…PTIONAL " in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. The term "byte" is used in its now-customary sense as a synonym for "octet". All multi-byte values are encoded in network byte …
…PTIONAL " in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. The term "byte" is used in its now-customary sense as a synonym for "octet". All multi-byte values are encoded in network byte …
…ONAL " in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. Section 2 of [HTTP] defines conformance criteria and contains considerations regarding error handling. 1.2. Syntax Notation Th…
…PTIONAL " in this document are to be interpreted as described in BCP 14 RFC2119 RFC8174 when, and only when, they appear in all capitals, as shown here. The term "byte" is used in its now-customary sense as a synonym for "octet". All multi-byte values are encoded in network byte …
…ONAL " in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. Conformance criteria and considerations regarding error handling are defined in Section 2 of [HTTP] 1.2. Syntax Notation This …
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 2.2 . Terminology This document uses the following terminology. Optional words in the term are indicated in parentheses, e.g.…
…ALL in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. The following conformance classes are defined by this specification: conforming user agent A user agent is considered to be a…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 1.2 . Wire Encoding Terminology The wire encoding types in this document -- "boolean", "byte", "string", "mpint" -- have mean…
…IONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 1.2. Scaling Benefits Some resource record types are used in a fashion that can create scaling problems if an entire RRset ass…
…IONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Encapsulation and Decapsulation Procedure When an SCTP packet is provided to the DTLS layer, the complete SCTP packet, cons…
…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. ¶ This document describes a public key algorithm for use with SSH, as per [ RFC4253 ], Section 6.6 . The name of the algorith…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. This document also makes use of internal conceptual variables to describe protocol behavior and external variables that an im…
…IONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 1.2. Terminology New terms are introduced in _cursive_, which is rendered in plain text as the new term surrounded by undersco…
…L " in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. ¶ Readers are expected to be familiar with [ RFC8489 ] and the terms defined there. ¶ The following terms are used in this do…
…AL" in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here. 3 . The Browser Threat Model The security requirements for WebRTC follow directly from the requirement that the browser's job…