|
| constructor (string pem) |
| Creates the SSLCertificate object from the PEM-encoded version of the X.509 certificate.
|
|
| constructor (binary der) |
| Creates the SSLCertificate object from the DER-encoded version of the X.509 certificate.
|
|
| copy () |
| Returns a copy of the certificate object.
|
|
binary | getDER () |
| Returns a binary object in DER format representing the certificate.
|
|
hash< auto > | getInfo () |
| Returns a hash of all information for the certificate.
|
|
hash< auto > | getIssuerHash () |
| Returns a hash of strings representing the issuer information of the certificate.
|
|
date | getNotAfterDate () |
| Returns a date/time value representing the end date of the certificate.
|
|
date | getNotBeforeDate () |
| Returns a date/time value representing the start date of the certificate.
|
|
string | getPEM () |
| Returns a string in PEM format representing the certificate.
|
|
*binary | getPublicKey () |
| Returns a binary object representing the public key of the certificate in DER (Distinguished Encoding Rules) format or NOTHING if no public key is present in the certificate.
|
|
string | getPublicKeyAlgorithm () |
| Returns the name of the public key algorithm of the certificate.
|
|
hash< auto > | getPurposeHash () |
| Returns a hash of booleans representing the allowed purposes of the certificate.
|
|
int | getSerialNumber () |
| Returns the integer serial number of the certificate.
|
|
binary | getSignature () |
| Returns a binary object representing the signature of the certificate.
|
|
string | getSignatureType () |
| Returns the signature type of the certificate.
|
|
hash< auto > | getSubjectHash () |
| Returns a hash of strings representing the subject information of the certificate.
|
|
int | getVersion () |
| Returns the version of the certificate as an integer.
|
|
| constructor () |
| The constructor does not perform any action; this class is just used to mark a class as serializable by inheriting this class.
|
|
| copy () |
| The copy constructor does not perform any action; this class is just used to mark a class as serializable by inheriting this class.
|
|
| serialize (OutputStream stream, *int flags) |
| converts the object to binary data representing the object
|
|
binary | serialize (*int flags) |
| converts the object to binary data representing the object
|
|
hash< SerializationInfo > | serializeToData (*int flags) |
| converts the object to a serialization hash representing the object
|
|
|
static auto | deserialize (InputStream stream, *int flags) |
| Deserializes data produced with serialize() and returns the value represented by the data.
|
|
static auto | deserialize (binary bin, *int flags) |
| Deserializes data produced with serialize() and returns the value represented by the data.
|
|
static auto | deserialize (string bin, *int flags) |
| Deserializes data produced with serialize() and returns the value represented by the data.
|
|
static auto | deserialize (hash< SerializationInfo > data, *int flags) |
| Deserializes data produced with serializeToData() and returns the value represented by the data.
|
|
static hash< SerializationInfo > | deserializeToData (InputStream stream, *int flags) |
| Deserializes data produced with serialize() and returns the value represented by the data.
|
|
static hash< SerializationInfo > | deserializeToData (binary bin, *int flags) |
| Deserializes data produced with serialize() and returns the value represented by the data.
|
|
static | serialize (auto val, OutputStream stream, *int flags) |
| serializes the data and writes the serialized data to the given output stream
|
|
static binary | serialize (auto val, *int flags) |
| serializes the data and returns the serialized data as a binary object
|
|
static hash< SerializationInfo > | serializeToData (auto val, *int flags) |
| converts the value to a serialization hash representing the value
|
|
SSLCertificate objects allow Qore code to work with X.509 certificate data.
The SSLCertificate class supports data serialization; note that the serialized data is a representation of the data that does not require a password, so for source data that requires a password to use, the serialized representation of the private key should be protected carefully (transmitted only in an encrypted stream)