Skip to content

Commit e7d1163

Browse files
author
ID Bot
committed
Script updating gh-pages from cdda1d6. [ci skip]
1 parent ab6ba8e commit e7d1163

File tree

2 files changed

+18
-3
lines changed

2 files changed

+18
-3
lines changed

draft-ietf-cose-cbor-encoded-cert.html

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6665,7 +6665,7 @@ <h3 id="name-coap-content-formats-regist">
66656665
<h3 id="name-tls-certificate-types-regis">
66666666
<a href="#section-9.17" class="section-number selfRef">9.17. </a><a href="#name-tls-certificate-types-regis" class="section-name selfRef">TLS Certificate Types Registry</a>
66676667
</h3>
6668-
<p id="section-9.17-1">This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <span>[<a href="#RFC8879" class="cite xref">RFC8879</a>]</span>. C509 is defined in the same way as as X.509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate).<a href="#section-9.17-1" class="pilcrow"></a></p>
6668+
<p id="section-9.17-1">This document registers the following entry in the "TLS Certificate Types" registry under the "Transport Layer Security (TLS) Extensions" heading. The new certificate type can be used with additional TLS certificate compression <span>[<a href="#RFC8879" class="cite xref">RFC8879</a>]</span>. C509 is defined in the same way as as X.509, but uses a different value and instead of DER-encoded X.509 certificate, opaque cert_data&lt;1..2^24-1&gt; in TLS 1.3 and opaque ASN.1Cert&lt;1..2^24-1&gt; in TLS 1.2 contains a the CBOR sequence ~C509Certificate (an unwrapped C509Certificate). Similar to COSE_C509, the TLS handshake contains the length of each certificate. The TLS extensions client_certificate_type and server_certificate_type <span>[<a href="#RFC7250" class="cite xref">RFC7250</a>]</span> are used to negotiate the use of C509.<a href="#section-9.17-1" class="pilcrow"></a></p>
66696669
<div id="section-9.17-2">
66706670
<div class="alignLeft art-svg artwork" id="section-9.17-2.1">
66716671
<svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="112" width="560" viewBox="0 0 560 112" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
@@ -6821,6 +6821,10 @@ <h3 id="name-normative-references">
68216821
<dd>
68226822
<span class="refAuthor">Cotton, M.</span>, <span class="refTitle">"Early IANA Allocation of Standards Track Code Points"</span>, <span class="seriesInfo">BCP 100</span>, <span class="seriesInfo">RFC 7120</span>, <span class="seriesInfo">DOI 10.17487/RFC7120</span>, <time datetime="2014-01" class="refDate">January 2014</time>, <span>&lt;<a href="https://www.rfc-editor.org/rfc/rfc7120">https://www.rfc-editor.org/rfc/rfc7120</a>&gt;</span>. </dd>
68236823
<dd class="break"></dd>
6824+
<dt id="RFC7250">[RFC7250]</dt>
6825+
<dd>
6826+
<span class="refAuthor">Wouters, P., Ed.</span>, <span class="refAuthor">Tschofenig, H., Ed.</span>, <span class="refAuthor">Gilmore, J.</span>, <span class="refAuthor">Weiler, S.</span>, and <span class="refAuthor">T. Kivinen</span>, <span class="refTitle">"Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)"</span>, <span class="seriesInfo">RFC 7250</span>, <span class="seriesInfo">DOI 10.17487/RFC7250</span>, <time datetime="2014-06" class="refDate">June 2014</time>, <span>&lt;<a href="https://www.rfc-editor.org/rfc/rfc7250">https://www.rfc-editor.org/rfc/rfc7250</a>&gt;</span>. </dd>
6827+
<dd class="break"></dd>
68246828
<dt id="RFC8126">[RFC8126]</dt>
68256829
<dd>
68266830
<span class="refAuthor">Cotton, M.</span>, <span class="refAuthor">Leiba, B.</span>, and <span class="refAuthor">T. Narten</span>, <span class="refTitle">"Guidelines for Writing an IANA Considerations Section in RFCs"</span>, <span class="seriesInfo">BCP 26</span>, <span class="seriesInfo">RFC 8126</span>, <span class="seriesInfo">DOI 10.17487/RFC8126</span>, <time datetime="2017-06" class="refDate">June 2017</time>, <span>&lt;<a href="https://www.rfc-editor.org/rfc/rfc8126">https://www.rfc-editor.org/rfc/rfc8126</a>&gt;</span>. </dd>

draft-ietf-cose-cbor-encoded-cert.txt

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2924,8 +2924,13 @@ Table of Contents
29242924
heading. The new certificate type can be used with additional TLS
29252925
certificate compression [RFC8879]. C509 is defined in the same way
29262926
as as X.509, but uses a different value and instead of DER-encoded
2927-
X.509 certificate, opaque cert_data<1..2^24-1> contains a the CBOR
2928-
sequence ~C509Certificate (an unwrapped C509Certificate).
2927+
X.509 certificate, opaque cert_data<1..2^24-1> in TLS 1.3 and opaque
2928+
ASN.1Cert<1..2^24-1> in TLS 1.2 contains a the CBOR sequence
2929+
~C509Certificate (an unwrapped C509Certificate). Similar to
2930+
COSE_C509, the TLS handshake contains the length of each certificate.
2931+
The TLS extensions client_certificate_type and
2932+
server_certificate_type [RFC7250] are used to negotiate the use of
2933+
C509.
29292934

29302935
+-------+------------------+-------------+--------------------------+
29312936
| Value | Name | Recommended | Comment |
@@ -3021,6 +3026,12 @@ Table of Contents
30213026
Points", BCP 100, RFC 7120, DOI 10.17487/RFC7120, January
30223027
2014, <https://www.rfc-editor.org/rfc/rfc7120>.
30233028

3029+
[RFC7250] Wouters, P., Ed., Tschofenig, H., Ed., Gilmore, J.,
3030+
Weiler, S., and T. Kivinen, "Using Raw Public Keys in
3031+
Transport Layer Security (TLS) and Datagram Transport
3032+
Layer Security (DTLS)", RFC 7250, DOI 10.17487/RFC7250,
3033+
June 2014, <https://www.rfc-editor.org/rfc/rfc7250>.
3034+
30243035
[RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
30253036
Writing an IANA Considerations Section in RFCs", BCP 26,
30263037
RFC 8126, DOI 10.17487/RFC8126, June 2017,

0 commit comments

Comments
 (0)