…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. ¶ This document describes a public key algorithm for use with SSH, as per [ RFC4253 ], Section 6.6 . The name of the algorith…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. This document also makes use of internal conceptual variables to describe protocol behavior and external variables that an im…
…IONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 1.2. Terminology New terms are introduced in _cursive_, which is rendered in plain text as the new term surrounded by undersco…
…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. ¶ Readers are expected to be familiar with [ RFC8489 ] and the terms defined there. ¶ The following terms are used in this do…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 3 . The Browser Threat Model The security requirements for WebRTC follow directly from the requirement that the browser's job…
…IONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 2.1. Definitions FFV1: The chosen name of this video encoding format, which is the short version of "FF Video 1". The letters …
…NOT in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. A Thing Description instance complies with this specification if it follows the normative statements in 5. TD Information Mod…
…NOT in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 3. Terminology This section is non-normative. The fundamental WoT terminology such as Thing , Thing Description ( TD ), Thing…
…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. ¶ This document describes a public key algorithm for use with SSH, as per [ RFC4253 ], Section 6.6 . The name of the algorith…
…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. Lower- or mixed-case uses of these key words are not to be interpreted as carrying special significance in this memo. ¶ We de…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 3 . Trust Model The basic assumption of this architecture is that network resources exist in a hierarchy of trust, rooted in …
…IONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. The term "Implicit TLS" refers to the automatic negotiation of TLS whenever a TCP connection is made on a particular TCP port …
…ULD in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. This specification defines conformance criteria that apply to a single product: the user agent that implements the interfaces…
…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. ¶ This specification makes use of all terminology defined for Interactive Connectivity Establishment in [ RFC8445 ] . In addi…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 3 . Encapsulation and Decapsulation Procedure When an SCTP packet is provided to the DTLS layer, the complete SCTP packet, co…