-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merge PublicKeyDetails
and KnownSignatureAlgorithms
#212
Merge PublicKeyDetails
and KnownSignatureAlgorithms
#212
Conversation
Signed-off-by: Fredrik Skogman <[email protected]>
0675d15
to
06138b8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks @kommendorkapten!
I'll rebase #199 on top of this.
PKIX_RSA_PSS = 4 [deprecated = true]; | ||
PKIX_RSA_PKCS1_2048_SHA256 = 9; | ||
PKIX_RSA_PKCS1_3072_SHA256 = 10; | ||
PKIX_RSA_PKCS1_4096_SHA256 = 11; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@kommendorkapten Sorry, just reviewed - Can we keep the PSS variants?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Whoops, missed this as well. I can add those to #199, since I'm already modifying the file.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks. Do we also want to be pedantic about pkcs1 vs pkcs1v5? Also, should we support the pkcs1 encoded variants? sigstore/sigstore is able to unmarshal either pkix or pkcs1 encodings.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(moving convo over to 199)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, I could go either way on PKCS#1 vs. PKCS#1v1.5 -- I think it's common enough in practice to abbreviate the latter as the former. But specificity also wouldn't hurt.
In terms of encodings: I would lean towards the PKIX variants, since they're what appears in X.509. But maybe the trust root encodes them as PKCS1? I'm not sure 😅
Summary
Merge the two messages to avoid confusion and drift.
Release Note
PublicKeyDetails
. New algorithms for RSA is added, see below for details. The new algorithms for RSA specifies both the hash algorithm used, and the bit length of the public modulus.PublicKeyDetails
PKIX_RSA_PKCS1_2048_SHA256
PKIX_RSA_PKCS1_3072_SHA256
PKIX_RSA_PKCS1_4096_SHA256
PKIX_ECDSA_P384_SHA_384
PKIX_ECDSA_P521_SHA_512
Documentation
N/A