⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.133
Server IP:
185.119.109.197
Server:
Linux managedhosting.chostar.me 5.15.0-160-generic #170-Ubuntu SMP Wed Oct 1 10:06:56 UTC 2025 x86_64
Server Software:
Apache
PHP Version:
8.1.33
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
ri
/
3.0.0
/
system
/
OpenSSL
/
PKey
/
PKey
/
View File Name :
sign_raw-i.ri
U:RDoc::AnyMethod[iI" sign_raw:ETI"!OpenSSL::PKey::PKey#sign_raw;TF:publico:RDoc::Markup::Document:@parts[o:RDoc::Markup::Paragraph; [I"OSigns +data+ using a private key +pkey+. Unlike #sign, +data+ will not be ;TI"&hashed by +digest+ automatically.;To:RDoc::Markup::BlankLine o; ; [I"4See #verify_raw for the verification operation.;T@o; ; [I"BAdded in version 3.0. See also the man page EVP_PKEY_sign(3).;T@o:RDoc::Markup::List: @type: NOTE:@items[o:RDoc::Markup::ListItem:@label[I" +digest+;T; [o; ; [ I"JA String that represents the message digest algorithm name, or +nil+ ;TI"4if the PKey type requires no digest algorithm. ;TI"QAlthough this method will not hash +data+ with it, this parameter may still ;TI"6be required depending on the signature algorithm.;To;;[I"+data+;T; [o; ; [I"%A String. The data to be signed.;To;;[I"+options+;T; [o; ; [I"MA Hash that contains algorithm specific control operations to \OpenSSL. ;TI"ASee OpenSSL's man page EVP_PKEY_CTX_ctrl_str(3) for details.;T@o; ; [I" Example:;To:RDoc::Markup::Verbatim; [I"data = "Sign me!" ;TI"3hash = OpenSSL::Digest.digest("SHA256", data) ;TI"Epkey = OpenSSL::PKey.generate_key("RSA", rsa_keygen_bits: 2048) ;TI",signopts = { rsa_padding_mode: "pss" } ;TI"9signature = pkey.sign_raw("SHA256", hash, signopts) ;TI" ;TI"N# Creates a copy of the RSA key pkey, but without the private components ;TI"pub_key = pkey.public_key ;TI"Kputs pub_key.verify_raw("SHA256", signature, hash, signopts) # => true;T:@format0: @fileI"ext/openssl/ossl_pkey.c;T:0@omit_headings_from_table_of_contents_below0I"7pkey.sign_raw(digest, data [, options]) -> string ;T0[ I"(p1, p2, p3 = v3);T@?FI" PKey;TcRDoc::NormalClass00