@@ -58,7 +58,7 @@ Parameters:
58
58
- etc...
59
59
60
60
* KEYID is an optional, unauthenticated hint indicating what key was used to
61
- sign the message. It ** must not ** be used for security decisions.
61
+ sign the message. It ** MUST NOT ** be used for security decisions.
62
62
63
63
Functions:
64
64
@@ -71,7 +71,7 @@ Functions:
71
71
le64(n) := 64-bit little-endian encoding of `n`, where 0 <= n < 2^63
72
72
```
73
73
74
- * Sign() is an arbitrary digital signature format. Details must be agreed upon
74
+ * Sign() is an arbitrary digital signature format. Details are agreed upon
75
75
out-of-band by the signer and verifier. This specification places no
76
76
restriction on the signature algorithm or format.
77
77
@@ -103,13 +103,13 @@ To verify:
103
103
fails.
104
104
105
105
Either standard or URL-safe base64 encodings are allowed. Signers may use
106
- either, and verifiers must accept either.
106
+ either, and verifiers **MUST** accept either.
107
107
108
108
### Backwards compatible signatures
109
109
110
110
To convert existing signatures from the current format to the new format,
111
- `"backwards-compatible-json"` must be added to the payload type URI to indicate
112
- that the signature is over the raw payload. This allows the signatures to remain
111
+ `"backwards-compatible-json"` is added to the payload type URI to indicate that
112
+ the signature is over the raw payload. This allows the signatures to remain
113
113
valid while avoiding the verifier from having to use [Canonical JSON].
114
114
115
115
```json
@@ -127,7 +127,7 @@ Support for this backwards compatibility mode is optional.
127
127
128
128
To sign:
129
129
130
- - BODY ** must ** be an object type (` {...} ` ).
130
+ - BODY ** MUST ** be an object type (` {...} ` ).
131
131
- Serialize BODY as [ Canonical JSON] ; call this SERIALIZED_BODY.
132
132
- Sign SERIALIZED_BODY, base64-encode the result, and store it in ` sig ` .
133
133
- Optionally, compute a KEYID and store it in ` keyid ` .
@@ -144,14 +144,14 @@ To verify:
144
144
decoding or the signature verification fails.
145
145
- Parse SERIALIZED_BODY as a JSON object. Reject if the parsing fails or if
146
146
the result is not a JSON object. In particular, the first byte of
147
- SERIALIZED_BODY must be ` { ` . Verifiers ** must not ** require SERIALIZED_BODY
147
+ SERIALIZED_BODY ** MUST ** be ` { ` . Verifiers ** MUST NOT ** require SERIALIZED_BODY
148
148
to be Canonical JSON.
149
149
150
150
Backwards compatible signatures are not recommended because they lack the
151
151
authenticated payloadType indicator.
152
152
153
153
This scheme is safe from rollback attacks because the first byte of
154
- SERIALIZED_BODY must be 0x7b (` { ` ) in backwards compatibility mode and 0x02 in
154
+ SERIALIZED_BODY is be 0x7b (` { ` ) in backwards compatibility mode and 0x02 in
155
155
regular mode.
156
156
157
157
### Multiple signatures
0 commit comments