Skip to content

Commit 96a1d8c

Browse files
authored
Merge pull request #11 from tomato42/explicit-usage-and-certificates
it's not just CertificateVerify where we can use ML-DSA
2 parents a28da9d + aaea70b commit 96a1d8c

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

draft-ietf-tls-mldsa.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -85,15 +85,19 @@ These correspond to ML-DSA-44, ML-DSA-65, and ML-DSA-87 defined
8585
in {{FIPS204}} respectively. Note that these are different
8686
from the HashML-DSA pre-hashed variants defined in Section 5.4 of {{FIPS204}}.
8787

88-
The signature MUST be computed and verified as specified in
89-
{{Section 4.4.3 of RFC8446}}.
88+
If one of those SignatureSchemes values is used in a CertificateVerify message,
89+
then the signature MUST be computed and verified as specified in
90+
{{Section 4.4.3 of RFC8446}}, and the corresponding end-entity certificate MUST
91+
use id-ML-DSA-44, id-ML-DSA-65, id-ML-DSA-87 respectively as
92+
defined in {{I-D.ietf-lamps-dilithium-certificates}}.
9093

9194
The context parameter defined in {{FIPS204}} Algorithm 2 and 3
9295
MUST be the empty string.
9396

94-
The corresponding end-entity certificate when negotiated MUST
95-
use id-ML-DSA-44, id-ML-DSA-65, id-ML-DSA-87 respectively as
96-
defined in {{I-D.ietf-lamps-dilithium-certificates}}.
97+
Presence of those schemes in "signature_algorithms_cert" or
98+
"signature_algorithms" (when the former is not sent) indicates support
99+
for certificates signed by those algorithms in the Certificate message,
100+
as specified in {{Section 4.2.4 of RFC8446}}.
97101

98102
The schemes defined in this document MUST NOT be used in TLS 1.2 {{RFC5246}}.
99103
A peer that receives ServerKeyExchange or CertificateVerify message in a TLS

0 commit comments

Comments
 (0)