Skip to content

Commit 829a03e

Browse files
authored
Merge pull request #168 from contentauth/cleanup-edits
Cleanup edits
2 parents d23e37b + 9b02ae4 commit 829a03e

File tree

2 files changed

+6
-14
lines changed

2 files changed

+6
-14
lines changed

docs/getting-started.mdx

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -84,10 +84,10 @@ In practice, to use a certificate with the CAI SDK, follow this process:
8484

8585
1. Purchase security credentials (certificate and key) from a certificate authority. Either email protection or document signing certificates are valid.
8686
2. Extract the certificate by using a tool such as OpenSSL. You could also host the certificate in a secure environment like a hardware security module (HSM).
87-
3. Use one of the supporting CAI libraries or C2PA Tool to sign manifests using the certificate.
87+
3. Use one of the supporting CAI libraries or C2PA Tool to sign manifests using the certificate.
8888

8989
:::tip
90-
For more details and a short tutorial example, see [Signing manifests](manifest/signing-manifests.md).
90+
For a short tutorial example, see [Signing manifests](manifest/signing-manifests.md). For more information on how to get and use a signing certificate in production, see [Getting and using a signing certificate](prod-cert.mdx).
9191
:::
9292

9393
### Getting a security certificate
@@ -159,25 +159,17 @@ The following diagram provides a high-level view of how to use the open-source C
159159
Applications can use the CAI SDK in several different ways:
160160

161161
- Web pages can use the JavaScript library to display Content Credentials.
162-
- Applications written in C++, Python, or Node.js can call C2PA Tool directly or use the APIs of the corresponding language libraries to:
162+
- Applications can "shell out" to call C2PA Tool directly.
163+
- Applications written in C++, Python, or Node.js can use the APIs of the corresponding language libraries to:
163164
- Create, modify, and sign manifests.
164165
- Embed manifests into media files.
165166
- Parse and validate manifests.
166167

167168
Similarly, applications written in many programming languages can use the Rust Foreign Function Interface to call the Rust API and perform those same functions.
168169

169-
<!--
170-
171-
The ability for the JavaScript SDK to write manifests via Wasm may be released in the future to empower and broaden JavaScript development.
172-
173-
This table summarizes the capabilities of the SDKs and C2PA Tool.
174-
175-
<img src={cai_os_tools_table} width="900" />
176-
-->
177-
178170
### Native desktop or mobile applications
179171

180-
Applications written in C++, Python, or Node.js can call C2PA Tool directly or use the corresponding language library APIs. CAI has prerelease versions of C++/C, Python, and Node.js libraries. As prerelease versions, these APIs are subject to change.
172+
Applications written in C++, Python, or Node.js can use the corresponding prerelease library APIs. Applications written in any language call C2PA Tool directly, though doing so is not highly scalable.
181173

182174
Alternatively, native applications can use Rust's _Foreign Function Interface_ (FFI) to call functions in the Rust library. The FFI enables interoperability between Rust and code written in other languages.
183175

docs/manifest/understanding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Manifests without time-stamps cease to be valid when the signing credential expi
4343

4444
An RFC 3161 time-stamp enables you to prove the existence of a particular piece of data at a particular time. Think of it as a notary service for data. You present a piece of data (in this case, the C2PA claim data structure) and the third-party TSA verifies that it saw that data at a time that can be audited and is independently verifiable.
4545

46-
The time-stamp is typically defined as part of the signing information. You can set this via the c2patool `ta_url` field or by using the API. The time-stamp then appears in the `SignatureInfo` JSON object when reading the manifest store.
46+
The time-stamp is typically defined as part of the signing information. You can set this by using C2PA Tool in the `ta_url` field or by using the SDK. The time-stamp then appears in the `SignatureInfo` JSON object when reading the manifest store.
4747

4848
## References
4949

0 commit comments

Comments
 (0)