summaryrefslogtreecommitdiff
path: root/doc/usage.rst
Commit message (Collapse)AuthorAgeFilesLines
* Fix #199: Sphinx warnings reference target not foundSybren A. Stüvel2022-07-201-1/+1
| | | | | | | | | | | | | | | Fix the documentation by adding referenced-but-not-included functions and some other small fixes. The only warnings left are: ``` python-rsa/rsa/key.py:docstring of rsa.key.AbstractKey.load_pkcs1:: WARNING: py:class reference target not found: rsa.key.T python-rsa/rsa/key.py:docstring of rsa.key.AbstractKey.load_pkcs1:: WARNING: py:class reference target not found: rsa.key.T ``` These are due to Sphynx not really understanding `typing` type references. Not sure how to fix those.
* Fix typosKian-Meng, Ang2021-11-241-3/+3
|
* Update usage.rstRichard Vodden2021-02-241-2/+2
|
* Correct return value of verify()Richard Vodden2021-02-241-2/+3
|
* Fix #170: mistake in examples of documentationSybren A. Stüvel2021-01-101-4/+4
| | | | | Strings need to be encoded into bytes before the RSA module can operate on them.
* Remove keysize requirements / recommendationsJoost Rijneveld2018-02-051-26/+0
| | | | | | This library is probably not the right place to recommend key sizes or have discussions about the relation between key sizes and hash function outputs.
* Fix typoHugo2018-01-241-2/+2
|
* Typos (#95)David Larlet2017-08-311-2/+2
|
* Support signing a pre-calculated hash (#87)Justin Simon2017-05-071-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | * Split the hashing out of the sign method This code change adds support to split the hashing of a message and the actual signing of the message. * Updating unit test and documentation This commit updates the unit test and usage docs. In addition, This change removes a redundant error check inside rsa.sign(). * Refactore unit tests and code comments Removed the print statements from the unit test and refactored a few code comments to improve readability. * Rename hash function The new hash function had the same name as a function in the standard library. This commit changes the name to avoid conflicts. * Rename hash function to compute_hash() This commit renames the hash function to compute_hash().
* Updated documentation for removal of bigfile/VARBLOCK support.Sybren A. Stüvel2017-04-101-54/+5
|
* Updated documentation, mostly http -> https changesSybren A. Stüvel2016-02-051-10/+10
| | | | | | Also: - changed http to https in the code - changed header underlines in the documentation to match the header length
* Fix #13: Deprecated the VARBLOCK format and rsa.bigfile moduleSybren A. Stüvel2016-01-221-0/+18
| | | | | This deprecation is due to security issues; see https://github.com/sybrenstuvel/python-rsa/issues/13 for more information.
* Updated key loading example and included it as unit test, fixes bug #31Sybren A. Stüvel2016-01-211-2/+2
|
* Made example code more consistent and up to date with Python 3.4Sybren A. Stüvel2015-08-311-6/+13
|
* rsa.pkcs1.verify() should return True when successfulTim Heckman2012-10-171-1/+2
| | | | | | | | | | | | | | | - when verification passes verify() will return True, instead of None. If verification fails the function will still raise a rsa.pkcs1.VerificationError for legacy purposes. - update the docs to note that the verify() function returns True when successful - write unit tests to verify this new behavior This commit passes all build tests: Ran 44 tests in 1.217s OK
* Added parallel.py module and ability to use multiprocessing when generating keysSybren A. Stüvel2011-08-101-27/+40
|
* More documentation about key size and OpenSSL compatibilitySybren A. Stüvel2011-08-031-2/+33
|
* more documentationSybren A. Stüvel2011-08-031-19/+46
|
* Much more documentationSybren A. Stüvel2011-08-011-1/+2
|
* More usage documentationSybren A. Stüvel2011-08-011-0/+95
|
* doc typoSybren A. Stüvel2011-07-311-1/+1
|
* Finished documentation of basic functionsSybren A. Stüvel2011-07-311-5/+62
|
* More documentationSybren A. Stüvel2011-07-311-4/+76
|
* More documentationSybren A. Stüvel2011-07-311-5/+25
|
* More documentationSybren A. Stüvel2011-07-301-0/+11