Say you have a PKCS#7 file with an embedded code-image as a field, how would you go about extracting that field's contents? pyOpenSSL doesn't seem to have mechanisms for extracting/viewing arbitrary fields from PKCS7. pyasn1 can load the structures, but of course it doesn't have access to the meaning of the fields, and it doesn't seem to see the final blob field as an ASN1 field at all... I can just stop parsing at that point and consider the result "the file", but that's... ahem... a little sub-optimal.
The real question being: what do you use when they want to work with the arbitrary fields of a PKCS7 file? I'll eventually need to *generate* such files (with lots of specified fields) as well as "consume" them, so I'm looking more for robust real-world solutions than hacks.
Pingbacks are closed.