* @remarks For verification use yaca_verify_initialize(), yaca_verify_update() and
* yaca_verify_finalize() functions with matching public key.
*
+ * @remarks For RSA operations the default padding used is #YACA_PADDING_PKCS1. It can be
+ * changed using yaca_context_set_property() with #YACA_PROPERTY_PADDING.
+ *
* @remarks The @a ctx should be released using yaca_context_destroy()
*
* @param[out] ctx Newly created context
*
* @see #yaca_key_type_e
* @see #yaca_digest_algorithm_e
+ * @see #yaca_padding_e
+ * @see yaca_context_set_property()
* @see yaca_sign_update()
* @see yaca_sign_finalize()
* @see yaca_verify_initialize()
*
* @since_tizen 3.0
*
+ * @remarks For RSA operations the default padding used is #YACA_PADDING_PKCS1. It can be
+ * changed using yaca_context_set_property() with #YACA_PROPERTY_PADDING.
+ * For verify to succeed it has to be set to the same value it was signed with.
+ *
* @remarks The @a ctx should be released using yaca_context_destroy()
*
* @param[out] ctx Newly created context
*
* @see #yaca_key_type_e
* @see #yaca_digest_algorithm_e
+ * @see #yaca_padding_e
+ * @see yaca_context_set_property()
* @see yaca_verify_update()
* @see yaca_verify_finalize()
* @see yaca_context_destroy()
* - All operations are single-shot (no streaming possible)
* - Context is not used
* - Only digest, signatures and symmetric ciphers are supported
- * - Disabling PKCS#5 padding for ECB and CBC chaining is not supported
+ * - Disabling PKCS#7 padding for ECB and CBC chaining is not supported
+ * - Changing the default PKCS#1 padding for sign/verify is not supported
* - GCM and CCM chaining is not supported
* - RC2 effective key bits property is not supported
* - All outputs are allocated by the library