key-parsers
Key-parsers offers parsers and printers for various asymmetric key formats.
Key_parsers
It currently comes with three submodules.
Asn1
Note that all the parsers in this module expect the raw DER encoded byte string. They
don't handle PEM armoring (----BEGIN X----
and ----END X----
) nor decode Base64 or
hex.
Here you can find parsers for the following formats:
PKCS#1 encoding of RSA Private and Public keys as defined in
PKCS#1 v2.2PKCS#8 encoding of RSA, DSA, EC and DH Private keys as defined in
RFC 5208X.509 SubjectPublicKeyInfo encoding of RSA, DSA, EC and DH Public keys as defined in
RFC 5280DER encodings of DSA, EC and DH Parameters and Private keys as produced by OpenSSL
commands such asdsaparam
andgendsa
Ltpa
Parsers for LTPA (Lightweight Third Party Authentication) encodings of RSA private and
public keys.
Cvc
Parsers for CVC (Card Verifiable Certificates) encodings of RSA and EC Public keys.
Make a new version
Check that the changelog is up to date.
Create an annotated tag with the new version:
git tag --message 'Version 1.2.3' 1.2.3
Then, use dune-release
:
dune-release distrib
dune-release check
dune-release publish
dune-release opam pkg
dune-release opam submit
The command dune-release bistro
can do all of that in one invocation but can be more
confusing if you're not used to dune-release
.
sha256=10dfc48550d434a5de3980a325a0f67dd1ec300626a3eae4c4254b62e5f0e260
sha512=988b14b5c94dc8d1f504b7dc7c59bfdf020b7d8880fddd7d54400558b256c1050e2be099ae0bba811d2d5fe7033984b4834b8955c16e8987260c9313b4d1644c
>= "1.4.1"
>= "1.2"
>= "4.2"
with-test & >= "2.0.0"
>= "4.04.1"
>= "1.0.0"
>= "1.11.0"
>= "1.6.0" & < "6.1.0"
>= "0.2.0"
< "0.9.0"