@@ -126,7 +126,7 @@ either, and verifiers **MUST** accept either.
126
126
### Backwards compatible signatures
127
127
128
128
To convert existing signatures from the current format to the new format,
129
- `"backwards-compatible- json"` is added to the payload type URI to indicate that
129
+ `"raw- json-no-payload-type "` is added to the payload type URI to indicate that
130
130
the signature is over the raw payload. This allows the signatures to remain
131
131
valid while avoiding the verifier from having to use [Canonical JSON].
132
132
@@ -163,8 +163,8 @@ To verify:
163
163
decoding or the signature verification fails.
164
164
- Parse SERIALIZED_BODY as a JSON object. Reject if the parsing fails or if
165
165
the result is not a JSON object. In particular, the first byte of
166
- SERIALIZED_BODY ** MUST** be ` { ` . Verifiers ** MUST NOT** require SERIALIZED_BODY
167
- to be Canonical JSON.
166
+ SERIALIZED_BODY ** MUST** be ` { ` . Verifiers ** MUST NOT** require
167
+ SERIALIZED_BODY to be Canonical JSON.
168
168
- Discard ` payloadType ` if present.
169
169
170
170
Backwards compatible signatures are not recommended because they lack the
@@ -289,8 +289,8 @@ Rationales for specific decisions:
289
289
payloadType were not signed.
290
290
- Also, URIs don't need to be registered while Media Types do.
291
291
292
- - Why use payloadType "backwards-compatible- json" instead of assuming
293
- backwards compatible mode if payloadType is absent?
292
+ - Why use payloadType "raw- json-no-payload-type " instead of assuming backwards
293
+ compatible mode if payloadType is absent?
294
294
295
295
- We wanted to leave open the possibility of having an
296
296
application-specific "default" value if payloadType is unspecified,
0 commit comments