ext/rubysl/openssl/ossl_pkey_dh.c in rubysl-openssl-2.1.0 vs ext/rubysl/openssl/ossl_pkey_dh.c in rubysl-openssl-2.2.0

- old
+ new

@@ -276,11 +276,13 @@ return (DH_PRIVATE(pkey->pkey.dh)) ? Qtrue : Qfalse; } /* * call-seq: + * dh.export -> aString * dh.to_pem -> aString + * dh.to_s -> aString * * Encodes this DH to its PEM encoding. Note that any existing per-session * public/private keys will *not* get encoded, just the Diffie-Hellman * parameters will be encoded. */ @@ -426,11 +428,11 @@ return obj; } /* * call-seq: - * dh.check_params -> true | false + * dh.params_ok? -> true | false * * Validates the Diffie-Hellman parameters associated with this instance. * It checks whether a safe prime and a suitable generator are used. If this * is not the case, +false+ is returned. */ @@ -617,11 +619,11 @@ * * DH#priv_key * The per-session private key, an OpenSSL::BN. * * === Example of a key exchange * dh1 = OpenSSL::PKey::DH.new(2048) - * params = dh1.public_key.to_der #you may send this publicly to the participating party + * der = dh1.public_key.to_der #you may send this publicly to the participating party * dh2 = OpenSSL::PKey::DH.new(der) * dh2.generate_key! #generate the per-session key pair * symm_key1 = dh1.compute_key(dh2.pub_key) * symm_key2 = dh2.compute_key(dh1.pub_key) * @@ -660,6 +662,5 @@ void Init_ossl_dh() { } #endif /* NO_DH */ -