OCF Security Specification

Total Page:16

File Type:pdf, Size:1020Kb

OCF Security Specification OCF Security Specification VERSION 2.0.2 | April 2019 CONTACT [email protected] Copyrigh t Open Connectivity Foundation, Inc. © 2019. Al l Rights Reserved. 1 LEGAL DISCLAIMER 2 NOTHING CONTAINED IN THIS DOCUMENT SHALL BE DEEMED AS GRANTING YOU ANY 3 KIND OF LICENSE IN ITS CONTENT, EITHER EXPRESSLY OR IMPLIEDLY, OR TO ANY 4 INTELLECTUAL PROPERTY OWNED OR CONTROLLED BY A NY OF THE AUTHORS OR 5 DEVELOPERS OF THIS DOCUMENT. THE INFORMA TION CONTA INED HEREIN IS PROV IDE D 6 ON AN "AS IS" BASIS, AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, 7 THE AUTHORS AND DEVELOPERS OF THIS SPECIFICATION HEREBY DIS CLA IM ALL OTHE R 8 WARRA NTIES AND CONDITIONS, E ITHE R E XPRESS OR IMPLIE D, STA TUTORY OR A T 9 COMMON LAW, INCLUDING, B UT NOT LIMITE D TO, IMP LIE D WARRA NTIES OF 10 MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. OPEN INTERCONNE CT 11 CONSORTIUM, INC. FURTHER DIS CLA IMS A NY AND ALL WARRANTIES OF NON- 12 INFRINGEMENT, ACCURACY OR LACK OF VIRUSES. 13 The OCF logo is a trademark of Open Connectivity Foundation, Inc. in the United States or other 14 countries. *Other names and brands may be claimed as the property of others. 15 Copyright © 2016-2019 Open Connectivity Foundation, Inc. All rights reserved. 16 Copying or other form of reproduction and/or distribution of these works are strictly prohibited Copy right Open Connectivity Foundation, Inc. © 2016-2019. All rights Reserved 17 CONTENTS 18 1 Scope.................................................................................................. 1 19 2 Normative Referenc es .............................................................................. 1 20 3 Terms, definitions, and abbreviated terms ....................................................... 3 21 3.1 Terms and definitions ........................................................................ 3 22 3.2 Abbreviated terms ............................................................................ 6 23 4 Document Conventions and Organization .......................................................10 24 4.1 Conventions ..................................................................................10 25 4.2 Notation .......................................................................................10 26 4.3 Data ty pes ....................................................................................11 27 4.4 Document structure ..........................................................................11 28 5 Security Overview ..................................................................................12 29 5.1 Preamble ......................................................................................12 30 5.2 Access Control ...............................................................................14 31 5.2.1 ACL Architecture .......................................................................16 32 5.2.2 Access Control Scoping Levels ......................................................19 33 5.3 Onboarding Overview .......................................................................21 34 5.3.1 Onboarding General ...................................................................21 35 5.3.2 Onboarding Steps ......................................................................23 36 5.3.3 Establishing a Device Owner .........................................................24 37 5.3.4 Provisioning for Normal Operation ...................................................25 38 5.3.5 Device Provisioning for OCF Cloud and Device Registration Overview ........25 39 5.3.6 OCF Compliance Management System .............................................25 40 5.4 Provisioning...................................................................................26 41 5.4.1 Provisioning General...................................................................26 42 5.4.2 Provisioning other services ...........................................................26 43 5.4.3 Provisioning Credentials for Normal Operation ....................................27 44 5.4.4 Role Assignment and Provisioning for Normal Operation ........................27 45 5.4.5 ACL provisioning .......................................................................27 46 5.5 Secure Resource Manager (SRM) .........................................................27 47 5.6 Credential Overview .........................................................................28 48 6 Security for the Discovery Proc ess...............................................................29 49 6.1 Preamble ......................................................................................29 50 6.2 Security Considerations for Discovery ....................................................29 51 7 Security Provisioning ...............................................................................32 52 7.1 Device Identity................................................................................32 53 7.1.1 General Device Identity................................................................32 54 7.1.2 Device Identity for Devic es with UAID [Deprecated] ..............................32 55 7.2 Device Owners hip............................................................................32 56 7.3 Device Owners hip Trans fer Methods......................................................33 57 7.3.1 OTM implementation requirements ..................................................33 58 7.3.2 SharedKey Credential Calculation ...................................................35 59 7.3.3 Certificate Credential Generation ....................................................35 Copy right Open Connectivity Foundation, Inc. © 2016-2019. All rights Reserved 60 7.3.4 Just-Works OTM........................................................................35 61 7.3.5 Random PIN Based OTM .............................................................37 62 7.3.6 Manufacturer Certificate Based OTM................................................39 63 7.3.7 Vendor Specific O TMs .................................................................42 64 7.3.8 Establishing Owner Credentials ......................................................43 65 7.3.9 Security considerations regarding selecting an Ownership Transfer Method ..51 66 7.3.10 Security Profile Assignment...........................................................51 67 7.4 Provisioning...................................................................................52 68 7.4.1 Provisioning Flows .....................................................................52 69 7.5 Device Provisioning for OCF Cloud .......................................................57 70 7.5.1 Cloud Provisioning General ...........................................................57 71 7.5.2 Device Provisioning by Mediator .....................................................57 72 8 Device Onboarding State Definitions ............................................................58 73 8.1 Device Onboarding General ................................................................58 74 8.2 Device Onboarding-Reset State Definition ...............................................60 75 8.3 Device Ready-for-OTM State Definition ..................................................60 76 8.4 Device Ready-for-Provisioning State Definition .........................................61 77 8.5 Device Ready-for-Normal-Operation State Definition ...................................61 78 8.6 Device Soft Res et State Definition ........................................................62 79 9 Security Credential Management .................................................................65 80 9.1 Preamble ......................................................................................65 81 9.2 Credential Lifecycle..........................................................................65 82 9.2.1 Credential Lifecycle General..........................................................65 83 9.2.2 Creation..................................................................................65 84 9.2.3 Deletion ..................................................................................65 85 9.2.4 Refresh ..................................................................................65 86 9.2.5 Revocation ..............................................................................65 87 9.3 Credential Typ es .............................................................................66 88 9.3.1 Preamble ................................................................................66 89 9.3.2 Pair-wise Symmetric Key Credentials ...............................................66 90 9.3.3 Group Symmetric Key Credentials ...................................................66 91 9.3.4 Asymmetric Authentication Key Credentials ........................................67 92 9.3.5 Asymmetric Key Encryption Key Credentials .......................................67 93 9.3.6 Certificate Credentials .................................................................68 94 9.3.7 Password Credentials .................................................................68 95 9.4 Certificate Based Key Management .......................................................68 96 9.4.1 Overview.................................................................................68 97 9.4.2 X.509 Digital Certific ate Profiles .....................................................69 98 9.4.3 Certificate Revocation List (CRL) Profile............................................78
Recommended publications
  • THE DELL COMPUTER GAMES SERIES Alastair Gourlay
    THE DELL COMPUTER GAMES SERIES MORE THAN 25 FASCINATING, ORIGINAL PROGRAMS FOR ARCADE-STYLE GAMES, BRAIN TEASERS, WORD GAMES, PUZZLES, AND MUSIC TO CHALLENGE AND ENTERTAIN YOU Alastair Gourlay I .1 , II I· GAMES I FOR YOUR Vle20 I I I I I I I I I I I I ·1 I I I I I I I I I I I I I I THE DELL COMPUTER GAMES SERIES GAMES FOR YOUR TIMEX-SINCLAIR 1000 GAMES FOR YOUR TIMEX-SINCLAIR 2000 I GAMES FOR YOUR VIC20 GAMES FOR YOUR ATARI COMPUTER I I I I I I I I I II I I I I I I I I I I I I I I I !I THE DElL COMPUTER I GAMES II SERIES II I GAMES FOR YOUR I VIC20 I I Alastair Gourlay I Series editor: Tim Hartnell I I A DELL TRADE PAPERBACK I I I A DELL TRADE PAPERBACK I Published by Dell Publishing Co., Inc. 1 Dag Hammarskjold Plaza New York, New York 10017 I GAMES FOR YOUR VIC 20 was first published in Great Britain by I Virgin Books Ltd. as part of the Virgin Computer Games Series. I Copyright © 1983 by InterfaceNirgin Books I All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or I mechanical, including photocopying, recording or by any information storage and retrieval system, without the written permission of the Publisher, except where permitted by law. Dell ® TM 681510, Dell Publishing Co., Inc. I Printed in the United States of America First U.S.A.
    [Show full text]
  • The Kerntest Package
    The kerntest package Harald Harders [email protected] Version v1.32 (2004/04/14), printed 14th April 2004 Abstract This class makes it easy to generate tables that show many different kerning pairs of an arbitrary font, usable by LATEX. It shows the kerning values that are used by the the font by default. In addition, this class enables the user to alternate the kernings and to observe the results. Kerning pairs can be defined for groups of similar glyphs at once. Automatically, an mtx file is generated that can be loaded by fontinst to introduce the user-made kernings into the virtual font for LATEX. Contents 1 Introduction 2 2 Usage of the class 3 2.1 Introduction . 3 2.2 Most features by example . 5 2.3 Encoding-dependent parameters . 8 2.4 Advanced features . 9 3 Configuration file 10 4 Kerning pairs that are often missing 10 4.1 Character combinations . 11 4.2 Quotation marks . 11 5 An example of how to optimize a font 12 6 The implementation 16 6.1 Class file . 17 6.1.1 Glyph classes . 33 6.1.2 Extra commands for special encodings . 40 6.2 Footer of mtx file . 40 6.3 Class option files . 41 6.3.1 T1 encoding . 41 6.3.2 TS1 encoding . 47 6.3.3 OT1 encoding . 52 6.3.4 T2A encoding . 58 1 6.3.5 T2A encoding . 63 6.3.6 LY1 encoding . 68 6.4 Templates . 72 6.4.1 T1 encoding . 73 6.4.2 TS1 encoding .
    [Show full text]
  • Latin Pc Name for Downloading Files Directory Fonts/Lm
    latin pc name for downloading files Directory fonts/lm. Download the contents of this package in one zip archive (17.8M). lm – Latin modern fonts in outline formats. The Latin Modern family of fonts consists of 72 text fonts and 20 mathematics fonts, and is based on the Computer Modern fonts released into public domain by AMS (copyright © 1997 AMS). The lm font set contains a lot of additional characters, mainly accented ones, but not exclusively. There is one set of fonts, available both in Adobe Type 1 format (*.pfb) and in OpenType format (*.otf). There are five sets of T e X Font Metric files, corresponding to: Cork encoding (cork-*.tfm); QX encoding (qx-*.tfm); T e X ’n’ANSI aka LY1 encoding (texnansi-*.tfm); T5 (Vietnamese) encoding (t5-*.tfm); and Text Companion for EC fonts aka TS1 (ts1-*.tfm). Student Datafile. Review the following updates with your IT/operations staff and/or student information system vendor to see if your institution needs to take additional steps to be ready to interpret the student datafile in July: New Irregularity Code Valid Values —New code values have been added for indicating delayed or canceled scores. These include 07, 08, 09, 12, 13, 16, 17, 18, and 19. Please refer to the layout specification linked below for full descriptions. Note that there is no change to the layout of the file, only the addition of new valid values. The Student Datafile contains score report data for each AP student at your school or district who tested during the selected exam administration.
    [Show full text]
  • The Microtype Package an Interface to the Micro-Typographic Extensions of Pdftex
    Microtype The microtype package An interface to the micro-typographic extensions of pdfTEX R Schlicht [email protected] v1.9 — 2005/10/28 Abstract The microtype package provides an interface to the micro-typographic extensions of pdfTEX: most prominently, character protrusion and font expansion, furthermore the possibility to disable all ligatures of a font.1 It allows to apply these features to customizable sets of fonts, and to configure all micro-typographic aspects of the fonts in a straight-forward and flexible way. Settings for various fonts are provided.2 Note that font expansion and character protrusion will only work with pdfTEX, at least version 0.14f. Automatic font expansion requires version 1.20 or newer. Disabling ligatures require pdfTEX 1.30. The package will by default enable the features that can safely be assumed to work. 1 A preview of the next version with support for even more micro-typographical extensions is also included in this package. Footnote 12 on page 17 contains the details. 2 Currently, this package provides settings for Computer Modern Roman, Palatino, Times, Adobe Garamond and Minion, Bitstream Charter, and the AMS math fonts, as well as some generic settings for unknown fonts. Contributions are very welcome. CONTENTS 2 Contents 1 Micro-Typography with pdfTEX 4 2 Invoking the Package 5 3 Options 5 3.1 Micro-Typographic Options ...................... 5 3.2 Options for Character Protrusion ................... 6 3.3 Options for Font Expansion ...................... 6 3.4 Miscellaneous Options ......................... 7 3.5 Changing Settings Later ........................ 8 4 Declaring Font Sets 8 5 Micro Fine Tuning 11 5.1 Character Protrusion .........................
    [Show full text]
  • Using the Mathtımeprofessional Fonts with LATEX∗
    Using the MathTımeProfessional fonts with LATEX∗ Walter Schmidt 2001/04/20 Abstract This document describes the macro package mtpro, which serves for using the MathTımeProfessional fonts with LATEX. The package code was partially adopted from the mathtime package written by Frank Mittelbach and David Carlisle. Contents 1 The MathTımeProfessional fonts 1 2 The mtpro package 2 2.1 Text fonts ................................. 2 2.2 Text fonts in math ............................. 3 2.3 Numbers and punctuation in math mode ................ 3 2.4 Greek letters ............................... 3 2.5 Calligraphic and script alphabets .................... 3 2.6 Blackboard bold ............................. 4 2.7 Bold math fonts .............................. 4 2.8 Positioning of subscripts ......................... 4 2.9 Large delimiters and roots ........................ 5 2.10 Accents in math .............................. 5 2.11 Additional symbols ............................ 6 2.12 Symbols missing from the MathTımeProfessional fonts ......... 6 2.13 Known problems ............................. 6 A Option summary 7 1 The MathTımeProfessional fonts MathTımeProfessional is a set of math fonts particularly designed for use with TEX or LATEX. They come with a licensed copy of the corresponding text fonts ‘Times New Roman’ from Monotype. ∗ This document refers to version v2.0.14 of the mtpro package. Development of this pack- age was commissioned by Y&Y. 1 Separate fonts for text size, superscripts, and second order superscripts are provided, allowing
    [Show full text]
  • P-System Users' Manual Supplement Versi'on Iv
    8 UCSD P-SYSTEM USERS' MANUAL SUPPLEMENT VERSI'ON IV April 1982 SofTech Microsystems, Inc. San Diego, California. Copyright © 1982 by SofTech Microsystems, Inc. All rights reserved. No part of this work may be reproduced in any form or by any means or used to make a derivative work (such as a translation, transformation, or adaptation) without the permission in writing of SofTech Microsystems, Inc. DISCLAIMER: These documents and the software they describe are subject to change without notice. No warranty expressed or implied covers their use. Neither the manufacturer nor the seller is responsible or liable for any consequences of their ·use. ACKNOWLEDEGMENTS: This document was edited at SofTech Microsystems by Paula Johnson and Stan Stringfellow. UCSD 9 , UCSD Pascal S, and UCSD p-System are all trademarks of the Regents of the University of Califomia. Use thereof in conjunction with any goods or services is authorized by specific license only, and any unauthorized use is contrary to the laws 01 the State of California. XenoFileS is a trademark of SofTech Microsystems, Inc. CP/M@ is. a registered trademark of Digital Research, Inc. TABLE OF CONTENTS Section Page I INTRODUCTION. • 1-1 1.1 New and Upgraded Standard Facilities • •••• I-I 1.2 New Optional F acili ties •••••••• • 1-3 1.3 Installation Guide Supplement ••••• ., ••• 1-4 II NEW AND UPGRADED STANDARD FACILITIES • • II-I II.I The Symbolic Debugger •••••••••• ~ . • • I1-1 II.I.I Entering and E xi ting the Debugger • • II-I II.I.2 Using Breakpoints ••••••••••• • • II-2 IJ.l.3 Viewing and Altering Variables •• • ••• II-3 II.l.4 Viewing Text Files from the DeblJgger ••••••• • ••• I1-4 H.l.S Displaying Useful Information • • • • • • • 11-5 II.l.6 Disassembling P-code • • • • • II-6 II.l.7 Example of Debugger Usage • • ••••• 11-6 II.~.8 Symbolic Debugging •••••• • ••• I1-7 II.l.9 Symbolic Debugging Example.
    [Show full text]
  • The TX Fonts∗
    The TX Fonts∗ Young Ryu December 15, 2000 Contents 1 Introduction 2 2 Changes 2 3AProblem:DVIPS Partial Font Downloading 3 4 Installation 4 5UsingtheTX Fonts with LATEX4 6 Additional Symbols in the TX Math Fonts 5 7Remarks 8 7.1SomeFontDesignIssues.................................... 8 7.2Timesvs.TimesNewRoman.................................. 9 7.3 PDFTEX/PDFLATEXandStandardPostscriptFonts....................... 9 7.4GlyphHinting.......................................... 10 7.5 Glyphs in Low Positions . 10 8FontCharts 10 8.1OT1(CM)EncodingTextFonts................................ 11 8.2T1(EC)CorkEncodingTextFonts............................... 15 8.3 LY1 TEX-and-ANSIEncodingTextFonts........................... 21 8.4TS1(TC)EncodingTextCompanionFonts.......................... 25 8.5MathFonts........................................... 29 ∗Special thanks to those who reported problems of TX fonts and provided suggestions! 1 1 Introduction The TX fonts consist of 1. virtual text roman fonts using Adobe Times (or URW NimbusRomNo9L) with some modified and additional text symbols in OT1, T1, TS1, and LY1 encodings 2. virtual text sans serif fonts using Adobe Helvetica (or URW NimbusSanL) with additional text symbols in OT1, T1, TS1, and LY1 encodings 3. monospaced typewriter fonts in OT1, T1, TS1, and LY1 encodings 4. math alphabets using Adobe Times (or URW NimbusRomNo9L) with modified metrics 5. math fonts of all symbols corresponding to those of Computer Modern math fonts (CMSY, CMMI, CMEX, and Greek letters of CMR) 6. math fonts of all symbols corresponding to those of AMS fonts (MSAM and MSBM) 7. additional math fonts of various symbols All fonts are in the Type 1 format (in afm and pfb files). Necessary tfm and vf files together with LATEX2ε package files and font map files for dvips are provided. The TX fonts and related files are distributed without any guaranty or warranty.
    [Show full text]
  • David Novosel
    G. Campardo · R. Micheloni · D. Novosel VLSI-Design of Non-Volatile Memories Giovanni Campardo · Rino Micheloni · David Novosel VLSI-Design of Non-Volatile Memories With 568 Figures Giovanni Campardo Rino Micheloni STMicroelectronics Srl Memory Product Groups Flash Division Via C. Olivetti 2 20041 Agrate Brianza (MI) Italy David Novosel IMD Intelligent Micro Design, Inc. Mercer-West Middlesex Road 2456 West Middlesex, PA 16159 U.S.A. ISBN 3-540-20198-X Springer Berlin Heidelberg New York Library of Congress Control Number: 2004116726 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in other ways, and storage in data banks.Duplicationofthispublicationorpartsthereofispermittedonlyundertheprovisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable to prosecution under German Copyright Law. SpringerisapartofSpringerScience+Business Media springeronline.com c Springer-Verlag Berlin Heidelberg 2005 Printed in Germany The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Data conversion by the author. Final processing by PTP-Berlin Protago-TEX-Production GmbH, Germany Cover-Design: medionet AG, Berlin Printed on acid-free paper 62/3141/Yu-543210 Preface The electronics and information technology revolution continues, but it is a critical time in the development of technology.
    [Show full text]
  • \Title{Formatting Information}
    \title{formatting information} A beginner's introduction to typesetting with LATEX Peter Flynn Silmaril Consultants Textual Therapy Division v.3.4 November 2003 Acknowledgments Thanks to all the people who sent me corrections and suggestions for improvement or additions to earlier versions. As usual, the problem has been what to leave out, not what to include. Some of the suggestions were well-intentioned but would have turned the book into a higher-level mathematics treatise. One of my objectives was to omit all maths except for a short example, as all the other books on TEX and LATEX already cover mathematical typesetting in finer and better detail than I am capable of. Some of the suggestions would have taken me down pathways I prefer not to tread. Large software corporations are full of well-meaning, hard-working individuals who genuinely believe that their products make life easier for users. Unfortunately, experience shows that this is often only true in the first hot flush of using a new program: in the long run the winners are those whose data is secure, accessible, and reusable; whose documents can be reformatted at any time, on any platform, without penalty, financial or otherwise. I make no apology for recommending Unix-like systems running LATEX as the platform of choice for document-processing applications — if you have a choice — and I'm happy to be able to include the Apple Macintosh in that family. Unfortunately, there are those whose circumstances at home or work require them to use something else, and I am pleased that LATEX can help them by being available on their platform as well.
    [Show full text]
  • The PX Fonts
    The PX Fonts Young Ryu December 14, 2000 Contents 1 Introduction 2 2 Requirements 2 3 Changes 2 4AProblem:DVIPS Partial Font Downloading 3 5 Installation 3 6UsingthePX Fonts with LATEX4 7 Additional Symbols in the PX Math Fonts 4 8 Remarks 7 8.1SomeFontDesignIssues........................................ 7 8.2GlyphHinting.............................................. 7 8.3GlyphsinLowPositions........................................ 7 9 Font Charts 7 9.1OT1(CM)EncodingTextFonts.................................... 8 9.2T1(EC)CorkEncodingTextFonts.................................. 9 9.3TS1(TC)EncodingTextCompanionFonts.............................. 11 9.4MathFonts................................................ 13 1 1 Introduction The PX fonts consist of 1. virtual text roman fonts using Adobe Palatino (or URWPalladioL) with some modified and additional text symbols in the OT1, T1, and TS1 encoding 2. virtual text sans serif fonts using Adobe Helvetica (or URW NimbusSanL) with additional text symbols in OT1, T1, TS1, and LY1 encodings (Provided in the TX fonts distribution) 3. monospaced typewriter fonts in OT1, T1, TS1, and LY1 encodings (Provided in the TX fonts distribution) 4. math alphabets using Adobe Palatino (or URWPalladioL) with modified metrics 5. math fonts of all symbols corresponding to those of Computer Modern math fonts (CMSY, CMMI, CMEX, and Greek letters of CMR) 6. math fonts of all symbols corresponding to those of AMS fonts (MSAM and MSBM) 7. additional math fonts of various symbols All fonts are in the Type 1 format (in afm and pfb files). Necessary tfm and vf files together with LATEX2ε package files and font map files for dvips are provided. The PX fonts and related files are distributed without any guaranty or warranty. I do not assume responsibility for any actual or possible damages or losses, directly or indirectly caused by the distributed files.
    [Show full text]
  • The Microtype Package Subliminal Refinements Towards Typographical Perfection
    The microtype package Subliminal refinements towards typographical perfection R Schlicht v2.8c [email protected] 2021/03/14 The microtype package provides aLaTeX interface to the micro-typographic exten- sions that were introduced by pdfTeX and have since also propagated to LuaTeX and X Te eX: most prominently, character protrusion and font expansion, furthermore the adjustment of interword spacing and additional kerning, as well as hyphenatable letterspacing (tracking) and the possibility to disable all or selected ligatures. These features may be applied to customisable sets of fonts, and all micro-typographic aspects of the fonts can be configured in a straight-forward and flexible way. Settings for various fonts are provided. Note that character protrusion requires pdfTeX (version 0.14f or later), LuaTeX, or X Te eX (at least version 0.9997). Font expansion works with pdfTeX (version 1.20 for automatic expansion) or LuaTeX. The package will by default enable protrusion and expansion if they can safely be assumed to work. Disabling ligatures requires pdfTeX( 1.30) or LuaTeX, while the adjustment of interword spacing and of kerning only works≥ with pdfTeX( 1.40). Letterspacing is available with pdfTeX( 1.40) or LuaTeX( 0.62). ≥ ≥ The alternative≥ package letterspace, which also works with plainT eX, provides the user commands for letterspacing only, omitting support for all other extensions (see section7). This package is copyright © 2004–2021 R Schlicht. It may be distributed and/or modified under the conditions of theLaTeX Project Public License, either version 1.3c of this license or (at your option) any later version.
    [Show full text]
  • ISO/IEC International Standard ISO/IEC 10646
    ISO/IEC International Standard ISO/IEC 10646 Final Committee Draft Information technology – Universal Coded Character Set (UCS) Technologie de l‘information – Jeu universel de caractères codés (JUC) Third edition, 2012 ISO/IEC 10646:2012 (E) Final Committee Draft (FCD) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF- creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the add ress given below. © ISO/IEC 2010 All rights reserved. Unless otherwise specified, no part of this publica tion may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the a d- dress below or ISO's member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail [email protected] Web www.iso.ch Printed in Switzerland ii © ISO/IEC 2010 – All rights reserved ISO/IEC 10646:2012 (E) Final Committee Draft (FCD) CONTENTS Foreword................................................................................................................................................
    [Show full text]