Cryptographic algorithms used by token keys.
- iOS 10.0+
- macOS 10.12+
- tvOS 11.0+
- Mac Catalyst 13.0+Beta
Typically, the supported algorithm for a token key can be represented by a value of the
Sec enumeration. However, tokens such as Smart Cards require that input data for operations take the format of a more specific algorithm. For example, a token may accept raw data to generate a cryptographic signature, but require that raw data to be formatted according to PKCS1 padding rules. To express such a requirement, a
TKToken object defines a target algorithm and a set of other algorithms that were used. In the previous example, the target algorithm is
k and the
k algorithm is also reported as being used.