On Sat, Oct 29, 2016 at 2:27 PM, Joseph Birr-Pixton <jpix...@gmail.com>
wrote:

> Just a quick question. In TLS1.3 we have:
>
>      enum {
>           rsa_pkcs1_sha1 (0x0201),
>           rsa_pkcs1_sha256 (0x0401),
>           rsa_pkcs1_sha384 (0x0501),
>           rsa_pkcs1_sha512 (0x0601),
>           ecdsa_secp256r1_sha256 (0x0403),
>           ecdsa_secp384r1_sha384 (0x0503),
>           ecdsa_secp521r1_sha512 (0x0603),
> (then)
>           rsa_pss_sha256 (0x0804),
>           rsa_pss_sha384 (0x0805),
>           rsa_pss_sha512 (0x0806),
>       } SignatureScheme;
>
> This kind of looks like someone was trying to make the
> rsa_pss_shasomething ordinals be decodable by a TLS1.2 implementation
> given a SignatureAlgorithm reservation for PSS of 8, but got the bytes
> the wrong way around.
>
> Is this an error, or am I missing something subtle?
>

No, it's not an error. We deliberately allocated code points with (what
would be in TLS 1.2)
an unknown hash and an unknown signature algorithm. AFAIK it's just
coincidence that the second
byte matches up with the 1.5 digest algorithms, by virtue of us counting
upward.

-Ekr


> Cheers,
> Joe
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to