I'd really prefer that we merge the existing certificate with the new 
certificate.  This is particularly important as gpg strips old self signatures 
when exporting certificates.   One consequence of replacing an existing 
certificate with a new version is that existing packages may not verify any 
more, which is annoying.  Another is that we may remove a revocation 
certificate, which is dangerous.

If we don't need to order versions, then using the hash as the version seems 
reasonable.  Is that correct?

If we use the hash of the "blob," this may mean that we have version A 
installed, the user installs version B, and as a result C is installed.  Is 
that okay?

Using a hash also assumes a canonical form.  OpenPGP certificates don't have a 
canonical form.  Packets, for instance, can be reordered.  Is that an issue?

It occurs to me that for the internal backend, this isn't really a problem as 
the only thing that really matters is the primary key packet.  So we can 
probably come up with a straightforward hack.

-- 
Reply to this email directly or view it on GitHub:
https://github.com/rpm-software-management/rpm/issues/2577#issuecomment-1719111070
You are receiving this because you are subscribed to this thread.

Message ID: <rpm-software-management/rpm/issues/2577/1719111...@github.com>
_______________________________________________
Rpm-maint mailing list
Rpm-maint@lists.rpm.org
http://lists.rpm.org/mailman/listinfo/rpm-maint

Reply via email to