@@ -85,15 +85,19 @@ These correspond to ML-DSA-44, ML-DSA-65, and ML-DSA-87 defined
8585in {{FIPS204}} respectively. Note that these are different
8686from the HashML-DSA pre-hashed variants defined in Section 5.4 of {{FIPS204}}.
8787
88- The signature MUST be computed and verified as specified in
89- {{Section 4.4.3 of RFC8446}}.
88+ If one of those SignatureSchemes values is used in a CertificateVerify message,
89+ then the signature MUST be computed and verified as specified in
90+ {{Section 4.4.3 of RFC8446}}, and the corresponding end-entity certificate MUST
91+ use id-ML-DSA-44, id-ML-DSA-65, id-ML-DSA-87 respectively as
92+ defined in {{I-D.ietf-lamps-dilithium-certificates}}.
9093
9194The context parameter defined in {{FIPS204}} Algorithm 2 and 3
9295MUST be the empty string.
9396
94- The corresponding end-entity certificate when negotiated MUST
95- use id-ML-DSA-44, id-ML-DSA-65, id-ML-DSA-87 respectively as
96- defined in {{I-D.ietf-lamps-dilithium-certificates}}.
97+ Presence of those schemes in "signature_algorithms_cert" or
98+ " signature_algorithms" (when the former is not sent) indicates support
99+ for certificates signed by those algorithms in the Certificate message,
100+ as specified in {{Section 4.2.4 of RFC8446}}.
97101
98102The schemes defined in this document MUST NOT be used in TLS 1.2 {{RFC5246}}.
99103A peer that receives ServerKeyExchange or CertificateVerify message in a TLS
0 commit comments