[prev in list] [next in list] [prev in thread] [next in thread]
List: kde-commits
Subject: kdesupport/qca/include/QtCrypto
From: Justin Karneges <infiniti () affinix ! com>
Date: 2009-12-15 9:48:07
Message-ID: 1260870487.001876.8201.nullmailer () svn ! kde ! org
[Download RAW message or body]
SVN commit 1062589 by infiniti:
in the docs, explain that signatures are more than just hash+pubkey operations
M +8 -0 qca_publickey.h
--- trunk/kdesupport/qca/include/QtCrypto/qca_publickey.h #1062588:1062589
@@ -59,6 +59,14 @@
/**
Signature algorithm variants
+
+ Note that most signature algorithms follow a process of first hashing the
+ plaintext data to be signed, creating a payload format that wraps the hash
+ value (among other things), and then signing the payload with the private
+ key. So, for example, an EMSA3(SHA1) signature outputted by QCA cannot be
+ verified by merely performing RSA and SHA1 operations (e.g.
+ "openssl rsautl -verify" and comparing with sha1sum), because that would not
+ take the EMSA3 payload format into consideration.
*/
enum SignatureAlgorithm
{
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic