From 222387d7ef82a3e0a343634d2a73be836d05412e Mon Sep 17 00:00:00 2001 From: sth Date: Tue, 5 Aug 2003 09:08:02 +0000 Subject: [PATCH] Added info about SC_ALGORITHM_RSA_HASH_NONE, to comply with the 0.8.0 release git-svn-id: https://www.opensc-project.org/svnp/opensc/trunk@1327 c6295689-39f2-0310-b995-f0e70906c6a9 --- docs/sc_pkcs15_compute_signature.3 | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/docs/sc_pkcs15_compute_signature.3 b/docs/sc_pkcs15_compute_signature.3 index 328344fd..67deee45 100644 --- a/docs/sc_pkcs15_compute_signature.3 +++ b/docs/sc_pkcs15_compute_signature.3 @@ -49,11 +49,14 @@ by ORing with one of the following values: .BR SC_ALGORITHM_RSA_HASH_MD5 , .BR SC_ALGORITHM_RSA_HASH_SHA1 , -.BR SC_ALGORITHM_RSA_HASH_RIPEMD160 ", or -.BR SC_ALGORITHM_RSA_HASH_MD5_SHA1 . +.BR SC_ALGORITHM_RSA_HASH_RIPEMD160 , +.BR SC_ALGORITHM_RSA_HASH_MD5_SHA1 , or +.BR SC_ALGORITHM_RSA_HASH_NONE . .IP In any of these cases, the length of the input data must match -the digest length of the hash algorithm. +the digest length of the hash algorithm. In the first 3 cases, +the respective digestinfo is prepended to the input data (the +hash), in the last 2 cases, no digestinfo is prepended. .TP .B SC_ALGORITHM_RSA_PAD_ANSI requests that the card should use ANSI padding when signing the