v1.3.1March 06, 2018
- Breaking: SwiftyRSA ObjC was refactored under the hood to offer a better experience with both Swift and ObjC runtimes. To use SwiftyRSA with Objective-C use the following pod:
- Other methods of integration – like Carthage – are unaffected. - In Swift, `ClearMessage.verify` now returns a boolean instead of a `VerificationResult`.
PrivateKeynow expose their keychain reference and the data they were created with, in the
PrivateKeynow have a method
data()which returns the key data as exported by the keychain. #60
PrivateKeynow can be exported to PEM via the
pemString()method, or base64 via the
PrivateKeynow can be created from a
- Fixed a bug that would pass a wrong bit size to
SecKeyCreateWithDataon iOS 10+. https://github.com/TakeScoop/SwiftyRSA/issues/58
💥 Breaking changes
For its 1.0 version, SwiftyRSA is getting an architecture overhaul to ensure separation of concerns and code clarity. We're introducing the following classes:
PublicKey/PrivateKeyallow to extract a key from a PEM/DER/base64 string and now includes helpers like
ClearMessage/EncryptedMessagerepresents a clear or encrypted message to process through the RSA algorithm.
Signaturerepresents a message's signature that can be verified with a public key.
We recommend to check out the new [usage instructions](./README.md) to migrate code from
0.xversions of SwiftyRSA.
- Add support for SHA2 (224,256,384 & 512 bits) digest algorithms
signSHA1Digestare now deprecated; use
- Objective-C sign & verification functions now require a
- Added support to read multiple keys from an input file using
- Added WatchOS and tvOS support. #23