References from draft-ietf-netconf-crypto-types

This is an experimental product. These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 14 Key words for use in RFCs to Indicate Requirement Levels
Refs Ref'd by
Best Current Practice normatively references
BCP 215 YANG Tree Diagrams
Refs Ref'd by
Best Current Practice informatively references
draft-ietf-netconf-keystore YANG Data Model for a Centralized Keystore Mechanism
Refs Ref'd by
informatively references
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels
Refs Ref'd by
Best Current Practice normatively references
RFC 2404 The Use of HMAC-SHA-1-96 within ESP and AH
Refs Ref'd by
Proposed Standard normatively references
RFC 2986 PKCS #10: Certification Request Syntax Specification Version 1.7
Refs Ref'd by
Informational normatively references
RFC 3174 US Secure Hash Algorithm 1 (SHA1)
Refs Ref'd by
Informational normatively references
RFC 3565 Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS)
Refs Ref'd by
Proposed Standard normatively references
RFC 3686 Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP)
Refs Ref'd by
Proposed Standard normatively references
RFC 3688 The IETF XML Registry
Refs Ref'd by
Best Current Practice informatively references
RFC 4106 The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)
Refs Ref'd by
Proposed Standard normatively references
RFC 4211 Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)
Refs Ref'd by
Proposed Standard informatively references
RFC 4253 The Secure Shell (SSH) Transport Layer Protocol
Refs Ref'd by
Proposed Standard normatively references
RFC 4279 Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)
Refs Ref'd by
Proposed Standard normatively references
RFC 4309 Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP)
Refs Ref'd by
Proposed Standard normatively references
RFC 4493 The AES-CMAC Algorithm
Refs Ref'd by
Informational normatively references
RFC 4494 The AES-CMAC-96 Algorithm and Its Use with IPsec
Refs Ref'd by
Proposed Standard normatively references
RFC 4543 The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH
Refs Ref'd by
Proposed Standard normatively references
RFC 4868 Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
Refs Ref'd by
Proposed Standard normatively references
RFC 5056 On the Use of Channel Bindings to Secure Channels
Refs Ref'd by
Proposed Standard informatively references
RFC 5280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
Refs Ref'd by
Proposed Standard normatively references
RFC 5652 Cryptographic Message Syntax (CMS)
Refs Ref'd by
Internet Standard normatively references
RFC 5656 Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
Refs Ref'd by
Proposed Standard normatively references
RFC 5915 Elliptic Curve Private Key Structure
Refs Ref'd by
Informational normatively references
RFC 6020 YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)
Refs Ref'd by
Proposed Standard informatively references
RFC 6125 Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)
Refs Ref'd by
Proposed Standard informatively references
RFC 6187 X.509v3 Certificates for Secure Shell Authentication
Refs Ref'd by
Proposed Standard normatively references
RFC 6234 US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
Refs Ref'd by
Informational normatively references
RFC 6239 Suite B Cryptographic Suites for Secure Shell (SSH)
Refs Ref'd by
Historic normatively references
RFC 6507 Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI)
Refs Ref'd by
Informational normatively references
RFC 6991 Common YANG Data Types
Refs Ref'd by
Proposed Standard normatively references
RFC 7539 ChaCha20 and Poly1305 for IETF Protocols
Refs Ref'd by
Informational normatively references
RFC 7919 Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)
Refs Ref'd by
Proposed Standard normatively references
RFC 7950 The YANG 1.1 Data Modeling Language
Refs Ref'd by
Proposed Standard normatively references
RFC 8017 PKCS #1: RSA Cryptography Specifications Version 2.2
Refs Ref'd by
Informational normatively references
RFC 8032 Edwards-Curve Digital Signature Algorithm (EdDSA)
Refs Ref'd by
Informational normatively references
RFC 8174 Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
Refs Ref'd by
Best Current Practice normatively references
RFC 8268 More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH)
Refs Ref'd by
Proposed Standard normatively references
RFC 8332 Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol
Refs Ref'd by
Proposed Standard normatively references
RFC 8340 YANG Tree Diagrams
Refs Ref'd by
Best Current Practice informatively references
RFC 8341 Network Configuration Access Control Model
Refs Ref'd by
Internet Standard normatively references
RFC 8422 Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
Refs Ref'd by
Proposed Standard normatively references
RFC 8446 The Transport Layer Security (TLS) Protocol Version 1.3
Refs Ref'd by
Proposed Standard normatively references
STD 91 Network Configuration Access Control Model
Refs Ref'd by
Internet Standard normatively references