draft-ietf-keyprov-symmetrickeyformat-04.txt   draft-ietf-keyprov-symmetrickeyformat-05.txt 
KEYPROV Working Group Sean Turner, IECA KEYPROV Working Group Sean Turner, IECA
Internet Draft Russ Housley, Vigil Security Internet Draft Russ Housley, Vigil Security
Intended Status: Standard Track January 16, 2009 Intended Status: Standard Track July 10, 2009
Expires: July 16, 2009 Expires: January 10, 2010
Symmetric Key Package Content Type Symmetric Key Package Content Type
draft-ietf-keyprov-symmetrickeyformat-04.txt draft-ietf-keyprov-symmetrickeyformat-05.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 31 skipping to change at page 1, line 31
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on July 16, 2009. This Internet-Draft will expire on January 10, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents in effect on the date of
(http://trustee.ietf.org/license-info) in effect on the date of publication of this document (http://trustee.ietf.org/license-info).
publication of this document. Please review these documents Please review these documents carefully, as they describe your rights
carefully, as they describe your rights and restrictions with respect and restrictions with respect to this document.
to this document.
Abstract Abstract
This document defines the symmetric key format content type. It is This document defines the symmetric key format content type. It is
transport independent. The Cryptographic Message Syntax can be used transport independent. The Cryptographic Message Syntax can be used
to digitally sign, digest, authenticate, or encrypt this content to digitally sign, digest, authenticate, or encrypt this content
type. type.
Table of Contents Table of Contents
skipping to change at page 4, line 49 skipping to change at page 4, line 49
Parameterization of ASN.1 Specifications. Parameterization of ASN.1 Specifications.
[X.690] ITU-T Recommendation X.690 (2002) | ISO/IEC 8825-1:2002. [X.690] ITU-T Recommendation X.690 (2002) | ISO/IEC 8825-1:2002.
Information Technology - ASN.1 encoding rules: Specification of Basic Information Technology - ASN.1 encoding rules: Specification of Basic
Encoding Rules (BER), Canonical Encoding Rules (CER) and Encoding Rules (BER), Canonical Encoding Rules (CER) and
Distinguished Encoding Rules (DER). Distinguished Encoding Rules (DER).
5.2. Non-Normative References 5.2. Non-Normative References
[PSKC] Hoyer, P., Pei, M., and S. Machani, "Portable Symmetric Key [PSKC] Hoyer, P., Pei, M., and S. Machani, "Portable Symmetric Key
Container (PSKC), draft-ietf-keyprov-pskc-00.txt, work-in-progress. Container (PSKC), draft-ietf-keyprov-pskc-03.txt, work-in-progress.
[RFC3852] Housley, R., "Cryptographic Message Syntax (CMS)", RFC3852, [RFC3852] Housley, R., "Cryptographic Message Syntax (CMS)", RFC3852,
July 2004. July 2004.
APPENDIX A: ASN.1 Module APPENDIX A: ASN.1 Module
This appendix provides the normative ASN.1 definitions for the This appendix provides the normative ASN.1 definitions for the
structures described in this specification using ASN.1 as defined in structures described in this specification using ASN.1 as defined in
[X.680] through [X.683]. [X.680] through [X.683].
 End of changes. 5 change blocks. 
10 lines changed or deleted 9 lines changed or added

This html diff was produced by rfcdiff 1.35. The latest version is available from http://tools.ietf.org/tools/rfcdiff/