Re: [TLS] Simplifying signature algorithm negotiation

2016-01-16 Thread Nikos Mavrogiannopoulos
- Original Message - > Hi, > > - rsapss_sha256 > > - rsapss_sha384 > > - rsapss_sha512 > > - ecdsa_p256_sha256 > > - ecdsa_p256_sha384 > > - ecdsa_p256_sha512 > > - ecdsa_p384_sha256 > > - ecdsa_p384_sha384 > > - ecdsa_p384_sha512 > > - ecdsa_p521_sha256 > > - ecdsa_p521_sha384 > > - ecdsa_

Re: [TLS] Simplifying signature algorithm negotiation

2016-01-16 Thread Ilari Liusvaara
On Sat, Jan 16, 2016 at 11:01:12AM +0100, Hanno Böck wrote: > > > - rsapss_sha256 > > - rsapss_sha384 > > - rsapss_sha512 > > - ecdsa_p256_sha256 > > - ecdsa_p256_sha384 > > - ecdsa_p256_sha512 > > - ecdsa_p384_sha256 > > - ecdsa_p384_sha384 > > - ecdsa_p384_sha512 > > - ecdsa_p521_sha256 > > - ec

Re: [TLS] Simplifying signature algorithm negotiation

2016-01-16 Thread Hanno Böck
Hi, I generally like the idea of simplifying the different algorithm negotiation things, but: On Fri, 15 Jan 2016 20:45:34 + David Benjamin wrote: > [2] > 0x-0x06ff - Reserved range for TLS 1.2 compatibility values. Note > this is wire-compatible with TLS 1.2. > - 0x0101 - rsa_pkcs1_md5