{"draft":"draft-housley-cms-fw-wrap-11","doc_id":"RFC4108","title":"Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages","authors":["R. Housley"],"format":["ASCII","HTML"],"page_count":"61","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"IETF - NON WORKING GROUP","abstract":"This document describes the use of the Cryptographic Message Syntax\r\n(CMS) to protect firmware packages, which provide object code for one\r\nor more hardware module components. CMS is specified in RFC 3852. A\r\ndigital signature is used to protect the firmware package from\r\nundetected modification and to provide data origin authentication.\r\nEncryption is optionally used to protect the firmware package from\r\ndisclosure, and compression is optionally used to reduce the size of\r\nthe protected firmware package. A firmware package loading receipt\r\ncan optionally be generated to acknowledge the successful loading of a\r\nfirmware package. Similarly, a firmware package load error report can\r\noptionally be generated to convey the failure to load a firmware\r\npackage. [STANDARDS-TRACK]","pub_date":"July 2005","keywords":["hardward module components","digital signature"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4108","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4108"}