Coverage for ipalib/pkcs10 : 64%
        
        
Hot-keys on this page
r m x p toggle line displays
j k next/prev highlighted chunk
0 (zero) top of page
1 (one) first highlighted chunk
| 
 # Authors: # Rob Crittenden <rcritten@redhat.com> # # Copyright (C) 2010 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. 
 
 
 """ Given a CSR return the subjectaltname value, if any. 
 The return value is a tuple of strings or None """ for extension in request.extensions: if extension.oid_tag == nss.SEC_OID_X509_SUBJECT_ALT_NAME: return nss.x509_alt_name(extension.value) return None 
 """ Given a CSR return the subject value. 
 This returns an nss.DN object. """ 
 """ Remove the header and footer from a CSR. """ headerlen = 36 s = csr.find("-----BEGIN CERTIFICATE REQUEST-----") 
 
 """ Given a base64-encoded certificate request, with or without the header/footer, return a request object. """ 
 
 # A fail-safe so we can always read a CSR. python-nss/NSS will segfault # otherwise nss.nss_init_nodb() 
 
 nss.nss_init_nodb() 
 # Read PEM request from stdin and print out its components 
 csrlines = sys.stdin.readlines() csr = ''.join(csrlines) 
 csr = load_certificate_request(csr) 
 print csr 
 print get_subject(csr) print get_subjectaltname(csr)  |