cryptography.hazmat.backends.openssl
This module has no docstring.
name = <abc.abstractproperty object at 0x7ff35ff919a0> A string naming this padding (e.g. "PSS", "PKCS1").
finalize(self) Returns the signature as bytes.
update(self, data) Processes the provided bytes and returns nothing.
update(self, data) Processes the provided bytes and returns nothing.
verify(self) Raises an exception if the bytes provided to update do not match the signature or the signature does not match the public key.
with_traceback(...) Exception.with_traceback(tb) -- set self.__traceback__ to tb and return self.
args = <attribute 'args' of 'BaseException' objects>
MAX_LENGTH = <object object at 0x7ff35fd261c0>
name = 'EME-OAEP'
name = 'EMSA-PKCS1-v1_5'
MAX_LENGTH = <object object at 0x7ff35fd261b0>
name = 'EMSA-PSS'
decrypt(self, ciphertext: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding) -> bytes Decrypts the provided ciphertext.
private_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding, format: cryptography.hazmat.primitives._serialization.PrivateFormat, encryption_algorithm: cryptography.hazmat.primitives._serialization.KeySerializationEncryption) -> bytes Returns the key serialized as bytes.
private_numbers(self) -> 'RSAPrivateNumbers' Returns an RSAPrivateNumbers.
public_key(self) -> 'RSAPublicKey' The RSAPublicKey associated with this private key.
sign(self, data: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: Union[cryptography.hazmat.primitives.asymmetric.utils.Prehashed, cryptography.hazmat.primitives.hashes.HashAlgorithm]) -> bytes Signs the data.
signer(self, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> cryptography.hazmat.primitives.asymmetric.AsymmetricSignatureContext Returns an AsymmetricSignatureContext used for signing data.
key_size = <abc.abstractproperty object at 0x7ff35ff91a00> The bit length of the public modulus.
private_key(self, backend=None) -> cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey
d = <property object at 0x7ff35ff96680>
dmp1 = <property object at 0x7ff35ff966d0>
dmq1 = <property object at 0x7ff35ff96720>
iqmp = <property object at 0x7ff35ff96770>
p = <property object at 0x7ff35ff963b0>
public_numbers = <property object at 0x7ff35ff967c0>
q = <property object at 0x7ff35ff964f0>
encrypt(self, plaintext: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding) -> bytes Encrypts the given plaintext.
public_bytes(self, encoding: cryptography.hazmat.primitives._serialization.Encoding, format: cryptography.hazmat.primitives._serialization.PublicFormat) -> bytes Returns the key serialized as bytes.
public_numbers(self) -> 'RSAPublicNumbers' Returns an RSAPublicNumbers
recover_data_from_signature(self, signature: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: Optional[cryptography.hazmat.primitives.hashes.HashAlgorithm]) -> bytes Recovers the original data from the signature.
verifier(self, signature: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> cryptography.hazmat.primitives.asymmetric.AsymmetricVerificationContext Returns an AsymmetricVerificationContext used for verifying signatures.
verify(self, signature: bytes, data: bytes, padding: cryptography.hazmat.primitives._asymmetric.AsymmetricPadding, algorithm: Union[cryptography.hazmat.primitives.asymmetric.utils.Prehashed, cryptography.hazmat.primitives.hashes.HashAlgorithm]) -> None Verifies the signature of the data.
key_size = <abc.abstractproperty object at 0x7ff35ff91a60> The bit length of the public modulus.
public_key(self, backend=None) -> cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey
e = <property object at 0x7ff35ff96860>
n = <property object at 0x7ff35ff968b0>
with_traceback(...) Exception.with_traceback(tb) -- set self.__traceback__ to tb and return self.
args = <attribute 'args' of 'BaseException' objects>
calculate_max_pss_salt_length(key: Union[ForwardRef('rsa.RSAPrivateKey'), ForwardRef('rsa.RSAPublicKey')], hash_algorithm: cryptography.hazmat.primitives.hashes.HashAlgorithm) -> int
utils = <cryptography.utils._ModuleWithDeprecations object at 0x7ff35ffbbb20>