💾 Archived View for tris.fyi › pydoc › cryptography.hazmat.primitives.serialization.pkcs12 captured on 2022-07-16 at 15:06:00. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
cryptography.hazmat.primitives.serialization
cryptography.hazmat.primitives
This module has no docstring.
certificate = <property object at 0x7f92be2fce00>
friendly_name = <property object at 0x7f92be2fcdb0>
additional_certs = <property object at 0x7f92be307090>
cert = <property object at 0x7f92be307040>
key = <property object at 0x7f92be2fcf90>
load_key_and_certificates(data: bytes, password: Optional[bytes], backend: Any = None) -> Tuple[Union[cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey, NoneType], Optional[cryptography.x509.base.Certificate], List[cryptography.x509.base.Certificate]]
load_pkcs12(data: bytes, password: Optional[bytes], backend: Any = None) -> cryptography.hazmat.primitives.serialization.pkcs12.PKCS12KeyAndCertificates
serialize_key_and_certificates(name: Optional[bytes], key: Union[cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey, NoneType], cert: Optional[cryptography.x509.base.Certificate], cas: Optional[Iterable[cryptography.x509.base.Certificate]], encryption_algorithm: cryptography.hazmat.primitives._serialization.KeySerializationEncryption) -> bytes
PRIVATE_KEY_TYPES = typing.Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey]