Lev, You mean like an HSM, as an example of a key filled device?
Seems like it should say something like "Key filled device" or "key filled interface" or "key filled action" or "key filled protocol" or _something_ then. The way it's worded is a bit odd as far as the English grammar goes. To me, that bullet reads as though some word is missing at the end. Even with your explanation (which now makes it makes it sense) it still reads very awkward to me. -kevin On Fri, Jul 15, 2011 at 9:51 AM, Novikov, Lev <[email protected]> wrote: > On 2011-07-15 08:14, Kevin Wall wrote: >>...[snip]... >>> >>> * add module events for symmetric and asymmetric key filled >> >> ^^^^^ >> >>Is that supposed to be 'key field' ??? Because I don't get >>"key filled". > > From: http://tools.ietf.org/html/draft-lanz-cicm-lm-00 > > $ key fill device > > Devices that read-in, transfer, and store key material. > > $ key fill interface > > Set of protocols, electrical connections, and physical > characteristics that comprise the connecting link between a key > fill device and a cryptographic module. CICM enables a key fill > interface to be configured and actions to be initiated on a key > fill device via the key fill interface. > > See Also: > http://tools.ietf.org/html/draft-lanz-cicm-km-00 (search for "key fill") > > Lev > _______________________________________________ > cicm mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/cicm > -- Blog: http://off-the-wall-security.blogspot.com/ "The most likely way for the world to be destroyed, most experts agree, is by accident. That's where we come in; we're computer professionals. We *cause* accidents." -- Nathaniel Borenstein _______________________________________________ cicm mailing list [email protected] https://www.ietf.org/mailman/listinfo/cicm
