| < draft-moriarty-pkcs12v1-1-04.txt | draft-moriarty-pkcs12v1-1-05.txt > | |||
|---|---|---|---|---|
| Network Working Group K. Moriarty, Ed. | Network Working Group K. Moriarty, Ed. | |||
| Internet-Draft EMC | Internet-Draft EMC | |||
| Intended status: Informational M. Nystrom | Intended status: Informational M. Nystrom | |||
| Expires: July 21, 2014 Microsoft Corporation | Expires: November 9, 2014 Microsoft Corporation | |||
| S. Parkinson | S. Parkinson | |||
| A. Rusch | A. Rusch | |||
| M. Scott | M. Scott | |||
| RSA | RSA | |||
| January 17, 2014 | May 8, 2014 | |||
| PKCS #12: Personal Information Exchange Syntax v1.1 | PKCS #12: Personal Information Exchange Syntax v1.1 | |||
| draft-moriarty-pkcs12v1-1-04.txt | draft-moriarty-pkcs12v1-1-05.txt | |||
| Abstract | Abstract | |||
| This document represents a republication of PKCS #12 v1.1 | ||||
| (Republication) from RSA Laboratories' Public Key Cryptography | ||||
| Standard (PKCS) series. Change control is transferred to the IETF, | ||||
| and generally all rights in the copyright are hereby assigned from | ||||
| RSA to IETF, except that RSA reserves the internal right to continue | ||||
| publishing, with the right to modify, and distributing the | ||||
| Republication and its predecessors internally to RSA and its parent | ||||
| company EMC, including the right to make modifications to the | ||||
| Republication and its predecessors (the "RSA Internal Right"). For | ||||
| avoidance of doubt, RSA's Internal Right includes the right to post | ||||
| on its public website for use by other parties. The body of this | ||||
| document, except for the security considerations section, is taken | ||||
| directly from the PKCS #12 v1.1 specification. The list of | ||||
| references and the in-line cites have been updated or added where | ||||
| appropriate to cite the most current documents in addition to those | ||||
| current at the original publication of PKCS #12 v1.1. | ||||
| PKCS #12 v1.1 describes a transfer syntax for personal identity | PKCS #12 v1.1 describes a transfer syntax for personal identity | |||
| information, including private keys, certificates, miscellaneous | information, including private keys, certificates, miscellaneous | |||
| secrets, and extensions. Machines, applications, browsers, Internet | secrets, and extensions. Machines, applications, browsers, Internet | |||
| kiosks, and so on, that support this standard will allow a user to | kiosks, and so on, that support this standard will allow a user to | |||
| import, export, and exercise a single set of personal identity | import, export, and exercise a single set of personal identity | |||
| information. This standard supports direct transfer of personal | information. This standard supports direct transfer of personal | |||
| information under several privacy and integrity modes. | information under several privacy and integrity modes. | |||
| This document represents a republication of PKCS #12 v1.1 from RSA | ||||
| Laboratories' Public Key Cryptography Standard (PKCS) series. By | ||||
| publishing this RFC, change control is transferred to the IETF. | ||||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on July 21, 2014. | This Internet-Draft will expire on November 9, 2014. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2014 IETF Trust and the persons identified as the | Copyright (c) 2014 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 4, line 7 ¶ | skipping to change at page 4, line 7 ¶ | |||
| B.4. Keys for password integrity mode . . . . . . . . . . . . . 22 | B.4. Keys for password integrity mode . . . . . . . . . . . . . 22 | |||
| Appendix C. Keys and IVs for password privacy mode . . . . . . . 23 | Appendix C. Keys and IVs for password privacy mode . . . . . . . 23 | |||
| Appendix D. ASN.1 module . . . . . . . . . . . . . . . . . . . . 24 | Appendix D. ASN.1 module . . . . . . . . . . . . . . . . . . . . 24 | |||
| Appendix E. Intellectual property considerations . . . . . . . . 28 | Appendix E. Intellectual property considerations . . . . . . . . 28 | |||
| Appendix F. Acknowledgments . . . . . . . . . . . . . . . . . . . 29 | Appendix F. Acknowledgments . . . . . . . . . . . . . . . . . . . 29 | |||
| Appendix G. About PKCS . . . . . . . . . . . . . . . . . . . . . 29 | Appendix G. About PKCS . . . . . . . . . . . . . . . . . . . . . 29 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29 | |||
| 1. Introduction | 1. Introduction | |||
| This document represents a republication of PKCS #12 v1.1 from RSA | ||||
| Laboratories' Public Key Cryptography Standard (PKCS) series. By | ||||
| publishing this RFC, change control is transferred to the IETF. RSA | ||||
| and its parent company EMC reserves the right to continue publishing | ||||
| and distributing PKCS #12 v1.1 and its predecessors. | ||||
| The body of this document, except for the security considerations | ||||
| section, is taken directly from the PKCS #12 v1.1 specification. The | ||||
| list of references and the in-line cites have been updated or added | ||||
| where appropriate to cite the most current documents in addition to | ||||
| those current at the original publication of PKCS #12 v1.1. | ||||
| This standard describes a transfer syntax for personal identity | This standard describes a transfer syntax for personal identity | |||
| information, including private keys, certificates, miscellaneous | information, including private keys, certificates, miscellaneous | |||
| secrets, and extensions. Machines, applications, browsers, Internet | secrets, and extensions. Machines, applications, browsers, Internet | |||
| kiosks, and so on, that support this standard will allow a user to | kiosks, and so on, that support this standard will allow a user to | |||
| import, export, and exercise a single set of personal identity | import, export, and exercise a single set of personal identity | |||
| information. | information. | |||
| This standard supports direct transfer of personal information under | This standard supports direct transfer of personal information under | |||
| several privacy and integrity modes. The most secure of the privacy | several privacy and integrity modes. The most secure of the privacy | |||
| and integrity modes require the source and destination platforms to | and integrity modes require the source and destination platforms to | |||
| End of changes. 7 change blocks. | ||||
| 21 lines changed or deleted | 20 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||