> On Jan 12, 2015, at 12:05 PM, Jens Alfke <j...@mooseyard.com> wrote:
> 
> 
> Somebody (Dave Fernandes, apparently) wrote:
>>> 
>>> If you use AquaticPrime, unfortunately, it does not generate standard 
>>> signatures. It manually hashes and then encrypts using the private key. 
>>> This sounds like a normal signature, but it is missing some information 
>>> stored in standard PKCS #1 v2.0 signatures. This means that 
>>> Security.framework WILL NOT be able to verify an AquaticPrime signature. 
>>> The verify transform does not work for the above reason; and the decrypt 
>>> transform does not work either because that would require you to decrypt 
>>> using the public key. Security.framework enforces cryptographic hygiene - 
>>> you can only decrypt with a private key and verify a signature with a 
>>> public key.
> 
> The Security Transform API won't let you do that. But there are lower level 
> functions in the framework (the CDSA API) that allow it.
> 
> —Jens

Yes, but aren’t they all deprecated?


_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to