Skip to content

Commit

Permalink
Script updating gh-pages from da59b93. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Dec 13, 2023
1 parent 809c288 commit d21a689
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 7 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -1551,7 +1551,7 @@ <h3 id="name-terminology">
<p id="section-1.1-9.3.1">Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <span>[<a href="#RFC8392" class="cite xref">RFC8392</a>]</span>, X.509 certificates <span>[<a href="#RFC5280" class="cite xref">RFC5280</a>]</span>, and C509 certificates <span>[<a href="#I-D.ietf-cose-cbor-encoded-cert" class="cite xref">I-D.ietf-cose-cbor-encoded-cert</a>]</span>.<a href="#section-1.1-9.3.1" class="pilcrow"></a></p>
</li>
<li class="normal" id="section-1.1-9.4">
<p id="section-1.1-9.4.1">Individual keying material: information exclusively pertaining to a group member, as associated with its group membership and related to other keying material and parameters used in the group. For example, this can be a member identifier that is unique within the group. The specific nature and format of individual keying material used in a group is defined in application profiles of this specification. The individual keying material of a group member is not related to the secure association between that group member and the KDC.<a href="#section-1.1-9.4.1" class="pilcrow"></a></p>
<p id="section-1.1-9.4.1">Individual keying material: information exclusively pertaining to a group member, as associated with its group membership and related to other keying material and parameters used in the group. For example, this can be an identifier that the secure communication protocol employs to uniquely identify a node as a group member (e.g., a cryptographic key identifier uniquely associated with the group member in question). The specific nature and format of individual keying material used in a group is defined in application profiles of this specification. The individual keying material of a group member is not related to the secure association between that group member and the KDC.<a href="#section-1.1-9.4.1" class="pilcrow"></a></p>
</li>
</ul>
<p id="section-1.1-10">Examples throughout this document are expressed in CBOR diagnostic notation without the tag and value abbreviations.<a href="#section-1.1-10" class="pilcrow"></a></p>
Expand Down
14 changes: 8 additions & 6 deletions zaheduzzaman-sarker-review/draft-ietf-ace-key-groupcomm.txt
Original file line number Diff line number Diff line change
Expand Up @@ -320,12 +320,14 @@ Table of Contents
* Individual keying material: information exclusively pertaining to
a group member, as associated with its group membership and
related to other keying material and parameters used in the group.
For example, this can be a member identifier that is unique within
the group. The specific nature and format of individual keying
material used in a group is defined in application profiles of
this specification. The individual keying material of a group
member is not related to the secure association between that group
member and the KDC.
For example, this can be an identifier that the secure
communication protocol employs to uniquely identify a node as a
group member (e.g., a cryptographic key identifier uniquely
associated with the group member in question). The specific
nature and format of individual keying material used in a group is
defined in application profiles of this specification. The
individual keying material of a group member is not related to the
secure association between that group member and the KDC.

Examples throughout this document are expressed in CBOR diagnostic
notation without the tag and value abbreviations.
Expand Down

0 comments on commit d21a689

Please sign in to comment.