You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@httpd.apache.org by "Roy T. Fielding" <fi...@gbiv.com> on 2006/01/05 08:28:01 UTC
Fwd: I-D ACTION:draft-eastlake-sha2-01.txt
It might be a good project for someone to take this I-D and convert
it to an apache utility library.
....Roy
Begin forwarded message:
> From: Internet-Drafts@ietf.org
> Date: January 4, 2006 12:50:01 PM PST
> To: i-d-announce@ietf.org
> Subject: I-D ACTION:draft-eastlake-sha2-01.txt
> Reply-To: internet-drafts@ietf.org
> Message-Id: <E1...@newodin.ietf.org>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>
> Title : US Secure Hash Algorithms (SHA)
> Author(s) : D. Eastlake 3rd, T. Hansen
> Filename : draft-eastlake-sha2-01.txt
> Pages : 99
> Date : 2006-1-4
>
> The United States of America has adopted a suite of secure hash
> algorithms (SHAs), including four beyond SHA-1, as part of a
> Federal
> Information Processing Standard (FIPS), specifically SHA-224 [RFC
> 3874], SHA-256, SHA-384, and SHA-512. The purpose of this document
> is to make open source code performing these hash functions
> conveniently available to the Internet community. The sample code
> supports input strings of arbitrary bit length. SHA-1's sample code
> from [RFC 3174] has also been updated to handle an input string of
> arbitrary length. Most of the text herein was adapted by the
> authors
> from FIPS 180-2.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-eastlake-sha2-01.txt