aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2014-12-24 22:02:00 -0800
committerAlex Gaynor <alex.gaynor@gmail.com>2014-12-24 22:02:00 -0800
commitf05763c7308574b246d4c5b559ea0fe71c873599 (patch)
treec2569d2316c60ee72da6e19503c11e707e39cfef /docs
parentbf4817e9d95d66f5adba8ab5b7224e865e312a45 (diff)
parentc8b63d189197ec5023f2a41dd1c6f7fab6932177 (diff)
downloadcryptography-f05763c7308574b246d4c5b559ea0fe71c873599.tar.gz
cryptography-f05763c7308574b246d4c5b559ea0fe71c873599.tar.bz2
cryptography-f05763c7308574b246d4c5b559ea0fe71c873599.zip
Merge branch 'master' into openssh-elliptic-curve
Diffstat (limited to 'docs')
-rw-r--r--docs/hazmat/primitives/asymmetric/serialization.rst82
1 files changed, 0 insertions, 82 deletions
diff --git a/docs/hazmat/primitives/asymmetric/serialization.rst b/docs/hazmat/primitives/asymmetric/serialization.rst
index 9ca493ab..1456b0dc 100644
--- a/docs/hazmat/primitives/asymmetric/serialization.rst
+++ b/docs/hazmat/primitives/asymmetric/serialization.rst
@@ -114,88 +114,6 @@ all begin with ``-----BEGIN {format}-----`` and end with ``-----END
is not supported by the backend.
-PKCS #8 Format
-~~~~~~~~~~~~~~
-
-PKCS #8 is a serialization format originally standardized by RSA and currently
-maintained by the IETF in :rfc:`5208` and :rfc:`5958`. It supports password
-based encryption and additional key metadata attributes. These keys are
-recognizable because they all begin with ``-----BEGIN PRIVATE KEY-----`` or
-with ``-----BEGIN ENCRYPTED PRIVATE KEY-----`` if they have a password.
-
-
-.. function:: load_pem_pkcs8_private_key(data, password, backend)
-
- .. versionadded:: 0.5
-
- Deserialize a private key from PEM encoded data to one of the supported
- asymmetric private key types.
-
- This has been deprecated in favor of :func:`load_pem_private_key`.
-
- :param bytes data: The PEM encoded key data.
-
- :param bytes password: The password to use to decrypt the data. Should
- be ``None`` if the private key is not encrypted.
-
- :param backend: A
- :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
- provider.
-
- :returns: A new instance of a private key.
-
- :raises ValueError: If the PEM data could not be decrypted or if its
- structure could not be decoded successfully.
-
- :raises TypeError: If a ``password`` was given and the private key was
- not encrypted. Or if the key was encrypted but no
- password was supplied.
-
- :raises UnsupportedAlgorithm: If the serialized key is of a type that
- is not supported by the backend or if the key is encrypted with a
- symmetric cipher that is not supported by the backend.
-
-
-Traditional OpenSSL Format
-~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-The "traditional" PKCS #1 based serialization format used by OpenSSL. It
-supports password based symmetric key encryption. Commonly found in OpenSSL
-based TLS applications. It is usually found in PEM format with a header that
-mentions the type of the serialized key. e.g. ``-----BEGIN RSA PRIVATE
-KEY-----`` or ``-----BEGIN DSA PRIVATE KEY-----``.
-
-.. function:: load_pem_traditional_openssl_private_key(data, password, backend)
-
- .. versionadded:: 0.5
-
- Deserialize a private key from PEM encoded data to one of the supported
- asymmetric private key types.
-
- This has been deprecated in favor of :func:`load_pem_private_key`.
-
- :param bytes data: The PEM encoded key data.
-
- :param bytes password: The password to use to decrypt the data. Should
- be ``None`` if the private key is not encrypted.
-
- :param backend: A
- :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
- provider.
-
- :returns: A new instance of a private key.
-
- :raises ValueError: If the PEM data could not be decrypted or if its
- structure could not be decoded successfully.
-
- :raises TypeError: If a ``password`` was given and the private key was
- not encrypted. Or if the key was encrypted but no
- password was supplied.
-
- :raises UnsupportedAlgorithm: If the serialized key is of a type that
- is not supported by the backend or if the key is encrypted with a
- symmetric cipher that is not supported by the backend.
-
OpenSSH Public Key
~~~~~~~~~~~~~~~~~~