-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revise in-memory key representation #310
Comments
We are currently transitioning to a class-based model using independent Some thoughts about those classes are captured in #270 (comment). |
Some notes about mandatory keyids in the in-memory representation of public keys:
|
#251 discusses various consistency issues related to securesystemslib (TUF/in-toto) cryptographic keys. This issue splits out the concerns related to the in-memory representation of keys.
Current behavior:
The in-memory format of keys is similar to the "public key metadata format" with the following differences:
Expected behavior:
Clear distinction between in-memory representation and "public key metadata format"
Clear API for main tasks:
Consider a class-based model (see TUF ADR0004 for rationale)
The text was updated successfully, but these errors were encountered: