💾 Archived View for tris.fyi › pydoc › cryptography.hazmat.primitives.serialization captured on 2022-07-16 at 15:05:22. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2022-04-28)
-=-=-=-=-=-=-
cryptography.hazmat.primitives
This module has no docstring.
An enumeration.
DER = <Encoding.DER: 'DER'>
OpenSSH = <Encoding.OpenSSH: 'OpenSSH'>
PEM = <Encoding.PEM: 'PEM'>
Raw = <Encoding.Raw: 'Raw'>
SMIME = <Encoding.SMIME: 'S/MIME'>
X962 = <Encoding.X962: 'ANSI X9.62'>
An enumeration.
PKCS3 = <ParameterFormat.PKCS3: 'PKCS3'>
An enumeration.
OpenSSH = <PrivateFormat.OpenSSH: 'OpenSSH'>
PKCS8 = <PrivateFormat.PKCS8: 'PKCS8'>
Raw = <PrivateFormat.Raw: 'Raw'>
TraditionalOpenSSL = <PrivateFormat.TraditionalOpenSSL: 'TraditionalOpenSSL'>
An enumeration.
CompressedPoint = <PublicFormat.CompressedPoint: 'X9.62 Compressed Point'>
OpenSSH = <PublicFormat.OpenSSH: 'OpenSSH'>
PKCS1 = <PublicFormat.PKCS1: 'Raw PKCS#1'>
Raw = <PublicFormat.Raw: 'Raw'>
SubjectPublicKeyInfo = <PublicFormat.SubjectPublicKeyInfo: 'X.509 subjectPublicKeyInfo with PKCS#1'>
UncompressedPoint = <PublicFormat.UncompressedPoint: 'X9.62 Uncompressed Point'>
load_der_parameters(data: bytes, backend: Any = None) -> 'dh.DHParameters'
load_der_private_key(data: bytes, password: Optional[bytes], backend: Any = None) -> Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey]
load_der_public_key(data: bytes, backend: Any = None) -> Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey]
load_pem_parameters(data: bytes, backend: Any = None) -> 'dh.DHParameters'
load_pem_private_key(data: bytes, password: Optional[bytes], backend: Any = None) -> Union[cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey]
load_pem_public_key(data: bytes, backend: Any = None) -> Union[cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PublicKey]
load_ssh_private_key(data: bytes, password: Optional[bytes], backend: Any = None) -> Union[cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey] Load private key from OpenSSH custom encoding.
load_ssh_public_key(data: bytes, backend: Any = None) -> Union[cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey, cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey, cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey] Load public key from OpenSSH one-line format.