References from draft-marin-ace-wg-coap-eap

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 14 Key words for use in RFCs to Indicate Requirement Levels
References Referenced by
Best Current Practice normatively references
draft-ietf-ace-oauth-authz Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by
Proposed Standard normatively references
draft-ietf-lwig-coap CoAP Implementation Guidance
References Referenced by
normatively references
draft-ingles-eap-edhoc EAP method based on EDHOC Authentication
References Referenced by
normatively references
draft-kumar-dice-dtls-relay DTLS Relay for Constrained Environments
References Referenced by
normatively references
draft-ohba-core-eap-based-bootstrapping Provisioning Credentials for CoAP Applications using EAP
References Referenced by
normatively references
draft-pelov-core-cosol Constrained Signaling Over LP-WAN
References Referenced by
normatively references
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels
References Referenced by
Best Current Practice normatively references
RFC 3748 Extensible Authentication Protocol (EAP)
References Referenced by
Proposed Standard normatively references
RFC 4279 Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)
References Referenced by
Proposed Standard normatively references
RFC 4493 The AES-CMAC Algorithm
References Referenced by
Informational normatively references
RFC 4615 The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)
References Referenced by
Proposed Standard normatively references
RFC 4764 The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method
References Referenced by
Experimental normatively references
RFC 5191 Protocol for Carrying Authentication for Network Access (PANA)
References Referenced by
Proposed Standard normatively references
RFC 5247 Extensible Authentication Protocol (EAP) Key Management Framework
References Referenced by
Proposed Standard normatively references
RFC 5295 Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK)
References Referenced by
Proposed Standard normatively references
RFC 5869 HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
References Referenced by
Informational normatively references
RFC 6345 Protocol for Carrying Authentication for Network Access (PANA) Relay Element
References Referenced by
Proposed Standard normatively references
RFC 6696 EAP Extensions for the EAP Re-authentication Protocol (ERP)
References Referenced by
Proposed Standard normatively references
RFC 7228 Terminology for Constrained-Node Networks
References Referenced by
Informational normatively references
RFC 7252 The Constrained Application Protocol (CoAP)
References Referenced by
Proposed Standard normatively references
RFC 7833 A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for the Security Assertion Markup Language (SAML)
References Referenced by
Proposed Standard normatively references
RFC 7967 Constrained Application Protocol (CoAP) Option for No Server Response
References Referenced by
Informational normatively references