HEX
Server: Apache
System: Windows NT MAGNETO-ARM 10.0 build 22000 (Windows 10) AMD64
User: Michel (0)
PHP: 7.4.7
Disabled: NONE
Upload Files
File: C:/Ruby27-x64/share/ri/2.7.0/system/OpenSSL/PKey/RSA/sign_pss-i.ri
U:RDoc::AnyMethod[iI"
sign_pss:ETI" OpenSSL::PKey::RSA#sign_pss;TF:publico:RDoc::Markup::Document:@parts[o:RDoc::Markup::Paragraph;	[I"QSigns _data_ using the Probabilistic Signature Scheme (RSA-PSS) and returns ;TI"the calculated signature.;To:RDoc::Markup::BlankLineo;
;	[I"0RSAError will be raised if an error occurs.;T@o;
;	[I"4See #verify_pss for the verification operation.;T@S:RDoc::Markup::Heading:
leveli:	textI"Parameters;To:RDoc::Markup::List:
@type:	NOTE:@items[	o:RDoc::Markup::ListItem:@label[I"
_digest_;T;	[o;
;	[I";A String containing the message digest algorithm name.;To;;[I"_data_;T;	[o;
;	[I"%A String. The data to be signed.;To;;[I"_salt_length_;T;	[o;
;	[	I"HThe length in octets of the salt. Two special values are reserved: ;TI"N+:digest+ means the digest length, and +:max+ means the maximum possible ;TI"Llength for the combination of the private key and the selected message ;TI"digest algorithm.;To;;[I"_mgf1_hash_;T;	[o;
;	[I"NThe hash algorithm used in MGF1 (the currently supported mask generation ;TI"function (MGF)).;T@S;;
i;I"Example;To:RDoc::Markup::Verbatim;	[I"data = "Sign me!"
;TI")pkey = OpenSSL::PKey::RSA.new(2048)
;TI"Wsignature = pkey.sign_pss("SHA256", data, salt_length: :max, mgf1_hash: "SHA256")
;TI"pub_key = pkey.public_key
;TI"8puts pub_key.verify_pss("SHA256", signature, data,
;TI"O                        salt_length: :auto, mgf1_hash: "SHA256") # => true;T:@format0:
@fileI" ext/openssl/ossl_pkey_rsa.c;T:0@omit_headings_from_table_of_contents_below0I"Drsa.sign_pss(digest, data, salt_length:, mgf1_hash:) -> String
;T0[I"(p1, p2, p3 = {});T@DFI"RSA;TcRDoc::NormalClass00