Open daviddahl opened 5 years ago
depends on #10 - still need to expose API that PEM-encodes the signature
Must put PEM-encoded signature into the proof and PEM-encoded public key
When verifying the proof, must convert PEM to RSA pub key and PEM signature to buffer / bytes
depends on #10 - still need to expose API that PEM-encodes the signature
Must put PEM-encoded signature into the proof and PEM-encoded public key
When verifying the proof, must convert PEM to RSA pub key and PEM signature to buffer / bytes