diff --git a/book/source/07-signing_data.md b/book/source/07-signing_data.md index a9d7c6b..d166794 100644 --- a/book/source/07-signing_data.md +++ b/book/source/07-signing_data.md @@ -69,13 +69,7 @@ To produce an {term}`inline signature`, the {term}`signer` processes the entiret For efficient {term}`verification`, an application must understand how to handle the {term}`literal data` prior to its reading. This requirement is addressed by the {term}`one-pass signature packets` located at the beginning of {term}`inline-signed` messages. These {term}`packets` include essential information such as the {term}`fingerprint` of the {term}`signing key` and the {term}`hash` algorithm used for computing the {term}`signature`'s {term}`hash digest`. This setup enables the verifier to process the data correctly and efficiently. -```{admonition} TODO -:class: warning - -Is the signer keyid/fingerprint in the OPS important for the verifier to be able to verify the signature efficiently? Or is it (only?) there to be hashed and signed, along with the literal data? - -Realization: It's probably useful to know the fingerprints right away, to first go find the public key material, before calculating the hash of a huge file. -``` +Strictly speaking, knowing just the hash algorithm would be sufficient to begin the verification process. However, having efficient access to the signer's fingerprint or key ID upfront allows OpenPGP software to fetch the signer's certificates before processing the entirety of the - potentially large - signed data, and . #### Verification @@ -148,8 +142,46 @@ Despite their widespread adoption, {term}`cleartext signatures