aboutsummaryrefslogtreecommitdiff
path: root/scripts/resource-cert-samples/RIR/index.old
blob: e5d3f927e0721aaedef6880e7937dd6c6aca6a51 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
V	080731054523Z		01	unknown	/CN=TEST ENTITY RIR
V	080731054524Z		02	unknown	/CN=TEST ENTITY LIR2
V	080731054525Z		03	unknown	/CN=TEST ENTITY LIR1
V	080731140529Z		04	unknown	/CN=TEST ENTITY RIR
V	080731140529Z		05	unknown	/CN=TEST ENTITY LIR2
V	080731140529Z		06	unknown	/CN=TEST ENTITY LIR1
V	080731140829Z		07	unknown	/CN=TEST ENTITY RIR
V	080731140829Z		08	unknown	/CN=TEST ENTITY LIR2
V	080731140829Z		09	unknown	/CN=TEST ENTITY LIR1
V	080731140934Z		0A	unknown	/CN=TEST ENTITY RIR
V	080731140934Z		0B	unknown	/CN=TEST ENTITY LIR2
V	080731140934Z		0C	unknown	/CN=TEST ENTITY LIR1
V	080731144816Z		0D	unknown	/CN=TEST ENTITY RIR
V	080731144818Z		0E	unknown	/CN=TEST ENTITY LIR3
V	080731144818Z		0F	unknown	/CN=TEST ENTITY LIR2
V	080731144818Z		10	unknown	/CN=TEST ENTITY LIR1
V	080808233059Z		11	unknown	/CN=TEST ENTITY RIR
V	080808233548Z		12	unknown	/CN=TEST ENTITY RIR
V	080809005817Z		13	unknown	/CN=TEST ENTITY RIR
V	080809005817Z		14	unknown	/CN=TEST ENTITY LIR3
V	080809005817Z		15	unknown	/CN=TEST ENTITY LIR2
V	080809005817Z		16	unknown	/CN=TEST ENTITY LIR1
V	080809010231Z		17	unknown	/CN=TEST ENTITY RIR
V	080809010231Z		18	unknown	/CN=TEST ENTITY LIR3
V	080809010231Z		19	unknown	/CN=TEST ENTITY LIR2
V	080809010231Z		1A	unknown	/CN=TEST ENTITY LIR1
V	080809010708Z		1B	unknown	/CN=TEST ENTITY RIR
V	080809010708Z		1C	unknown	/CN=TEST ENTITY LIR3
V	080809010708Z		1D	unknown	/CN=TEST ENTITY LIR2
V	080809010708Z		1E	unknown	/CN=TEST ENTITY LIR1
V	080809011339Z		1F	unknown	/CN=TEST ENTITY RIR
V	080809011339Z		20	unknown	/CN=TEST ENTITY LIR3
V	080809011339Z		21	unknown	/CN=TEST ENTITY LIR2
V	080809011339Z		22	unknown	/CN=TEST ENTITY LIR1
V	080809011509Z		23	unknown	/CN=TEST ENTITY RIR
V	080809011510Z		24	unknown	/CN=TEST ENTITY LIR3
V	080809011510Z		25	unknown	/CN=TEST ENTITY LIR2
V	080809011510Z		26	unknown	/CN=TEST ENTITY LIR1
V	081018190607Z		27	unknown	/CN=TEST ENTITY RIR
V	081018190607Z		28	unknown	/CN=TEST ENTITY LIR3
V	081018190607Z		29	unknown	/CN=TEST ENTITY LIR2
V	081018190607Z		2A	unknown	/CN=TEST ENTITY LIR1
V	081028160351Z		2B	unknown	/CN=TEST ENTITY RIR
V	081028160351Z		2C	unknown	/CN=TEST ENTITY LIR3
V	081028160351Z		2D	unknown	/CN=TEST ENTITY LIR2
V	081028160351Z		2E	unknown	/CN=TEST ENTITY LIR1
V	081028163233Z		2F	unknown	/CN=TEST ENTITY RIR
V	081028163233Z		30	unknown	/CN=TEST ENTITY LIR3
V	081028163233Z		31	unknown	/CN=TEST ENTITY LIR2
an class="nn">POW.pkix, glob, os import rpki.x509, rpki.resource_set, rpki.oids parse_test = False generate_test = True parse_extensions = True show_attributes = False show_algorithm = False do_verify = True show_signature = False show_publickey = False def hexify(thing): return ":".join(["%02X" % ord(i) for i in thing]) if parse_test: for name in glob.glob("resource-cert-samples/*.req") + glob.glob("biz-certs/*.req"): pkcs10 = rpki.x509.PKCS10(Auto_file = name).get_POWpkix() print "[", name, "]" if show_algorithm: print pkcs10.signatureAlgorithm print print pkcs10.signatureAlgorithm.get() print if show_signature: print pkcs10.signatureValue, hexify(pkcs10.signatureValue.get()) print if show_publickey: print pkcs10.certificationRequestInfo.subjectPublicKeyInfo print pkcs10.certificationRequestInfo.subjectPublicKeyInfo.get() print hexify(pkcs10.certificationRequestInfo.subjectPublicKeyInfo.toString()) print if show_attributes: print pkcs10.certificationRequestInfo.attributes.oid, pkcs10.certificationRequestInfo.attributes.oid.get() print print pkcs10.certificationRequestInfo.attributes.val, pkcs10.certificationRequestInfo.attributes.val.get() print print pkcs10.certificationRequestInfo.attributes.val.choice, pkcs10.certificationRequestInfo.attributes.val.choices print print pkcs10.certificationRequestInfo.attributes.val.choices[pkcs10.certificationRequestInfo.attributes.val.choice] print print len(pkcs10.certificationRequestInfo.attributes.val.choices[pkcs10.certificationRequestInfo.attributes.val.choice]) print if len(pkcs10.certificationRequestInfo.attributes.val.choices[pkcs10.certificationRequestInfo.attributes.val.choice]) > 0: print pkcs10.certificationRequestInfo.attributes.val.choices[pkcs10.certificationRequestInfo.attributes.val.choice][0] print if parse_extensions: exts = pkcs10.getExtensions() bag = rpki.resource_set.parse_extensions(exts) if bag.as: print "ASN =", bag.as if bag.v4: print "IPv4 =", bag.v4 if bag.v6: print "IPv6 =", bag.v6 for oid, crit, val in exts: if oid in (rpki.oids.name2oid["sbgp-ipAddrBlock"], rpki.oids.name2oid["sbgp-autonomousSysNum"]): continue if isinstance(val, str): val = hexify(val) print POW.pkix.oid2obj(oid), oid, "=", val if do_verify: print print "Signature verification: %s" % pkcs10.verify() print if generate_test: keypair = rpki.x509.RSA() keypair.generate() pkcs10 = rpki.x509.PKCS10.create(keypair) f = os.popen("openssl req -text -config /dev/null", "w") f.write(pkcs10.get_PEM()) f.close()