cryptography.hazmat.backends.openssl
This module has no docstring.
name = <abc.abstractproperty object at 0x7f0227207a00> A string naming this padding (e.g. "PSS", "PKCS1").
finalize(self) Returns the signature as bytes.
update(self, data) Processes the provided bytes and returns nothing.
update(self, data) Processes the provided bytes and returns nothing.
verify(self) Raises an exception if the bytes provided to update do not match the signature or the signature does not match the public key.
with_traceback(...) Exception.with_traceback(tb) -- set self.__traceback__ to tb and return self.
args = <attribute 'args' of 'BaseException' objects>
MAX_LENGTH = <object object at 0x7f0226f9c1c0>
name = 'EME-OAEP'
name = 'EMSA-PKCS1-v1_5'
MAX_LENGTH = <object object at 0x7f0226f9c1b0>
name = 'EMSA-PSS'
decrypt(self, ciphertext: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding) -> bytes Decrypts the provided ciphertext.
private_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding, format: cryptography.hazmat.primitives._serialization.PrivateFormat, encryption_algorithm: cryptography.hazmat.primitives._serialization.KeySerializationEncryption) -> bytes Returns the key serialized as bytes.
private_numbers(self) -> 'RSAPrivateNumbers' Returns an RSAPrivateNumbers.
public_key(self) -> 'RSAPublicKey' The RSAPublicKey associated with this private key.
sign(self, data: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: Union[cryptography.hazmat.primitives.asymmetric.utils.Prehashed, cryptography.hazmat.primitives.hashes.HashAlgorithm]) -> bytes Signs the data.
signer(self, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> cryptography.hazmat.primitives.asymmetric.AsymmetricSignatureContext Returns an AsymmetricSignatureContext used for signing data.
key_size = <abc.abstractproperty object at 0x7f0227207a60> The bit length of the public modulus.
private_key(self, backend=None) -> cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey
d = <property object at 0x7f022720c680>
dmp1 = <property object at 0x7f022720c6d0>
dmq1 = <property object at 0x7f022720c720>
iqmp = <property object at 0x7f022720c770>
p = <property object at 0x7f022720c3b0>
public_numbers = <property object at 0x7f022720c7c0>
q = <property object at 0x7f022720c4f0>
encrypt(self, plaintext: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding) -> bytes Encrypts the given plaintext.
public_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding, format: cryptography.hazmat.primitives._serialization.PublicFormat) -> bytes Returns the key serialized as bytes.
public_numbers(self) -> 'RSAPublicNumbers' Returns an RSAPublicNumbers
recover_data_from_signature(self, signature: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: Optional[cryptography.hazmat.primitives.hashes.HashAlgorithm]) -> bytes Recovers the original data from the signature.
verifier(self, signature: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> cryptography.hazmat.primitives.asymmetric.AsymmetricVerificationContext Returns an AsymmetricVerificationContext used for verifying signatures.
verify(self, signature: bytes, data: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: Union[cryptography.hazmat.primitives.asymmetric.utils.Prehashed, cryptography.hazmat.primitives.hashes.HashAlgorithm]) -> None Verifies the signature of the data.
key_size = <abc.abstractproperty object at 0x7f0227207ac0> The bit length of the public modulus.
public_key(self, backend=None) -> cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey
e = <property object at 0x7f022720c860>
n = <property object at 0x7f022720c8b0>
with_traceback(...) Exception.with_traceback(tb) -- set self.__traceback__ to tb and return self.
args = <attribute 'args' of 'BaseException' objects>
calculate_max_pss_salt_length(key: Union[ForwardRef('rsa.RSAPrivateKey'), ForwardRef('rsa.RSAPublicKey')], hash_algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> int
utils = <cryptography.utils._ModuleWithDeprecations object at 0x7f0227231bb0>