Class

TKTokenKeyAlgorithm

Cryptographic algorithms used by token keys.

Declaration

@interface TKTokenKeyAlgorithm : NSObject

Overview

Typically, the supported algorithm for a token key can be represented by a value of the SecKeyAlgorithm enumeration. However, tokens such as Smart Cards require that input data for operations take the format of a more specific algorithm. For example, a token may accept raw data to generate a cryptographic signature, but require that raw data to be formatted according to PKCS1 padding rules. To express such a requirement, a TKTokenKeyAlgorithm object defines a target algorithm and a set of other algorithms that were used. In the previous example, the target algorithm is kSecKeyAlgorithmRSASignatureRaw and the kSecKeyAlgorithmRSASignatureDigestPKCS1v15SHA1 algorithm is also reported as being used.

Topics

Determining Algorithm Usage

- isAlgorithm:

Returns whether the specified algorithm is the target operation algorithm.

- supportsAlgorithm:

Whether the specified algorithm is the target operation algorithm, or one of the other algorithms used.

Relationships

Inherits From

See Also

Determining Support for Operations

- tokenSession:supportsOperation:usingKey:algorithm:

Asks the delegate whether the token session supports a given operation using the specified key and algorithm.

TKTokenOperation

Operations that can be performed with a token's keys and certificates.

TKTokenObjectID

A unique and persistent identifier of a particular token object.

Beta Software

This documentation contains preliminary information about an API or technology in development. This information is subject to change, and software implemented according to this documentation should be tested with final operating system software.

Learn more about using Apple's beta software