[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-commits
Subject:    kdesupport/qca/include/QtCrypto
From:       Justin Karneges <infiniti () affinix ! com>
Date:       2009-12-15 9:48:07
Message-ID: 1260870487.001876.8201.nullmailer () svn ! kde ! org
[Download RAW message or body]

SVN commit 1062589 by infiniti:

in the docs, explain that signatures are more than just hash+pubkey operations


 M  +8 -0      qca_publickey.h  


--- trunk/kdesupport/qca/include/QtCrypto/qca_publickey.h #1062588:1062589
@@ -59,6 +59,14 @@
 
 /**
    Signature algorithm variants
+
+   Note that most signature algorithms follow a process of first hashing the
+   plaintext data to be signed, creating a payload format that wraps the hash
+   value (among other things), and then signing the payload with the private
+   key.  So, for example, an EMSA3(SHA1) signature outputted by QCA cannot be
+   verified by merely performing RSA and SHA1 operations (e.g.
+   "openssl rsautl -verify" and comparing with sha1sum), because that would not
+   take the EMSA3 payload format into consideration.
 */
 enum SignatureAlgorithm
 {
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic