ext/rubysl/openssl/ossl_pkey_dh.c in rubysl-openssl-2.1.0 vs ext/rubysl/openssl/ossl_pkey_dh.c in rubysl-openssl-2.2.0
- old
+ new
@@ -276,11 +276,13 @@
return (DH_PRIVATE(pkey->pkey.dh)) ? Qtrue : Qfalse;
}
/*
* call-seq:
+ * dh.export -> aString
* dh.to_pem -> aString
+ * dh.to_s -> aString
*
* Encodes this DH to its PEM encoding. Note that any existing per-session
* public/private keys will *not* get encoded, just the Diffie-Hellman
* parameters will be encoded.
*/
@@ -426,11 +428,11 @@
return obj;
}
/*
* call-seq:
- * dh.check_params -> true | false
+ * dh.params_ok? -> true | false
*
* Validates the Diffie-Hellman parameters associated with this instance.
* It checks whether a safe prime and a suitable generator are used. If this
* is not the case, +false+ is returned.
*/
@@ -617,11 +619,11 @@
* * DH#priv_key
* The per-session private key, an OpenSSL::BN.
*
* === Example of a key exchange
* dh1 = OpenSSL::PKey::DH.new(2048)
- * params = dh1.public_key.to_der #you may send this publicly to the participating party
+ * der = dh1.public_key.to_der #you may send this publicly to the participating party
* dh2 = OpenSSL::PKey::DH.new(der)
* dh2.generate_key! #generate the per-session key pair
* symm_key1 = dh1.compute_key(dh2.pub_key)
* symm_key2 = dh2.compute_key(dh1.pub_key)
*
@@ -660,6 +662,5 @@
void
Init_ossl_dh()
{
}
#endif /* NO_DH */
-