rfc9216v2.txt   rfc9216.txt 
skipping to change at line 236 skipping to change at line 236
certified by their corresponding root CA) or in a three-link chain. certified by their corresponding root CA) or in a three-link chain.
For example, Alice's encryption certificate (alice.encrypt.crt; see For example, Alice's encryption certificate (alice.encrypt.crt; see
Section 4.3) can be validated by a peer that directly trusts the Section 4.3) can be validated by a peer that directly trusts the
example RSA CA's root cert (ca.rsa.crt; see Section 3.1): example RSA CA's root cert (ca.rsa.crt; see Section 3.1):
+==============+ +-------------------+ +==============+ +-------------------+
|| ca.rsa.crt ||-->| alice.encrypt.crt | || ca.rsa.crt ||-->| alice.encrypt.crt |
+==============+ +-------------------+ +==============+ +-------------------+
Figure 1: Validating Alice's encryption certificate directly when
the issuing CA is a trust anchor
And it can also be validated by a peer that only directly trusts the And it can also be validated by a peer that only directly trusts the
example Ed25519 CA's root cert (ca.25519.crt; see Section 6.1) via an example Ed25519 CA's root cert (ca.25519.crt; see Section 6.1) via an
intermediate cross-signed CA cert (ca.rsa.cross.crt; see intermediate cross-signed CA cert (ca.rsa.cross.crt; see
Section 3.3): Section 3.3):
+================+ +------------------+ +-------------------+ +================+ +------------------+ +-------------------+
|| ca.25519.crt ||-->| ca.rsa.cross.crt |-->| alice.encrypt.crt | || ca.25519.crt ||-->| ca.rsa.cross.crt |-->| alice.encrypt.crt |
+================+ +------------------+ +-------------------+ +================+ +------------------+ +-------------------+
Figure 2: Validating Alice's cert from a different trust anchor
via an intermediate cross-signed CA certificate
By omitting the cross-signed CA certs, it should be possible to test By omitting the cross-signed CA certs, it should be possible to test
a "transvalid" certificate (an end-entity certificate that is a "transvalid" certificate (an end-entity certificate that is
supplied without its intermediate certificate) in some supplied without its intermediate certificate) in some
configurations. configurations.
2.6. Passwords 2.6. Passwords
Each secret key presented in this document is represented as a PEM- Each secret key presented in this document is represented as a PEM-
encoded PKCS #8 ([RFC5958]) object in cleartext form (it has no encoded PKCS #8 ([RFC5958]) object in cleartext form (it has no
password). password).
 End of changes. 2 change blocks. 
0 lines changed or deleted 6 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/