diff options
Diffstat (limited to 'src/lib/libssl/doc/standards.txt')
-rw-r--r-- | src/lib/libssl/doc/standards.txt | 285 |
1 files changed, 0 insertions, 285 deletions
diff --git a/src/lib/libssl/doc/standards.txt b/src/lib/libssl/doc/standards.txt deleted file mode 100644 index 7bada8d35f..0000000000 --- a/src/lib/libssl/doc/standards.txt +++ /dev/null | |||
@@ -1,285 +0,0 @@ | |||
1 | Standards related to OpenSSL | ||
2 | ============================ | ||
3 | |||
4 | [Please, this is currently a draft. I made a first try at finding | ||
5 | documents that describe parts of what OpenSSL implements. There are | ||
6 | big gaps, and I've most certainly done something wrong. Please | ||
7 | correct whatever is... Also, this note should be removed when this | ||
8 | file is reaching a somewhat correct state. -- Richard Levitte] | ||
9 | |||
10 | |||
11 | All pointers in here will be either URL's or blobs of text borrowed | ||
12 | from miscellaneous indexes, like rfc-index.txt (index of RFCs), | ||
13 | 1id-index.txt (index of Internet drafts) and the like. | ||
14 | |||
15 | To find the latest possible RFCs, it's recommended to either browse | ||
16 | ftp://ftp.isi.edu/in-notes/ or go to http://www.rfc-editor.org/ and | ||
17 | use the search mechanism found there. | ||
18 | To find the latest possible Internet drafts, it's recommended to | ||
19 | browse ftp://ftp.isi.edu/internet-drafts/. | ||
20 | To find the latest possible PKCS, it's recommended to browse | ||
21 | http://www.rsasecurity.com/rsalabs/pkcs/. | ||
22 | |||
23 | |||
24 | Implemented: | ||
25 | ------------ | ||
26 | |||
27 | These are documents that describe things that are implemented (in | ||
28 | whole or at least great parts) in OpenSSL. | ||
29 | |||
30 | 1319 The MD2 Message-Digest Algorithm. B. Kaliski. April 1992. | ||
31 | (Format: TXT=25661 bytes) (Status: INFORMATIONAL) | ||
32 | |||
33 | 1320 The MD4 Message-Digest Algorithm. R. Rivest. April 1992. (Format: | ||
34 | TXT=32407 bytes) (Status: INFORMATIONAL) | ||
35 | |||
36 | 1321 The MD5 Message-Digest Algorithm. R. Rivest. April 1992. (Format: | ||
37 | TXT=35222 bytes) (Status: INFORMATIONAL) | ||
38 | |||
39 | 2246 The TLS Protocol Version 1.0. T. Dierks, C. Allen. January 1999. | ||
40 | (Format: TXT=170401 bytes) (Status: PROPOSED STANDARD) | ||
41 | |||
42 | 2268 A Description of the RC2(r) Encryption Algorithm. R. Rivest. | ||
43 | January 1998. (Format: TXT=19048 bytes) (Status: INFORMATIONAL) | ||
44 | |||
45 | 2315 PKCS 7: Cryptographic Message Syntax Version 1.5. B. Kaliski. | ||
46 | March 1998. (Format: TXT=69679 bytes) (Status: INFORMATIONAL) | ||
47 | |||
48 | PKCS#8: Private-Key Information Syntax Standard | ||
49 | |||
50 | PKCS#12: Personal Information Exchange Syntax Standard, version 1.0. | ||
51 | |||
52 | 2560 X.509 Internet Public Key Infrastructure Online Certificate | ||
53 | Status Protocol - OCSP. M. Myers, R. Ankney, A. Malpani, S. Galperin, | ||
54 | C. Adams. June 1999. (Format: TXT=43243 bytes) (Status: PROPOSED | ||
55 | STANDARD) | ||
56 | |||
57 | 2712 Addition of Kerberos Cipher Suites to Transport Layer Security | ||
58 | (TLS). A. Medvinsky, M. Hur. October 1999. (Format: TXT=13763 bytes) | ||
59 | (Status: PROPOSED STANDARD) | ||
60 | |||
61 | 2898 PKCS #5: Password-Based Cryptography Specification Version 2.0. | ||
62 | B. Kaliski. September 2000. (Format: TXT=68692 bytes) (Status: | ||
63 | INFORMATIONAL) | ||
64 | |||
65 | 2986 PKCS #10: Certification Request Syntax Specification Version 1.7. | ||
66 | M. Nystrom, B. Kaliski. November 2000. (Format: TXT=27794 bytes) | ||
67 | (Obsoletes RFC2314) (Status: INFORMATIONAL) | ||
68 | |||
69 | 3174 US Secure Hash Algorithm 1 (SHA1). D. Eastlake 3rd, P. Jones. | ||
70 | September 2001. (Format: TXT=35525 bytes) (Status: INFORMATIONAL) | ||
71 | |||
72 | 3161 Internet X.509 Public Key Infrastructure, Time-Stamp Protocol (TSP) | ||
73 | C. Adams, P. Cain, D. Pinkas, R. Zuccherato. August 2001 | ||
74 | (Status: PROPOSED STANDARD) | ||
75 | |||
76 | 3268 Advanced Encryption Standard (AES) Ciphersuites for Transport | ||
77 | Layer Security (TLS). P. Chown. June 2002. (Format: TXT=13530 bytes) | ||
78 | (Status: PROPOSED STANDARD) | ||
79 | |||
80 | 3279 Algorithms and Identifiers for the Internet X.509 Public Key | ||
81 | Infrastructure Certificate and Certificate Revocation List (CRL) | ||
82 | Profile. L. Bassham, W. Polk, R. Housley. April 2002. (Format: | ||
83 | TXT=53833 bytes) (Status: PROPOSED STANDARD) | ||
84 | |||
85 | 3280 Internet X.509 Public Key Infrastructure Certificate and | ||
86 | Certificate Revocation List (CRL) Profile. R. Housley, W. Polk, W. | ||
87 | Ford, D. Solo. April 2002. (Format: TXT=295556 bytes) (Obsoletes | ||
88 | RFC2459) (Status: PROPOSED STANDARD) | ||
89 | |||
90 | 3447 Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography | ||
91 | Specifications Version 2.1. J. Jonsson, B. Kaliski. February 2003. | ||
92 | (Format: TXT=143173 bytes) (Obsoletes RFC2437) (Status: | ||
93 | INFORMATIONAL) | ||
94 | |||
95 | 3713 A Description of the Camellia Encryption Algorithm. M. Matsui, | ||
96 | J. Nakajima, S. Moriai. April 2004. (Format: TXT=25031 bytes) | ||
97 | (Status: INFORMATIONAL) | ||
98 | |||
99 | 3820 Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate | ||
100 | Profile. S. Tuecke, V. Welch, D. Engert, L. Pearlman, M. Thompson. | ||
101 | June 2004. (Format: TXT=86374 bytes) (Status: PROPOSED STANDARD) | ||
102 | |||
103 | 4132 Addition of Camellia Cipher Suites to Transport Layer Security | ||
104 | (TLS). S. Moriai, A. Kato, M. Kanda. July 2005. (Format: TXT=13590 | ||
105 | bytes) (Status: PROPOSED STANDARD) | ||
106 | |||
107 | 4162 Addition of SEED Cipher Suites to Transport Layer Security (TLS). | ||
108 | H.J. Lee, J.H. Yoon, J.I. Lee. August 2005. (Format: TXT=10578 bytes) | ||
109 | (Status: PROPOSED STANDARD) | ||
110 | |||
111 | 4269 The SEED Encryption Algorithm. H.J. Lee, S.J. Lee, J.H. Yoon, | ||
112 | D.H. Cheon, J.I. Lee. December 2005. (Format: TXT=34390 bytes) | ||
113 | (Obsoletes RFC4009) (Status: INFORMATIONAL) | ||
114 | |||
115 | |||
116 | Related: | ||
117 | -------- | ||
118 | |||
119 | These are documents that are close to OpenSSL, for example the | ||
120 | STARTTLS documents. | ||
121 | |||
122 | 1421 Privacy Enhancement for Internet Electronic Mail: Part I: Message | ||
123 | Encryption and Authentication Procedures. J. Linn. February 1993. | ||
124 | (Format: TXT=103894 bytes) (Obsoletes RFC1113) (Status: PROPOSED | ||
125 | STANDARD) | ||
126 | |||
127 | 1422 Privacy Enhancement for Internet Electronic Mail: Part II: | ||
128 | Certificate-Based Key Management. S. Kent. February 1993. (Format: | ||
129 | TXT=86085 bytes) (Obsoletes RFC1114) (Status: PROPOSED STANDARD) | ||
130 | |||
131 | 1423 Privacy Enhancement for Internet Electronic Mail: Part III: | ||
132 | Algorithms, Modes, and Identifiers. D. Balenson. February 1993. | ||
133 | (Format: TXT=33277 bytes) (Obsoletes RFC1115) (Status: PROPOSED | ||
134 | STANDARD) | ||
135 | |||
136 | 1424 Privacy Enhancement for Internet Electronic Mail: Part IV: Key | ||
137 | Certification and Related Services. B. Kaliski. February 1993. | ||
138 | (Format: TXT=17537 bytes) (Status: PROPOSED STANDARD) | ||
139 | |||
140 | 2025 The Simple Public-Key GSS-API Mechanism (SPKM). C. Adams. October | ||
141 | 1996. (Format: TXT=101692 bytes) (Status: PROPOSED STANDARD) | ||
142 | |||
143 | 2510 Internet X.509 Public Key Infrastructure Certificate Management | ||
144 | Protocols. C. Adams, S. Farrell. March 1999. (Format: TXT=158178 | ||
145 | bytes) (Status: PROPOSED STANDARD) | ||
146 | |||
147 | 2511 Internet X.509 Certificate Request Message Format. M. Myers, C. | ||
148 | Adams, D. Solo, D. Kemp. March 1999. (Format: TXT=48278 bytes) | ||
149 | (Status: PROPOSED STANDARD) | ||
150 | |||
151 | 2527 Internet X.509 Public Key Infrastructure Certificate Policy and | ||
152 | Certification Practices Framework. S. Chokhani, W. Ford. March 1999. | ||
153 | (Format: TXT=91860 bytes) (Status: INFORMATIONAL) | ||
154 | |||
155 | 2538 Storing Certificates in the Domain Name System (DNS). D. Eastlake | ||
156 | 3rd, O. Gudmundsson. March 1999. (Format: TXT=19857 bytes) (Status: | ||
157 | PROPOSED STANDARD) | ||
158 | |||
159 | 2539 Storage of Diffie-Hellman Keys in the Domain Name System (DNS). | ||
160 | D. Eastlake 3rd. March 1999. (Format: TXT=21049 bytes) (Status: | ||
161 | PROPOSED STANDARD) | ||
162 | |||
163 | 2559 Internet X.509 Public Key Infrastructure Operational Protocols - | ||
164 | LDAPv2. S. Boeyen, T. Howes, P. Richard. April 1999. (Format: | ||
165 | TXT=22889 bytes) (Updates RFC1778) (Status: PROPOSED STANDARD) | ||
166 | |||
167 | 2585 Internet X.509 Public Key Infrastructure Operational Protocols: | ||
168 | FTP and HTTP. R. Housley, P. Hoffman. May 1999. (Format: TXT=14813 | ||
169 | bytes) (Status: PROPOSED STANDARD) | ||
170 | |||
171 | 2587 Internet X.509 Public Key Infrastructure LDAPv2 Schema. S. | ||
172 | Boeyen, T. Howes, P. Richard. June 1999. (Format: TXT=15102 bytes) | ||
173 | (Status: PROPOSED STANDARD) | ||
174 | |||
175 | 2595 Using TLS with IMAP, POP3 and ACAP. C. Newman. June 1999. | ||
176 | (Format: TXT=32440 bytes) (Status: PROPOSED STANDARD) | ||
177 | |||
178 | 2631 Diffie-Hellman Key Agreement Method. E. Rescorla. June 1999. | ||
179 | (Format: TXT=25932 bytes) (Status: PROPOSED STANDARD) | ||
180 | |||
181 | 2632 S/MIME Version 3 Certificate Handling. B. Ramsdell, Ed.. June | ||
182 | 1999. (Format: TXT=27925 bytes) (Status: PROPOSED STANDARD) | ||
183 | |||
184 | 2716 PPP EAP TLS Authentication Protocol. B. Aboba, D. Simon. October | ||
185 | 1999. (Format: TXT=50108 bytes) (Status: EXPERIMENTAL) | ||
186 | |||
187 | 2773 Encryption using KEA and SKIPJACK. R. Housley, P. Yee, W. Nace. | ||
188 | February 2000. (Format: TXT=20008 bytes) (Updates RFC0959) (Status: | ||
189 | EXPERIMENTAL) | ||
190 | |||
191 | 2797 Certificate Management Messages over CMS. M. Myers, X. Liu, J. | ||
192 | Schaad, J. Weinstein. April 2000. (Format: TXT=103357 bytes) (Status: | ||
193 | PROPOSED STANDARD) | ||
194 | |||
195 | 2817 Upgrading to TLS Within HTTP/1.1. R. Khare, S. Lawrence. May | ||
196 | 2000. (Format: TXT=27598 bytes) (Updates RFC2616) (Status: PROPOSED | ||
197 | STANDARD) | ||
198 | |||
199 | 2818 HTTP Over TLS. E. Rescorla. May 2000. (Format: TXT=15170 bytes) | ||
200 | (Status: INFORMATIONAL) | ||
201 | |||
202 | 2876 Use of the KEA and SKIPJACK Algorithms in CMS. J. Pawling. July | ||
203 | 2000. (Format: TXT=29265 bytes) (Status: INFORMATIONAL) | ||
204 | |||
205 | 2984 Use of the CAST-128 Encryption Algorithm in CMS. C. Adams. | ||
206 | October 2000. (Format: TXT=11591 bytes) (Status: PROPOSED STANDARD) | ||
207 | |||
208 | 2985 PKCS #9: Selected Object Classes and Attribute Types Version 2.0. | ||
209 | M. Nystrom, B. Kaliski. November 2000. (Format: TXT=70703 bytes) | ||
210 | (Status: INFORMATIONAL) | ||
211 | |||
212 | 3029 Internet X.509 Public Key Infrastructure Data Validation and | ||
213 | Certification Server Protocols. C. Adams, P. Sylvester, M. Zolotarev, | ||
214 | R. Zuccherato. February 2001. (Format: TXT=107347 bytes) (Status: | ||
215 | EXPERIMENTAL) | ||
216 | |||
217 | 3039 Internet X.509 Public Key Infrastructure Qualified Certificates | ||
218 | Profile. S. Santesson, W. Polk, P. Barzin, M. Nystrom. January 2001. | ||
219 | (Format: TXT=67619 bytes) (Status: PROPOSED STANDARD) | ||
220 | |||
221 | 3058 Use of the IDEA Encryption Algorithm in CMS. S. Teiwes, P. | ||
222 | Hartmann, D. Kuenzi. February 2001. (Format: TXT=17257 bytes) | ||
223 | (Status: INFORMATIONAL) | ||
224 | |||
225 | 3161 Internet X.509 Public Key Infrastructure Time-Stamp Protocol | ||
226 | (TSP). C. Adams, P. Cain, D. Pinkas, R. Zuccherato. August 2001. | ||
227 | (Format: TXT=54585 bytes) (Status: PROPOSED STANDARD) | ||
228 | |||
229 | 3185 Reuse of CMS Content Encryption Keys. S. Farrell, S. Turner. | ||
230 | October 2001. (Format: TXT=20404 bytes) (Status: PROPOSED STANDARD) | ||
231 | |||
232 | 3207 SMTP Service Extension for Secure SMTP over Transport Layer | ||
233 | Security. P. Hoffman. February 2002. (Format: TXT=18679 bytes) | ||
234 | (Obsoletes RFC2487) (Status: PROPOSED STANDARD) | ||
235 | |||
236 | 3217 Triple-DES and RC2 Key Wrapping. R. Housley. December 2001. | ||
237 | (Format: TXT=19855 bytes) (Status: INFORMATIONAL) | ||
238 | |||
239 | 3274 Compressed Data Content Type for Cryptographic Message Syntax | ||
240 | (CMS). P. Gutmann. June 2002. (Format: TXT=11276 bytes) (Status: | ||
241 | PROPOSED STANDARD) | ||
242 | |||
243 | 3278 Use of Elliptic Curve Cryptography (ECC) Algorithms in | ||
244 | Cryptographic Message Syntax (CMS). S. Blake-Wilson, D. Brown, P. | ||
245 | Lambert. April 2002. (Format: TXT=33779 bytes) (Status: | ||
246 | INFORMATIONAL) | ||
247 | |||
248 | 3281 An Internet Attribute Certificate Profile for Authorization. S. | ||
249 | Farrell, R. Housley. April 2002. (Format: TXT=90580 bytes) (Status: | ||
250 | PROPOSED STANDARD) | ||
251 | |||
252 | 3369 Cryptographic Message Syntax (CMS). R. Housley. August 2002. | ||
253 | (Format: TXT=113975 bytes) (Obsoletes RFC2630, RFC3211) (Status: | ||
254 | PROPOSED STANDARD) | ||
255 | |||
256 | 3370 Cryptographic Message Syntax (CMS) Algorithms. R. Housley. August | ||
257 | 2002. (Format: TXT=51001 bytes) (Obsoletes RFC2630, RFC3211) (Status: | ||
258 | PROPOSED STANDARD) | ||
259 | |||
260 | 3377 Lightweight Directory Access Protocol (v3): Technical | ||
261 | Specification. J. Hodges, R. Morgan. September 2002. (Format: | ||
262 | TXT=9981 bytes) (Updates RFC2251, RFC2252, RFC2253, RFC2254, RFC2255, | ||
263 | RFC2256, RFC2829, RFC2830) (Status: PROPOSED STANDARD) | ||
264 | |||
265 | 3394 Advanced Encryption Standard (AES) Key Wrap Algorithm. J. Schaad, | ||
266 | R. Housley. September 2002. (Format: TXT=73072 bytes) (Status: | ||
267 | INFORMATIONAL) | ||
268 | |||
269 | 3436 Transport Layer Security over Stream Control Transmission | ||
270 | Protocol. A. Jungmaier, E. Rescorla, M. Tuexen. December 2002. | ||
271 | (Format: TXT=16333 bytes) (Status: PROPOSED STANDARD) | ||
272 | |||
273 | 3657 Use of the Camellia Encryption Algorithm in Cryptographic | ||
274 | Message Syntax (CMS). S. Moriai, A. Kato. January 2004. | ||
275 | (Format: TXT=26282 bytes) (Status: PROPOSED STANDARD) | ||
276 | |||
277 | "Securing FTP with TLS", 01/27/2000, <draft-murray-auth-ftp-ssl-05.txt> | ||
278 | |||
279 | |||
280 | To be implemented: | ||
281 | ------------------ | ||
282 | |||
283 | These are documents that describe things that are planed to be | ||
284 | implemented in the hopefully short future. | ||
285 | |||