Prints all parameters of key to buffer INSECURE: PRIVATE INFORMATIONS CAN LEAK OUT!!! Don’t use :-)) (I’s up to you)
Encodes this DH
to its DER encoding. Note that any existing per-session public/private keys will not get encoded, just the Diffie-Hellman parameters will be encoded.
Encodes this DH
to its PEM encoding. Note that any existing per-session public/private keys will not get encoded, just the Diffie-Hellman parameters will be encoded.
Converts the name to DER encoding
Encodes this ASN1Data
into a DER-encoded String value. The result is DER-encoded except for the possibility of infinite length encodings. Infinite length encodings are not allowed in strict DER, so strictly speaking the result of such an encoding would be a BER-encoding.
See ASN1Data#to_der
for details. *
See ASN1Data#to_der
for details.
Returns the DER encoding of this SPKI
.
Returns the PEM encoding of this SPKI
.
Returns a textual representation of this SPKI
, useful for debugging purposes.
Returns this request as a DER-encoded string
Returns this response as a DER-encoded string.
Prints all parameters of key to buffer INSECURE: PRIVATE INFORMATIONS CAN LEAK OUT!!! Don’t use :-)) (I’s up to you)
Encodes this DSA
to its DER encoding.
Encodes this DSA
to its PEM encoding.
cipher
is an OpenSSL::Cipher
.
password
is a string containing your password.
DSA.to_pem -> aString DSA.to_pem(cipher, 'mypassword') -> aString
See the OpenSSL
documentation for i2d_ECPrivateKey_bio()
See the OpenSSL
documentation for EC_KEY_print()
Outputs the EC
key in PEM encoding. If cipher
and pass_phrase
are given they will be used to encrypt the key. cipher
must be an OpenSSL::Cipher::Cipher
instance. Note that encryption will only be effective for a private key, public keys will always be encoded in plain text.
THIS METHOD IS INSECURE, PRIVATE INFORMATION CAN LEAK OUT!!!
Dumps all parameters of a keypair to a String
Don’t use :-)) (It’s up to you)
Outputs this keypair in DER encoding.