mirror of
https://codeberg.org/openpgp/notes.git
synced 2024-11-05 00:25:59 +01:00
Add link target headers
This commit is contained in:
parent
864ed59a64
commit
cf765f0b44
1 changed files with 2 additions and 0 deletions
|
@ -59,6 +59,7 @@ OpenPGP defines two variant forms of inline-signed messages:
|
|||
|
||||
[^inline-signature-formats]: One-pass signing was first specified in RFC 2440. The format was not supported in PGP 2.6.x.
|
||||
|
||||
(one-pass-signature)=
|
||||
### One-pass signed message
|
||||
|
||||
This is the commonly used format for inline signed messages.
|
||||
|
@ -99,6 +100,7 @@ Strictly speaking, knowing just the hash algorithm would be sufficient to begin
|
|||
|
||||
Important to note, the {term}`signer`'s {term}`public key<OpenPGP Certificate>`, critical for the final {term}`verification` step, is not embedded in the message. Verifiers must acquire this {term}`key` externally (e.g., from a {term}`key server`) to authenticate the {term}`signature<OpenPGP Signature Packet>` successfully.
|
||||
|
||||
(prefixed-signature)=
|
||||
### Prefixed signed message
|
||||
|
||||
A {term}`prefixed signed message` consists of {term}`signature packet(s)<signature packet>` followed by the message. This inline signature format serves the same function as a {term}`one-pass signed message`. For the verifier, the two formats are equally convenient. However, on the signer's side, it takes more computational work to generate a {term}`prefixed signed message`.
|
||||
|
|
Loading…
Reference in a new issue