PRT decryption and rename tool. This tool will take collected PRTs, decrypt them (if needed), get user's login and rename original PRT.
After pulling the repo you need to put the 'prt_processor.py' to the directory with collected PRTs and private key. The key itself should be named 'private_key.pem'. Within the same directory sub-directories 'processed' and 'decrypted' should be created.
After script run PRTs could be found in 'processed' directory.
root_folder
├── prt_processor.py
├── PRT_1.zip.enc #
├── PRT_1.zip.esk #
├── ... # Encrypted Jabber Problem Reports and keys
├── PRT_N.zip.enc #
├── PRT_N.zip.esk #
├── private_key.pem # Private key
├── processed
│ ├── Renamed_PRT_1 #
│ ├── ... # Resulted Problem Reports
│ └── Renamed_PRT_N #
└── decrypted # TMP directory, where some some PRTs can appear