Last data update: 2014.03.03

Data Source

R Release (3.2.3)
CranContrib
BioConductor
All

Data Type

Packages
Functions
Images
Data set

Classification

Results 1 - 10 of 18 found.
[1] < 1 2 > [2]  Sort:

hashing (Package: openssl) : Vectorized hash/hmac functions

All hash functions either calculate a hash-digest for key == NULL or HMAC (hashed message authentication code) when key is not NULL. Supported inputs are binary (raw vector), strings (character vector) or a connection object.
● Data Source: CranContrib
● Keywords:
● Alias: hashing, hmac, mac, md4, md5, ripemd160, sha1, sha2, sha224, sha256, sha384, sha512
● 0 images

openssl_config (Package: openssl) : OpenSSL Configuration Info

Shows libssl version and configuration information.
● Data Source: CranContrib
● Keywords:
● Alias: openssl_config
● 0 images

cert_verify (Package: openssl) : X509 certificates

Read, download, analyize and verify X.509 certificates.
● Data Source: CranContrib
● Keywords:
● Alias: ca_bundle, cert_verify, download_ssl_cert
● 0 images

encrypt_envelope (Package: openssl) : Envelope encryption

An envelope contains ciphertext along with an encrypted session key and optionally and initialiation vector. The encrypt_envelope generates a random IV and session-key which is used to encrypt the data with AES stream cipher. The session key itself is encrypted using the given RSA key (see rsa_encrypt) and stored or sent along with the encrypted data. Each of these outputs is required to decrypt the data with the corresponding private key.
● Data Source: CranContrib
● Keywords:
● Alias: decrypt_envelope, encrypt_envelope, envelope
● 0 images

keygen (Package: openssl) : Generate Key pair

The keygen functions generate a random private key. Use as.list(key)$pubkey to derive the corresponding public key. Use write_pem to save a private key to a file, optionally with a password.
● Data Source: CranContrib
● Keywords:
● Alias: dsa_keygen, ec_keygen, keygen, rsa_keygen
● 0 images

read_key (Package: openssl) : Parsing keys and certificates

The read_key function (private keys) and read_pubkey (public keys) support both SSH pubkey format and OpenSSL PEM format (base64 data with a --BEGIN and ---END header), and automatically convert where necessary. The functions assume a single key per file except for read_cert_bundle which supports PEM files with multiple certificates.
● Data Source: CranContrib
● Keywords:
● Alias: read_cert, read_cert_bundle, read_key, read_pubkey
● 0 images

my_key (Package: openssl) : Default keypair

Set a default keypair via USER_KEY and USER_PUKBEY variables.
● Data Source: CranContrib
● Keywords:
● Alias: my_key, my_pubkey
● 0 images

rsa_encrypt (Package: openssl) : Low-level RSA encryption

Asymmetric encryption and decryption with RSA. Because RSA can only encrypt messages smaller than the size of the key, it is typically used only for exchanging a random session-key. This session key is used to encipher arbitrary sized data via a stream cipher such as aes_cbc. See encrypt_envelope for a high-level wrappers combining RSA and AES in this way.
● Data Source: CranContrib
● Keywords:
● Alias: encrypt, rsa, rsa_decrypt, rsa_encrypt
● 0 images

openssl (Package: openssl) : Toolkit for Encryption, Signatures and Certificates based on OpenSSL

Bindings to OpenSSL libssl and libcrypto, plus custom SSH pubkey parsers. Supports RSA, DSA and NIST curves P-256, P-384 and P-521. Cryptographic signatures can either be created and verified manually or via x509 certificates. The AES block cipher is used in CBC mode for symmetric encryption; RSA for asymmetric (public key) encryption. High-level envelope methods combine RSA and AES for encrypting arbitrary sized data. Other utilities include key generators, hash functions (md5, sha1, sha256, etc), base64 encoder, a secure random number generator, and bignum math methods for manually performing crypto calculations on large multibyte integers.
● Data Source: CranContrib
● Keywords:
● Alias: openssl, openssl-package
● 0 images

signature_create (Package: openssl) : Signatures

Sign and verify a message digest. RSA supports both MD5 and SHA signatures whereas DSA and EC keys only support SHA.
● Data Source: CranContrib
● Keywords:
● Alias: signature_create, signature_verify
● 0 images