AppendPemData (Stringlist subroutine): Difference between revisions
Jump to navigation
Jump to search
m (→Usage notes: add link) |
m (minor cleanup) |
||
Line 1: | Line 1: | ||
{{Template:Stringlist:AppendPemData subtitle}} | {{Template:Stringlist:AppendPemData subtitle}} | ||
The PEM (Privacy Enhanced Mail) protocol uses base64 encoding for binary data that needs to be transferred and stored as text. <var>AppendPemData</var> lets you store such data in a <var>[[Stringlist class|Stringlist]]</var>. | |||
The PEM (Privacy Enhanced Mail) protocol uses base64 encoding for binary data that needs to be transferred and stored as text. | |||
==Syntax== | ==Syntax== |
Revision as of 22:57, 17 March 2016
Append PEM encoded string to a Stringlist (Stringlist class)
[Introduced in Model 204 7.5]
The PEM (Privacy Enhanced Mail) protocol uses base64 encoding for binary data that needs to be transferred and stored as text. AppendPemData lets you store such data in a Stringlist.
Syntax
sl:AppendPemData( [Data=] string, [label=] string)
Syntax terms
sl | A Stringlist object that contains labeled, base64 encoded data. |
---|---|
Data | The base64 encoded Longstring or String you are appending to the data stored in sl. |
label | The string that identifies the base64 encoded data you are appending. The data will be contained within sl items that are the text markers -----BEGIN label----- and -----END label----- .
This is a required, case-sensitive, value. |
Usage notes
- The appended data is retrievable with the PemToString method.
Examples
See also
Stringlist methods:
- AppendCertificateInfo
- AppendCertificateRequest
- AppendCertificateRequestInfo
- AppendClientCertificateRequest
- AppendEncryptedSecurityData
- AppendGeneratedPrivateKey
- AppendPemData
- AppendPrivateKeyInfo
- AppendSignedCertificate
- AppendSignedClientCertificate
- CheckCertificate
- CheckCertificateRequest
- PemToString
String methods:
- CertificateRequest
- SignedCertificate
- DerToXmlDoc
- RSAPrivateKeyToXmlDoc
- X509CertificateToXmlDoc
- X509CrlToXmlDoc
- Multiple cryptographic cipher methods
System methods:
Socket methods:
Background information: