亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3281.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   If the crlDistributionPoints extension is present, then exactly one   distribution point MUST be present.  The crlDistributionPoints   extension MUST use the DistributionPointName option, which MUST   contain a fullName, which MUST contain a single name form.  That name   MUST contain either a distinguished name or a URI.  The URI MUST be   either an HTTP URL or an LDAP URL [URL].      name           id-ce-cRLDistributionPoints      OID            { id-ce 31 }      syntax         CRLDistPointsSyntax      criticality    MUST be FALSE4.3.6   No Revocation Available   The noRevAvail extension, defined in [X.509-2000], allows an AC   issuer to indicate that no revocation information will be made   available for this AC.   This extension MUST be non-critical.  An AC verifier that does not   understand this extension might be able to find a revocation list   from the AC issuer, but the revocation list will never include an   entry for the AC.      name           id-ce-noRevAvail      OID            { id-ce 56 }      syntax         NULL (i.e. '0500'H is the DER encoding)      criticality    MUST be FALSE4.4 Attribute Types   Some of the attribute types defined below make use of the   IetfAttrSyntax type, also defined below.  The reasons for using this   type are:   1. It allows a separation between the AC issuer and the attribute      policy authority.  This is useful for situations where a single      policy authority (e.g. an organization) allocates attribute      values, but where multiple AC issuers are deployed for performance      or other reasons.   2. The syntaxes allowed for values are restricted to OCTET STRING,      OBJECT IDENTIFIER, and UTF8String, which significantly reduces the      complexity associated with matching more general syntaxes.  All      multi-valued attributes using this syntax are restricted so that      each value MUST use the same choice of value syntax.  For example,      AC issuers must not use one value with an oid and a second value      with a string.Farrell & Housley           Standards Track                    [Page 18]RFC 3281           An Internet Attribute Certificate          April 2002               IetfAttrSyntax ::= SEQUENCE {                    policyAuthority [0] GeneralNames    OPTIONAL,                    values          SEQUENCE OF CHOICE {                                  octets    OCTET STRING,                                  oid       OBJECT IDENTIFIER,                                  string    UTF8String                   }               }   In the descriptions below, each attribute type is either tagged   "Multiple Allowed" or "One Attribute value only; multiple values   within the IetfAttrSyntax".  This refers to the SET OF   AttributeValues; the AttributeType still only occurs once, as   specified in section 4.2.7.4.4.1   Service Authentication Information   The SvceAuthInfo attribute identifies the AC holder to the   server/service by a name, and the attribute MAY include optional   service specific authentication information.  Typically this will   contain a username/password pair for a "legacy" application.   This attribute provides information that can be presented by the AC   verifier to be interpreted and authenticated by a separate   application within the target system.  Note that this is a different   use to that intended for the accessIdentity attribute in 4.4.2 below.   This attribute type will typically be encrypted when the authInfo   field contains sensitive information, such as a password.      name      id-aca-authenticationInfo      OID       { id-aca 1 }      Syntax    SvceAuthInfo      values:   Multiple allowed           SvceAuthInfo ::=    SEQUENCE {                service   GeneralName,                ident     GeneralName,                authInfo  OCTET STRING OPTIONAL           }4.4.2   Access Identity   The accessIdentity attribute identifies the AC holder to the   server/service.  For this attribute the authInfo field MUST NOT be   present.Farrell & Housley           Standards Track                    [Page 19]RFC 3281           An Internet Attribute Certificate          April 2002   This attribute is intended to be used to provide information about   the AC holder, that can be used by the AC verifier (or a larger   system of which the AC verifier is a component) to authorize the   actions of the AC holder within the AC verifier's system.  Note that   this is a different use to that intended for the svceAuthInfo   attribute described in 4.4.1 above.      name      id-aca-accessIdentity      OID       { id-aca 2 }      syntax    SvceAuthInfo      values:   Multiple allowed4.4.3   Charging Identity   The chargingIdentity attribute identifies the AC holder for charging   purposes.  In general, the charging identity will be different from   other identities of the holder.  For example, the holder's company   may be charged for service.      name      id-aca-chargingIdentity      OID       { id-aca 3 }      syntax    IetfAttrSyntax      values:   One Attribute value only; multiple values within the                IetfAttrSyntax4.4.4   Group   The group attribute carries information about group memberships of   the AC holder.      name      id-aca-group      OID       { id-aca 4 }      syntax    IetfAttrSyntax      values:   One Attribute value only; multiple values within the                IetfAttrSyntax4.4.5   Role   The role attribute, specified in [X.509-2000], carries information   about role allocations of the AC holder.   The syntax used for this attribute is:         RoleSyntax ::= SEQUENCE {                 roleAuthority   [0] GeneralNames OPTIONAL,                 roleName        [1] GeneralName         }Farrell & Housley           Standards Track                    [Page 20]RFC 3281           An Internet Attribute Certificate          April 2002   The roleAuthority field MAY be used to specify the issuing authority   for the role specification certificate.  There is no requirement that   a role specification certificate necessarily exists for the   roleAuthority.  This differs from [X.500-2000], where the   roleAuthority field is assumed to name the issuer of a role   specification certificate.  For example, to distinguish the   administrator role as defined by "Baltimore" from that defined by   "SPYRUS", one could put the value "urn:administrator" in the roleName   field and the value "Baltimore" or "SPYRUS" in the roleAuthority   field.   The roleName field MUST be present, and roleName MUST use the   uniformResourceIdentifier CHOICE of the GeneralName.      name      id-at-role      OID       { id-at 72 }      syntax    RoleSyntax      values:   Multiple allowed4.4.6   Clearance   The clearance attribute, specified in [X.501-1993], carries clearance   (associated with security labeling) information about the AC holder.   The policyId field is used to identify the security policy to which   the clearance relates.  The policyId indicates the semantics of the   classList and securityCategories fields.   This specification includes the classList field exactly as it is   specified in [X.501-1993].  Additional security classification   values, and their position in the classification hierarchy, may be   defined by a security policy as a local matter or by bilateral   agreement.  The basic security classification hierarchy is, in   ascending order: unmarked, unclassified, restricted, confidential,   secret, and top-secret.   An organization can develop its own security policy that defines   security classification values and their meanings.  However, the BIT   STRING positions 0 through 5 are reserved for the basic security   classification hierarchy.   If present, the SecurityCategory field provides further authorization   information.  The security policy identified by the policyId field   indicates the syntaxes that are allowed to be present in the   securityCategories SET.  An OBJECT IDENTIFIER identifies each of the   allowed syntaxes.  When one of these syntaxes is present in the   securityCategories SET, the OBJECT IDENTIFIER associated with that   syntax is carried in the SecurityCategory.type field.Farrell & Housley           Standards Track                    [Page 21]RFC 3281           An Internet Attribute Certificate          April 2002            Clearance  ::=  SEQUENCE {                 policyId  [0] OBJECT IDENTIFIER,                 classList [1] ClassList DEFAULT {unclassified},                 securityCategories                           [2] SET OF SecurityCategory OPTIONAL            }            ClassList  ::=  BIT STRING {                 unmarked       (0),                 unclassified   (1),                 restricted     (2)                 confidential   (3),                 secret         (4),                 topSecret      (5)            }            SecurityCategory ::= SEQUENCE {                 type      [0]  IMPLICIT OBJECT IDENTIFIER,                 value     [1]  ANY DEFINED BY type            }            -- This is the same as the original syntax which was defined            -- using the MACRO construct, as follows:            -- SecurityCategory ::= SEQUENCE {            --      type      [0]  IMPLICIT SECURITY-CATEGORY,            --      value     [1]  ANY DEFINED BY type            -- }            --            -- SECURITY-CATEGORY MACRO  ::=            -- BEGIN            -- TYPE NOTATION ::= type | empty            -- VALUE NOTATION ::= value (VALUE OBJECT IDENTIFIER)            -- END       name      { id-at-clearance }       OID       { joint-iso-ccitt(2) ds(5) module(1)                   selected-attribute-types(5) clearance (55) }       syntax    Clearance - imported from [X.501-1993]       values    Multiple allowed4.5 Profile of AC issuer's PKC   The AC issuer's PKC MUST conform to [PKIXPROF], and the keyUsage   extension in the PKC MUST NOT explicitly indicate that the AC   issuer's public key cannot be used to validate a digital signature.   In order to avoid confusion regarding serial numbers and revocations,Farrell & Housley           Standards Track                    [Page 22]RFC 3281           An Internet Attribute Certificate          April 2002   an AC issuer MUST NOT also be a PKC Issuer.  That is, an AC issuer   cannot be a CA as well.  So, the AC issuer's PKC MUST NOT have a   basicConstraints extension with the cA BOOLEAN set to TRUE.5. Attribute Certificate Validation   This section describes a basic set of rules that all valid ACs MUST   satisfy.  Some additional checks are also described which AC   verifiers MAY choose to implement.   To be valid an AC MUST satisfy all of the following:   1. Where the holder uses a PKC to authenticate to the AC verifier,      the AC holder's PKC MUST be found, and the entire certification      path of that PKC MUST be verified in accordance with [PKIXPROF].      As noted in the security considerations section, if some other      authentication scheme is used, AC verifiers need to be very      careful mapping the identities (authenticated identity, holder      field) involved.   2. The AC signature must be cryptographically correct, and the AC      issuer's entire PKC certification path MUST be verified in      accordance with [PKIXPROF].   3. The AC issuer's PKC MUST also conform to the profile specified in      section 4.5 above.   4. The AC issuer MUST be directly trusted as an AC issuer (by      configuration or otherwise).   5. The time for which the AC is being evaluated MUST be within the AC      validity.  If the evaluation time is equal to either notBeforeTime      or notAfterTime, then the AC is timely and this check succeeds.      Note that in some applications, the evaluation time MAY not be the      same as the current time.   6. The AC targeting check MUST pass as specified in section 4.3.2.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91丨porny丨在线| 国产99久久久精品| 5858s免费视频成人| 亚洲国产精品久久艾草纯爱| 欧美精品aⅴ在线视频| 午夜免费久久看| 日韩欧美亚洲另类制服综合在线| 另类欧美日韩国产在线| 久久久久久日产精品| 成人av网站在线| 亚洲一区二区三区四区在线| 欧美男同性恋视频网站| 久久99国产精品久久99| 国产欧美日韩在线看| 色一情一乱一乱一91av| 蜜臀精品一区二区三区在线观看| 久久精品视频一区二区三区| 91免费版在线| 久久精品国产网站| 中文字幕综合网| 欧美一区二区三区免费观看视频 | 一本色道久久加勒比精品| 亚洲一卡二卡三卡四卡无卡久久| 欧美一级日韩免费不卡| 国产91在线观看| 婷婷六月综合亚洲| 中文无字幕一区二区三区| 在线视频一区二区免费| 国产一区在线观看视频| 亚洲精品v日韩精品| 精品国产一区二区三区四区四| 成人黄色在线网站| 青青草国产精品97视觉盛宴| 中文字幕综合网| 欧美成人在线直播| 精品国产91乱码一区二区三区| 国产99一区视频免费| 日本成人超碰在线观看| 国产精品欧美综合在线| 91麻豆精品国产91久久久资源速度| 国产成人免费在线视频| 免费三级欧美电影| 亚洲九九爱视频| 久久免费电影网| 日韩欧美一区二区久久婷婷| 99久久久无码国产精品| 久久福利视频一区二区| 亚洲一区二区在线免费看| 日本一区二区三区dvd视频在线| 欧美日本一区二区三区| 91丨九色丨黑人外教| 国产成人免费视频网站高清观看视频 | www.激情成人| 经典三级视频一区| 日韩激情一区二区| 夜夜精品浪潮av一区二区三区| 国产三级一区二区三区| 日韩欧美国产系列| 欧美精品国产精品| 欧美三级蜜桃2在线观看| 一本久久精品一区二区| eeuss鲁一区二区三区| 国产美女久久久久| 精品一区二区精品| 麻豆国产精品视频| 久久99久国产精品黄毛片色诱| 婷婷夜色潮精品综合在线| 亚洲成va人在线观看| 一区二区激情视频| 一级中文字幕一区二区| 伊人性伊人情综合网| 亚洲视频每日更新| 亚洲人成影院在线观看| 综合久久综合久久| 国产在线精品免费av| 麻豆91免费看| 久久精品二区亚洲w码| 精品亚洲免费视频| 国产一区二区电影| 成人黄色777网| 成人av动漫网站| 色综合 综合色| 欧美日韩一区国产| 日韩一区二区在线观看视频 | 色综合久久中文综合久久97| 色婷婷久久久亚洲一区二区三区| 91久久一区二区| 欧美最猛黑人xxxxx猛交| 欧美日韩视频第一区| 欧美日韩国产一级片| 日韩亚洲欧美成人一区| 久久色在线视频| 国产日韩欧美a| 亚洲欧美电影一区二区| 又紧又大又爽精品一区二区| 亚洲电影视频在线| 精品一区二区三区欧美| 国产精品一区久久久久| 91色porny蝌蚪| 欧美片在线播放| 26uuu亚洲| 亚洲欧洲成人自拍| 日韩激情视频网站| 国产成+人+日韩+欧美+亚洲 | 7777精品久久久大香线蕉| 欧美一级一级性生活免费录像| 久久日一线二线三线suv| 国产精品久久久久久妇女6080| 亚洲一区二区免费视频| 久久9热精品视频| 成人综合婷婷国产精品久久免费| 欧美综合一区二区三区| 欧美一区二区三区免费大片 | 欧美精三区欧美精三区| 久久久久久久久久美女| 亚洲一区二区视频| 国产综合色产在线精品| 色美美综合视频| 精品99999| 一区二区三区在线播放| 狠狠色综合播放一区二区| 色呦呦国产精品| 国产亚洲精品久| 日韩精品一二区| 91亚洲资源网| 精品99久久久久久| 午夜影院久久久| 大胆欧美人体老妇| 欧美大片国产精品| 一区二区成人在线| 丁香另类激情小说| 日韩欧美国产一区二区三区| 亚洲黄色尤物视频| 成人网在线免费视频| 欧美一区二区三区四区视频| 国产精品国产三级国产三级人妇| 日韩精品1区2区3区| 欧美在线观看视频在线| 国产人妖乱国产精品人妖| 免费视频一区二区| 欧美久久久久久久久| 亚洲乱码中文字幕| 粉嫩嫩av羞羞动漫久久久| 精品国精品国产| 日韩成人免费在线| 欧美日韩精品是欧美日韩精品| 国产精品久久久久久户外露出| 狠狠色丁香婷婷综合久久片| 欧美日韩国产乱码电影| 亚洲丝袜美腿综合| 成人v精品蜜桃久久一区| 久久久久久久久免费| 久久99国产精品尤物| 91精品国产丝袜白色高跟鞋| 亚洲一区二区五区| 在线视频一区二区三区| 亚洲日本一区二区| 99国产精品久久久久久久久久久| 国产日韩欧美综合在线| 国产高清精品网站| 久久久久88色偷偷免费| 狠狠狠色丁香婷婷综合久久五月| 91精品一区二区三区在线观看| 亚洲国产欧美一区二区三区丁香婷| 91丝袜呻吟高潮美腿白嫩在线观看| 国产精品拍天天在线| 成人激情av网| 日韩毛片一二三区| 97精品国产97久久久久久久久久久久| 国产欧美日韩卡一| 成人av在线电影| 自拍偷拍国产精品| 欧美性色黄大片| 视频一区视频二区中文字幕| 欧美日韩亚州综合| 蜜桃av噜噜一区二区三区小说| 日韩亚洲欧美中文三级| 久久99久久久欧美国产| 26uuu精品一区二区| 国产成人综合在线| 亚洲欧美另类图片小说| 欧美日韩亚洲丝袜制服| 欧美aaa在线| 日本一区二区免费在线观看视频 | av在线不卡电影| 亚洲日本免费电影| 欧美日韩在线三级| 蜜桃传媒麻豆第一区在线观看| 久久精品亚洲精品国产欧美| 97精品国产露脸对白| 亚洲第一电影网| 26uuu精品一区二区在线观看| 成人午夜免费视频| 亚洲午夜av在线| 久久亚洲一区二区三区四区| 成人免费av在线| 亚洲成人免费在线观看| 久久午夜羞羞影院免费观看| 99久久99久久综合| 日本人妖一区二区|