text, then build substrate from it +# from pyasn1.codec.der import decoder, encoder from pyasn1_modules import rfc2314, pem import sys if len(sys.argv) != 1: print("""Usage: -$ cat certificateRequest.pem | %s""" % sys.argv[0] +$ cat certificateRequest.pem | %s""" % sys.argv[0]) sys.exit(-1) certType = rfc2314.CertificationRequest() diff --git a/tools/pkcs1dump.py b/tools/pkcs1dump.py index 030adef..85feefe 100644 --- a/tools/pkcs1dump.py +++ b/tools/pkcs1dump.py @@ -1,6 +1,9 @@ +#!/usr/bin/python +# # Read unencrypted PKCS#1/PKIX-compliant, PEM&DER encoded private keys on # stdin, print them pretty and encode back into original wire format. # Private keys can be generated with "openssl genrsa|gendsa" commands. +# from pyasn1_modules import rfc2459, rfc2437, pem from pyasn1.codec.der import encoder, decoder import sys diff --git a/tools/pkcs7dump.py b/tools/pkcs7dump.py index d2f1111..27b6abe 100644 --- a/tools/pkcs7dump.py +++ b/tools/pkcs7dump.py @@ -1,5 +1,8 @@ +#!/usr/bin/python +# # Read ASN.1/PEM PKCS#7 on stdin, parse it into plain text, # then build substrate from it +# from pyasn1_modules import rfc2315, pem from pyasn1.codec.der import encoder, decoder import sys diff --git a/tools/pkcs8dump.py b/tools/pkcs8dump.py index 033612a..a76a01c 100644 --- a/tools/pkcs8dump.py +++ b/tools/pkcs8dump.py @@ -1,5 +1,8 @@ +#!/usr/bin/python +# # Read bunch of ASN.1/PEM plain/encrypted private keys in PKCS#8 # format on stdin, parse each into plain text, then build substrate from it +# from pyasn1.codec.der import decoder, encoder from pyasn1_modules import rfc5208, pem import sys diff --git a/tools/snmpget.py b/tools/snmpget.py index a3895e3..3725103 100644 --- a/tools/snmpget.py +++ b/tools/snmpget.py @@ -1,4 +1,7 @@ +#!/usr/bin/python +# # Generate SNMPGET request, parse response +# from pyasn1.codec.ber import encoder, decoder from pyasn1_modules import rfc1157 import sys, socket diff --git a/tools/x509dump.py b/tools/x509dump.py index 062171c..ba4f761 100644 --- a/tools/x509dump.py +++ b/tools/x509dump.py @@ -1,5 +1,8 @@ +#!/usr/bin/python +# # Read ASN.1/PEM X.509 certificates on stdin, parse each into plain text, # then build substrate from it +# from pyasn1.codec.der import decoder, encoder from pyasn1_modules import rfc2459, pem import sys -- cgit v1.2.3