cryptography (for This function generates a password hash using the PBKDF2HMAC algorithm, supports custom salts, and is used for password storage and verification. Function 2024-12-16 12:17:35 16 views
cryptography PBKDF2HMAC This code defines several encryption-related functions, including generating RSA key pairs, encrypting and decrypting messages, hashing passwords, and verifying passwords. The type of code 2024-12-16 12:17:15 13 views
cryptography RSA This code defines a function that generates an RSA keypair with a specified number of bits. It first generates the private key, then generates the public key from the private key. Finally, it serializes the private and public keys to PEM format. The type of code 2024-12-16 12:16:33 14 views
cryptography This function uses a private key to sign the data, generating a hash value for verifying the integrity and authenticity of the data. Encryption function 2024-12-16 12:16:16 14 views
cryptography This function uses the cryptography library to sign the given data. It accepts a path to a PEM encoded private key file and the data to be signed as input, and returns the signature of the data. Encryption function 2024-12-16 12:16:03 13 views
cryptography This function uses the PBKDF2HMAC algorithm to generate a hash of a password. It accepts a password and an optional salt value. If no salt is provided, it generates a random salt. Cryptography 2024-12-16 12:15:58 11 views
cryptography os This function generates a random byte string of a specified length, then uses the SHA-256 hash function to generate a hash of the byte string, and finally returns the combination of the salt and the hash value. Function 2024-12-16 12:15:55 9 views
cryptography PBKDF2HMAC This function generates a password hash using the PBKDF2HMAC algorithm, which can specify salt and iteration count. It is used for secure password storage practices. Function 2024-12-16 12:15:45 10 views
Cryptography library This function generates an RSA keypair using the cryptography library, including a private key and a public key. The private key is used for decryption and signing, while the public key is used for encryption and verification of signatures. The type of code 2024-12-16 12:14:18 16 views
cryptography hashes This function uses the cryptography library to sign a given message. It first loads the private key from a PEM file, then calculates the hash of the message, and finally signs the hash with the private key using the PKCS1v15 padding and SHA256 hash algorithm. The type of code 2024-12-16 12:13:20 6 views