Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ecdsa-sha2-nistp256 to specification #498

Merged

Conversation

vladimir-v-diaz
Copy link
Contributor

@vladimir-v-diaz vladimir-v-diaz commented Oct 11, 2017

Fixes issue #:
#355

Description of the changes being introduced by the pull request:
Add ECDSA (ecdsa-sha2-nistp256) to specification, as requested in issue #355. ECDSA has been
implemented in secure-systems-lab/securesystemslib#18.

Please verify and check that the pull request fulfills the following
requirements
:

  • The code follows the Code Style Guidelines
  • Tests have been added for the bug fix or new feature
  • Docs have been added for the bug fix or new feature

@vladimir-v-diaz vladimir-v-diaz merged commit 76b2b2d into theupdateframework:develop Oct 11, 2017
@coveralls
Copy link

coveralls commented Oct 11, 2017

Coverage Status

Coverage remained the same at 99.293% when pulling c2f9d63 on vladimir-v-diaz:add_ecdsa_to_spec into 3fd782c on theupdateframework:develop.

Copy link
Contributor

@awwad awwad left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good except for the two comments listed (which I suppose should be corrected in a fresh PR).

@@ -491,9 +496,9 @@ Version: **1.0 (Draft)**
used to sign documents. The type determines the interpretation of
KEYVAL.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How does the type determine the interpretation of KEYVAL? Type here implies ecdsa/rsa/ed25519, not public/private. Is public/private meant?

}

where PUBLIC is in PEM format and a string.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see anywhere in the spec where private key formats are explained. Perhaps you should add a note after these examples or something, saying that for a private key, keyval will also contain "private": PRIVATE.

Copy link
Contributor Author

@vladimir-v-diaz vladimir-v-diaz Dec 1, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We previously included a "private" attribute in KEYVAL, but later decided to remove it altogether from metadata. Since public metadata is never expected to contain a private key, people argued that the "private" attribute shouldn't exist.

Although the repository tool stores private keys in KEYVAL for convenience, it is not required by the specification. Taking into account that adopters don't have to worry about producing metadata with a "private" element, should we bother explaining it in the specification?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants