Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sync with fork #1

Merged
merged 12 commits into from
Nov 22, 2014
Merged

Sync with fork #1

merged 12 commits into from
Nov 22, 2014

Conversation

zzak
Copy link
Member

@zzak zzak commented Nov 22, 2014

Here's some work to update with travis ci, and sync a patch from trunk

@hsbt
Copy link
Member

hsbt commented Nov 22, 2014

👍

hsbt added a commit that referenced this pull request Nov 22, 2014
@hsbt hsbt merged commit 4e53ed8 into ruby:master Nov 22, 2014
rhenium added a commit to rhenium/ruby-openssl that referenced this pull request Jul 8, 2016
Currently they return XXXPrivateKey format (PKCS ruby#1 RSAPrivateKey for
RSA, OpenSSL's original format for DSA, anad SEC 1 ECPrivateKey for EC)
when the instance contains the private portion, or PUBKEY format
(SubjectPublicKeyInfo) otherwise. There is no option to force the
format, so users need to duplicate the key first and remove the private
key.

This resolves it by adding :format keyword argument to
PKey::PKey#to_{der,pem}. Users can pass either :PrivateKey or :PUBKEY.
rhenium added a commit to rhenium/ruby-openssl that referenced this pull request Jul 9, 2016
Currently they return XXXPrivateKey format (PKCS ruby#1 RSAPrivateKey for
RSA, OpenSSL's original format for DSA, anad SEC 1 ECPrivateKey for EC)
when the instance contains the private portion, or PUBKEY format
(SubjectPublicKeyInfo) otherwise. There is no option to force the
format, so users need to duplicate the key first and remove the private
key.

This resolves it by adding :format keyword argument to
PKey::PKey#to_{der,pem}. Users can pass either :PrivateKey or :PUBKEY.
rhenium added a commit to rhenium/ruby-openssl that referenced this pull request Jul 10, 2016
Currently they return XXXPrivateKey format (PKCS ruby#1 RSAPrivateKey for
RSA, OpenSSL format for DSA, anad SEC 1 ECPrivateKey for EC) when the
instance contains the private key, or SubjectPublicKeyInfo) otherwise.
There is no option to force the format, so users need to duplicate the
key first and remove the private key if they want SubjectPublicKeyInfo
DER from a key.

This resolves it by adding :format keyword argument to
PKey::PKey#to_{der,pem}. Users can pass either :*PrivateKey or
:SubjectPublicKeyInfo.
rhenium pushed a commit to rhenium/ruby-openssl that referenced this pull request Aug 17, 2016
bdewater added a commit to bdewater/openssl that referenced this pull request Oct 8, 2022
bdewater added a commit to bdewater/openssl that referenced this pull request Oct 8, 2022
rhenium added a commit that referenced this pull request Oct 17, 2022
Call out insecure PKCS #1 v1.5 default padding for RSA
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

2 participants