<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="pskc.xsl"?>
<?xml-model href="pskc.rng" schematypens="http://relaxng.org/ns/structure/1.0" ?>
<registry xmlns="http://www.iana.org/assignments" id="pskc">
  <title>Portable Symmetric Key Container (PSKC)</title>
  <created>2010-08-19</created>
  <updated>2012-04-06</updated>
  
  <registry id="alg-profiles">
    <title>Algorithm URI Registry and Related PSKC Profiles</title>
    <xref type="rfc" data="rfc6030"/>
    <registration_rule>Specification Required</registration_rule>
    <expert>Unassigned</expert>
    <note>Algorithm identifiers from this registry are also used as otp-algID values 
in the PA-OTP-CHALLENGE described in Section 4.1 and the PA-OTP-REQUEST 
described in Section 4.2 of <xref type="rfc" data="rfc6560"/>.
    </note>
    <record>
      <name>HOTP</name>
      <class>OTP</class>
      <uri>urn:ietf:params:xml:ns:keyprov:pskc:hotp</uri>
      <id><xref type="rfc" data="rfc6030"/></id>
      <algorithm><xref type="rfc" data="rfc4226"/></algorithm>
      <registrant>IESG</registrant>
      <deprecated>FALSE</deprecated>
      <profiling>         
The &lt;KeyPackage&gt; element MUST be present and the
&lt;ResponseFormat&gt; element, which is a child element of the
&lt;AlgorithmParameters&gt; element, MUST be used to indicate the OTP
length and the value format.<br/> <br/> 
The &lt;Counter&gt; element (see Section 4.1 of [RFC-ietf-keyprov-pskc-09]) MUST be provided as
metadata for the key. <br/>  <br/> 

The following additional constraints apply:
        <br/> <br/>     
+  The value of the &lt;Secret&gt; element MUST contain key material
with a length of at least 16 octets (128 bits), if it is present.
        <br/> <br/> 
+  The &lt;ResponseFormat&gt; element MUST have the 'Format'
attribute set to "DECIMAL", and the 'Length' attribute MUST
indicate a length value between 6 and 9 (inclusive).
        <br/> <br/>        
+  The &lt;PINPolicy&gt; element MAY be present, but the
'PINUsageMode' attribute cannot be set to "Algorithmic".
        <br/> <br/>              
An example can be found in Figure 3 of [RFC-ietf-keyprov-pskc-09].
      </profiling>
      <xref type="rfc" data="rfc6030"/>
    </record>

    <record>
      <name>PIN</name>
      <class>Symmetric static credential comparison</class>
      <uri>urn:ietf:params:xml:ns:keyprov:pskc:pin</uri>
      <id><xref type="rfc" data="rfc6030"/></id>
      <algorithm>Section 5.1</algorithm>
      <registrant>IESG</registrant>
      <deprecated>FALSE</deprecated>
      <profiling>         
The &lt;Usage&gt; element MAY be present, but no attribute of the
&lt;Usage&gt; element is required.  The &lt;ResponseFormat&gt; element MAY
be used to indicate the PIN value format.<br/> <br/> 
            
The &lt;Secret&gt; element (see Section 4.1 of [RFC-ietf-keyprov-pskc-09]) MUST be provided.<br/> <br/> 
              
See the example in Figure 5 of [RFC-ietf-keyprov-pskc-09].
      </profiling>
      <xref type="rfc" data="rfc6030"/>
    </record>



  </registry>
  
  
  <registry id="versions">
    <title>PSKC Version Registry</title>
    <xref type="rfc" data="rfc6030"/>
    <registration_rule>Standards Action</registration_rule>
    <record>
      <version>1.0</version>
      <xref type="rfc" data="rfc6030"/>
    </record>

  </registry>
  
  
  <registry id="key-usage">
    <title>Key Usage Registry</title>
    <xref type="rfc" data="rfc6030"/>
    <registration_rule>Expert Review</registration_rule>
    <expert>Unassigned</expert>
    <record>
      <key>OTP</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>CR</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Encrypt</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Integrity</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Verify</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Unlock</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Decrypt</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>KeyWrap</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Unwrap</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Derive</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>
    <record>
      <key>Generate</key>
      <spec>Section 5</spec>
      <deprecated>FALSE</deprecated>
      <xref type="rfc" data="rfc6030"/>
    </record>

  </registry>
  <people/>
</registry>
