Daniel Kahn Gillmor <dkg(_at_)fifthhorseman(_dot_)net> wrote:
> Each "key signature" (certification) is its own OpenPGP packet, right?
> and the context we're talking about here is a hash context that is used
> to calculate a key signature.
yes, but I'm assuming that we might sign these new keys using legacy signatures.
(and vv)
>> A v5-capable tool, which does not speak these new formats can still
process
>> the packets. It could also verify that these large keys are signed by
our
>> legacy algorithms.
> yes, i agree with this, though it is not "skipping over" -- it's
> "preparing for certifications of larger keys".
Agreed.
--
Michael Richardson <mcr+IETF(_at_)sandelman(_dot_)ca> . o O ( IPv6 IøT
consulting )
Sandelman Software Works Inc, Ottawa and Worldwide
signature.asc
Description: PGP signature
_______________________________________________
openpgp mailing list
openpgp(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/openpgp