Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ECDSA keys support? #15

Closed
n-rodriguez opened this issue Mar 21, 2014 · 4 comments
Closed

ECDSA keys support? #15

n-rodriguez opened this issue Mar 21, 2014 · 4 comments

Comments

@n-rodriguez
Copy link

Hi!

Does it support ECDSA key format? At least for public key validation?

@bensie
Copy link
Owner

bensie commented Mar 21, 2014

Not yet, but I will look into adding it! Pull requests are also welcome if
you get to it first.

On Friday, March 21, 2014, Nicolas notifications@github.com wrote:

Hi!

Does it support ECDSA key format? At least for public key validation?

Reply to this email directly or view it on GitHubhttps://github.com//issues/15
.

@n-rodriguez
Copy link
Author

Thanks for your quick answer :)
But I think I've found what I was looking for : load_data_public_key

@bensie
Copy link
Owner

bensie commented Mar 26, 2014

OpenSSL doesn't provide a way to generate ECDSA keys from what I can tell, making this non-trivial to implement and fully support using pure Ruby.

I'll keep an eye out for other ways of generating, but for now this is off the table.

Glad you were able to find a workaround!

@mcclymont
Copy link
Contributor

I think it is possible to generate an elliptic curve key with the OpenSSL binding, but it's not well documented at all. There is an instance method 'generate_key' but I'm not sure exactly how to use it.

Interestingly, Ruby 2.4.0 has a new method on OpenSSL::PKey::EC 'generate' which may make things easier:
http://ruby-doc.org/stdlib-2.4.0/libdoc/openssl/rdoc/OpenSSL/PKey/EC.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants