> On Jun 6, 2018, at 12:52 PM, David Benjamin <[email protected]> wrote:
> 
> Oh, I didn't realize that document existed. Although it doesn't say that it 
> is overriding the BMPString restrictions. It says it "does not add any 
> further restrictions to the input passwords of these methods, however it is 
> RECOMMENDED to use (big-endian) UTF-16 NFC form". That reads to me as saying 
> you should use UTF-16 NFC form, but only the subset that still satisfies the 
> existing BMPString restrictions. It even recommends that "applications which 
> restricted the MacData password to BMPString set" fail in some cases.
> 
> If the intent was otherwise, probably worth some rewording.

The point is that instead of failing we should use UTF-16 for non-BMP code 
points.
Worst case we'll still fail.  We can document a warning that passwords outside
the BMP are non-portable.  The responsibility for ensuring NFC form will be 
placed
on the application feeding us the UTF-8 data.  We should just convert from 
UTF-8 to
UTF-16.

I don't read the draft as forbidding non-BMP UTF-16.  The two agree on the UCS-2
subset of UTF-16 (i.e. the BMP code points).  If the intent is to forbind 
non-BMP
passwords, we should ask the authors to change that, with a portability warning.
Such passwords might not work everywhere, but forbidding them is unwise.

-- 
        Viktor.

_______________________________________________
openssl-project mailing list
[email protected]
https://mta.openssl.org/mailman/listinfo/openssl-project

Reply via email to