Parse X509 certificates either from a file or from a remote HTTPS target.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
brent s c43100f259 updating .TODO 3 years ago
.TODO updating .TODO 3 years ago
.gitignore initial commit 3 years ago
LICENSE.txt checking in - packaging preliminary 3 years ago gorram it 3 years ago checking in - packaging preliminary 3 years ago


NOTE: CURRENTLY THIS IS NON-FUNCTIONAL. It is being restructured for packaging in PyPI. If you need it, the standalone version remains in OpTools for now.

What is it?

Certparser is a fairly small module that will parse an X.509 certificate. These are commonly referred to as "HTTPS certificates", "SSL certificates" (even though proper modern implementations should be using TLS), etc.

Certparser can operate on either a local file (or input stream, etc.) or remote (across a small subset of protocols which will expand with time).

X.509 is a complex thing, so if I missed part of it please let me know! (RFC numbers and sections very welcome.)


It can be invoked directly as a command:


(See ./ --help for more information on usage.)

Or as a python module:

import certparser

parser = certparser.CertParse('')
print(parser.cert)      # prints the fetched certificate
print(parser.certinfo)  # prints the parsed certificate information

(See pydoc certparser for more information on usage.)


Currently, only the following non-stdlib modules are required:

As parsing work continues and features/protocols are added, the following will probably be used (but are NOT currently):

And the following will be required optionally (but recommended):