Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow signing with ECDSA keys #3034

Merged
merged 2 commits into from Apr 16, 2024
Merged

Conversation

mlschroe
Copy link
Contributor

Key import and verification already works, it's just that rpm does not know where to put the signature.

Key import and verification already works, it's just that rpm
does not know where to put the signature.
@mlschroe
Copy link
Contributor Author

See also 23770e1

@mlschroe
Copy link
Contributor Author

Maybe we should put all unknown algorithms into the DSA slots. I think the distinction was just done so that very old rpm versions didn't trip when they saw a non-rsa signature. Another reason could have been to allow both signing with the old RSA/MD5 (for compat reasons) and the new DSA/SHA1 combos.

@pmatilai
Copy link
Member

Clearly it's Monday - took me a few moments to see the difference to 23770e1 😅

I'd be wary of adding any default rule there but clearly ECDSA belongs to DSA as much as EDDSA does, no objection on that.

These things should have tests, really. Care to add some, or should I just add a ticket to remind us to add one of these days?

@mlschroe
Copy link
Contributor Author

I can add both an ed25519 and an nist p-256 key test.

@mlschroe
Copy link
Contributor Author

Ok, done.

@pmatilai
Copy link
Member

Excellent, thanks!

@pmatilai pmatilai merged commit 983dd21 into rpm-software-management:master Apr 16, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants