You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/getting-started.mdx
+5-13Lines changed: 5 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,10 +84,10 @@ In practice, to use a certificate with the CAI SDK, follow this process:
84
84
85
85
1. Purchase security credentials (certificate and key) from a certificate authority. Either email protection or document signing certificates are valid.
86
86
2. Extract the certificate by using a tool such as OpenSSL. You could also host the certificate in a secure environment like a hardware security module (HSM).
87
-
3. Use one of the supporting CAI libraries or C2PA Tool to sign manifests using the certificate.
87
+
3. Use one of the supporting CAI libraries or C2PA Tool to sign manifests using the certificate.
88
88
89
89
:::tip
90
-
For more details and a short tutorial example, see [Signing manifests](manifest/signing-manifests.md).
90
+
For a short tutorial example, see [Signing manifests](manifest/signing-manifests.md). For more information on how to get and use a signing certificate in production, see [Getting and using a signing certificate](prod-cert.mdx).
91
91
:::
92
92
93
93
### Getting a security certificate
@@ -159,25 +159,17 @@ The following diagram provides a high-level view of how to use the open-source C
159
159
Applications can use the CAI SDK in several different ways:
160
160
161
161
- Web pages can use the JavaScript library to display Content Credentials.
162
-
- Applications written in C++, Python, or Node.js can call C2PA Tool directly or use the APIs of the corresponding language libraries to:
162
+
- Applications can "shell out" to call C2PA Tool directly.
163
+
- Applications written in C++, Python, or Node.js can use the APIs of the corresponding language libraries to:
163
164
- Create, modify, and sign manifests.
164
165
- Embed manifests into media files.
165
166
- Parse and validate manifests.
166
167
167
168
Similarly, applications written in many programming languages can use the Rust Foreign Function Interface to call the Rust API and perform those same functions.
Applications written in C++, Python, or Node.js can call C2PA Tool directly or use the corresponding language library APIs. CAI has prerelease versions of C++/C, Python, and Node.js libraries. As prerelease versions, these APIs are subject to change.
172
+
Applications written in C++, Python, or Node.js can use the corresponding prerelease library APIs. Applications written in any language call C2PA Tool directly, though doing so is not highly scalable.
181
173
182
174
Alternatively, native applications can use Rust's _Foreign Function Interface_ (FFI) to call functions in the Rust library. The FFI enables interoperability between Rust and code written in other languages.
Copy file name to clipboardExpand all lines: docs/manifest/understanding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Manifests without time-stamps cease to be valid when the signing credential expi
43
43
44
44
An RFC 3161 time-stamp enables you to prove the existence of a particular piece of data at a particular time. Think of it as a notary service for data. You present a piece of data (in this case, the C2PA claim data structure) and the third-party TSA verifies that it saw that data at a time that can be audited and is independently verifiable.
45
45
46
-
The time-stamp is typically defined as part of the signing information. You can set this via the c2patool `ta_url` field or by using the API. The time-stamp then appears in the `SignatureInfo` JSON object when reading the manifest store.
46
+
The time-stamp is typically defined as part of the signing information. You can set this by using C2PA Tool in the `ta_url` field or by using the SDK. The time-stamp then appears in the `SignatureInfo` JSON object when reading the manifest store.
0 commit comments