亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2511bis-05.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁(yè) / 共 4 頁(yè)
字號(hào):
Internet Draft                            M. Myers (TraceRoute Security)PKIX Working Group                                    C. Adams (Entrust)November 2002                                         D. Solo (Citicorp)expires in six months                                      D. Kemp (DoD)               Internet X.509 Public Key Infrastructure               Certificate Request Message Format (CRMF)                  <draft-ietf-pkix-rfc2511bis-05.txt>Status of this Memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC 2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups. Note that other   groups may also distribute working documents as Internet-Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time. It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at   http://www.ietf.org/ietf/1id-abstracts.txt   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   Copyright (C) The Internet Society (2002). All Rights Reserved.1.  Abstract   This document describes the Certificate Request Message Format   (CRMF).  This syntax is used to convey a request for a certificate to   a Certification Authority (CA) (possibly via a Registration Authority   (RA)) for the purposes of X.509 certificate production.  The request   will typically include a public key and associated registration   information.   The key words "MUST", "REQUIRED", "SHOULD", "RECOMMENDED", and "MAY"   in this document (in uppercase, as shown) are to be interpreted as   described in RFC 2119.2.  Overview   Construction of a certification request involves the following steps:   a)  A CertRequest value is constructed.  This value may include the       public key, all or a portion of the end-entity's (EE's) name,       other requested certificate fields, and additional control       information related to the registration process.Myers, et. al.             Expires May 2003                     [Page 1]Internet Draft                                                  May 2001   b)  A proof of possession (of the private key corresponding to the       public key for which a certificate is being requested) value may       be calculated across the CertRequest value.   c)  Additional registration information may be combined with the       proof of possession value and the CertRequest structure to form a       CertReqMessage.   d)  The CertReqMessage is securely communicated to a CA. Specific       means of secure transport are beyond the scope of this       specification.3. CertReqMessage Syntax   A certificate request message is composed of the certificate request,   an optional proof of possession field and an optional registration   information field.   CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg   CertReqMsg ::= SEQUENCE {      certReq   CertRequest,      pop       ProofOfPossession  OPTIONAL,      -- content depends upon key type      regInfo   SEQUENCE SIZE(1..MAX) of AttributeTypeAndValue OPTIONAL    }   The proof of possession field is used to demonstrate that the entity   to be associated with the certificate is actually in possession of   the corresponding private key.  This field may be calculated across   the contents of the certReq field and varies in structure and content   by public key algorithm type and operational mode.   The regInfo field SHOULD only contain supplementary information   related to the context of the certification request when such   information is required to fulfill a certification request.  This   information MAY include subscriber contact information, billing   information or other ancillary information useful to fulfillment of   the certification request.   Information directly related to certificate content SHOULD be   included in the certReq content.  However, inclusion of additional   certReq content by RAs may invalidate the pop field.  Data therefore   intended for certificate content MAY be provided in regInfo.   See Section 8 and Appendix B for example regInfo contents.Myers, et. al.             Expires May 2003                     [Page 2]Internet Draft                                                  May 20014. Proof of Possession (POP)   In order to prevent certain attacks and to allow a CA/RA to properly   check the validity of the binding between an end entity and a key   pair, the PKI management operations specified here make it possible   for an end entity to prove that it has possession of (i.e., is able   to use) the private key corresponding to the public key for which a   certificate is requested.  A given CA/RA is free to choose how to   enforce POP (e.g., out-of-band procedural means versus the CRMF in-   band message) in its certification exchanges (i.e., this may be a   policy issue).  However, it is MANDATED that CAs/RAs MUST enforce POP   by some means because there are currently many non-PKIX operational   protocols in use (various electronic mail protocols are one example)   that do not explicitly check the binding between the end entity and   the private key.  Until operational protocols that do verify the   binding (for signature, encryption, and key agreement key pairs)   exist, and are ubiquitous, this binding can only be assumed to have   been verified by the CA/RA. Therefore, if the binding is not verified   by the CA/RA, certificates in the Internet Public-Key Infrastructure   end up being somewhat less meaningful.   POP is accomplished in different ways depending on the type of key   for which a certificate is requested. If a key can be used for   multiple purposes (e.g., an RSA key) then any of the methods MAY be   used.   This specification allows for cases where POP is validated by the CA,   the RA, or both.  Some policies may require the CA to verify POP   during certification, in which case the RA MUST forward the end   entity's CertRequest and ProofOfPossession fields unaltered to the   CA, and as an option MAY also verify POP.  If the CA is not required   by policy to verify POP, then the RA SHOULD forward the end entity's   request and proof unaltered to the CA as above.  If this is not   possible (for example because the RA verifies POP by an out-of-band   method), then the RA MAY attest to the CA that the required proof has   been validated. If the CA uses an out-of-band method to verify POP   (such as physical delivery of CA-generated private keys), then the   ProofOfPossession field is not used.4.1 Signature Keys   For signature keys, the end entity can sign a value to prove   possession of the private key.Myers, et. al.             Expires May 2003                     [Page 3]Internet Draft                                                  May 20014.2 Key Encipherment Keys   For key encipherment keys, the end entity can provide the private key   to the CA/RA, or can be required to decrypt a value in order to prove   possession of the private key. Decrypting a value can be achieved   either directly or indirectly.   The direct method is for the RA/CA to issue a random challenge to   which an immediate response by the end entity is required.   The indirect method is to issue a certificate which is encrypted for   the end entity (and have the end entity demonstrate its ability to   decrypt this certificate in a confirmation message). This allows a CA   to issue a certificate in a form which can only be used by the   intended end entity.4.3 Key Agreement Keys   For key agreement keys, the end entity can use any of the three   methods given in Section 5.2 for encryption keys.  For the direct and   indirect methods, the end entity and the PKI management entity (i.e.,   CA or RA) must establish a shared secret key in order to prove that   the end entity has possession of the private key (i.e., in order to   decrypt the encrypted certificate or to construct the response to the   issued challenge).  Note that this need not impose any restrictions   on the keys that can be certified by a given CA -- in particular, for   Diffie-Hellman keys the end entity may freely choose its algorithm   parameters -- provided that the CA can generate a short-term (or   one-time) key pair with the appropriate parameters when necessary.   The end entity may also MAC the certificate request (using a shared   secret key derived from a Diffie-Hellman computation) as a fourth   alternative for demonstrating POP.  This option may be used only if   the CA already has a DH certificate that is known to the end entity   and if the EE is willing to use the CA's DH parameters.4.4 Proof of Possession Syntax   ProofOfPossession ::= CHOICE {       raVerified        [0] NULL,       -- used if the RA has already verified that the requester is in       -- possession of the private key       signature         [1] POPOSigningKey,       keyEncipherment   [2] POPOPrivKey,       keyAgreement      [3] POPOPrivKey }   POPOSigningKey ::= SEQUENCE {       poposkInput         [0] POPOSigningKeyInput OPTIONAL,Myers, et. al.             Expires May 2003                     [Page 4]Internet Draft                                                  May 2001       algorithmIdentifier     AlgorithmIdentifier,       signature               BIT STRING }       -- The signature (using "algorithmIdentifier") is on the       -- DER-encoded value of poposkInput.  NOTE: If the CertReqMsg       -- certReq CertTemplate contains the subject and publicKey values,       -- then poposkInput MUST be omitted and the signature MUST be       -- computed on the DER-encoded value of CertReqMsg certReq.  If       -- the CertReqMsg certReq CertTemplate does not contain both the        -- public key and subject values (i.e., if it contains only one        -- of these, or neither), then poposkInput MUST be present and       -- MUST be signed.     POPOSigningKeyInput ::= SEQUENCE {       authInfo            CHOICE {           sender              [0] GeneralName,           -- used only if an authenticated identity has been           -- established for the sender (e.g., a DN from a           -- previously-issued and currently-valid certificate)           publicKeyMAC        PKMACValue },           -- used if no authenticated GeneralName currently exists for           -- the sender; publicKeyMAC contains a password-based MAC           -- on the DER-encoded value of publicKey       publicKey           SubjectPublicKeyInfo }  -- from CertTemplate   PKMACValue ::= SEQUENCE {      algId  AlgorithmIdentifier,      -- the algorithm value shall be PasswordBasedMac      --     {1 2 840 113533 7 66 13}      -- the parameter value is PBMParameter      value  BIT STRING }   POPOPrivKey ::= CHOICE {       thisMessage       [0] BIT STRING,       -- posession is proven in this message (which contains the private       -- key itself (encrypted for the CA))       subsequentMessage [1] SubsequentMessage,       -- possession will be proven in a subsequent message       dhMAC             [2] BIT STRING }       -- for keyAgreement (only), possession is proven in this message       -- (which contains a MAC (over the DER-encoded value of the       -- certReq parameter in CertReqMsg, which must include both subject       -- and publicKey) based on a key derived from the end entity's       -- private DH key and the CA's public DH key);       -- the dhMAC value MUST be calculated as per the directions given       -- in Appendix A.   SubsequentMessage ::= INTEGER {Myers, et. al.             Expires May 2003                     [Page 5]Internet Draft                                                  May 2001       encrCert (0),       -- requests that resulting certificate be encrypted for the       -- end entity (following which, POP will be proven in a       -- confirmation message)       challengeResp (1) }       -- requests that CA/RA engage in challenge-response exchange with       -- end entity in order to prove private key possession   It is expected that protocols which incorporate this specification   will include the confirmation and challenge-response messages   necessary to a complete protocol.4.4.1  Use of Password-Based MAC   The following algorithm SHALL be used when publicKeyMAC is used in   POPOSigningKeyInput to prove the authenticity of a request.   PBMParameter ::= SEQUENCE {         salt                OCTET STRING,         owf                 AlgorithmIdentifier,         -- AlgId for a One-Way Function (SHA-1 recommended)         iterationCount      INTEGER,         -- number of times the OWF is applied         mac                 AlgorithmIdentifier         -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],   }   -- or HMAC [RFC2104, RFC2202])   The process of using PBMParameter to compute publicKeyMAC and so   authenticate the origin of a public key certification request   consists of two stages. The first stage uses shared secret   information to produce a MAC key. The second stage MACs the public   key in question using this MAC key to produce an authenticated value.   Initialization of the first stage of algorithm assumes the existence   of a shared secret distributed in a trusted fashion between CA/RA and   end-entity.  The salt value is appended to the shared secret and the   one way function (owf) is applied iterationCount times, where the   salted secret is the input to the first iteration and, for each   successive iteration, the input is set to be the output of the   previous iteration, yielding a key K.   In the second stage, K and the public key are inputs to HMAC as   documented in [HMAC] to produce a value for publicKeyMAC as follows:   publicKeyMAC = Hash( K XOR opad, Hash( K XOR ipad, public key) )   where ipad and opad are defined in [RFC2104].Myers, et. al.             Expires May 2003                     [Page 6]Internet Draft                                                  May 2001   The AlgorithmIdentifier for owf SHALL be SHA-1 {1 3 14 3 2 26} and   for mac SHALL be HMAC-SHA1 {1 3 6 1 5 5 8 1 2}.5.  CertRequest syntax   The CertRequest syntax consists of a request identifier, a template   of certificate content, and an optional sequence of control   information.   CertRequest ::= SEQUENCE {      certReqId     INTEGER,        -- ID for matching request and reply

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美国产毛片在线| 久久久精品欧美丰满| 轻轻草成人在线| 欧美经典一区二区| 欧美日本一道本在线视频| 成人sese在线| 麻豆一区二区三| 亚洲精品成人少妇| 久久亚洲综合色一区二区三区| 日本久久一区二区| 国产激情91久久精品导航 | 精品国产一区二区三区忘忧草| eeuss鲁一区二区三区| 久久av资源站| 日本欧美加勒比视频| 亚洲精品成人在线| 中文字幕在线观看不卡| 久久久午夜精品| 日韩一区二区三区观看| 欧美久久久一区| 色综合天天性综合| 国产成人精品综合在线观看| 久久狠狠亚洲综合| 蜜臀av一区二区在线免费观看 | 亚洲精品在线免费观看视频| 欧美三级一区二区| 91丝袜美女网| 成人黄色av网站在线| 国产成人av一区二区三区在线| 久久电影网站中文字幕| 美女视频黄免费的久久| 五月天丁香久久| 天堂午夜影视日韩欧美一区二区| 亚洲一区二区五区| 一区二区三区精品| 一卡二卡欧美日韩| 亚洲自拍偷拍综合| 亚洲伊人伊色伊影伊综合网| 亚洲激情自拍视频| 一区二区三区产品免费精品久久75| 成人免费在线播放视频| 国产精品久久久久久久久免费相片 | 中文字幕一区免费在线观看 | 亚洲综合视频在线| 一区二区三区欧美日| 亚洲图片有声小说| 午夜国产精品一区| 日韩av电影免费观看高清完整版 | 不卡一区在线观看| 波波电影院一区二区三区| 成人美女视频在线观看| 97久久人人超碰| 欧美在线|欧美| 这里只有精品免费| 亚洲精品一区二区三区四区高清 | 精品国产伦一区二区三区观看方式 | 天天操天天干天天综合网| 亚洲一区二区三区自拍| 亚洲福利视频导航| 日韩av高清在线观看| 国产一区二区三区免费播放| 国产成人超碰人人澡人人澡| caoporm超碰国产精品| 色嗨嗨av一区二区三区| 欧美老人xxxx18| 精品国产乱码久久久久久牛牛 | 91精品国产综合久久精品性色| 日韩欧美综合一区| 国产日韩精品一区二区浪潮av| 国产精品超碰97尤物18| 亚洲成人综合网站| 久久99国产精品久久| 成人97人人超碰人人99| 欧美日韩一区二区欧美激情| 日韩美女一区二区三区四区| 国产精品网站一区| 天堂资源在线中文精品| 国产a视频精品免费观看| 欧美三区在线视频| 精品电影一区二区三区| 夜夜揉揉日日人人青青一国产精品| 日本欧美在线观看| 成人av动漫网站| 日韩欧美你懂的| 亚洲精品视频在线观看免费| 久久99久久久久久久久久久| 99久久久精品| 日韩亚洲欧美高清| 亚洲精品高清视频在线观看| 狠狠色丁香婷婷综合| 在线视频一区二区免费| 久久精品视频一区二区三区| 亚洲午夜免费福利视频| 成人黄色片在线观看| 欧美一级黄色录像| 亚洲视频网在线直播| 激情亚洲综合在线| 欧美日韩综合一区| 国产精品三级视频| 久久精品噜噜噜成人av农村| 欧美性受极品xxxx喷水| 欧美国产精品中文字幕| 日本一不卡视频| 91精品办公室少妇高潮对白| 久久久国产一区二区三区四区小说 | 日韩一级完整毛片| 一区二区在线观看免费视频播放 | 在线免费亚洲电影| 国产欧美日韩在线| 精品一区二区综合| 欧美情侣在线播放| 一区二区三区四区av| 成人av资源站| 久久久久久综合| 蜜臀久久久久久久| 欧美日韩一区三区| 伊人色综合久久天天| 91污在线观看| 国产精品三级电影| 成人性视频网站| 欧美精品一区二区三区很污很色的| 亚洲成人www| 在线观看视频欧美| 亚洲精品久久嫩草网站秘色| 成人毛片视频在线观看| 国产精品三级久久久久三级| 国产99久久久国产精品潘金网站| 欧美成人国产一区二区| 免费成人你懂的| 日韩一级二级三级| 久久狠狠亚洲综合| 欧美mv和日韩mv的网站| 久久国产精品色| 精品久久久网站| 国精品**一区二区三区在线蜜桃| 日韩欧美国产一区二区在线播放| 日韩国产欧美在线播放| 欧美一区二区成人6969| 美女视频免费一区| 精品电影一区二区| 国产成人午夜99999| 国产欧美中文在线| 国产成人av自拍| 中文字幕一区二区三区在线播放| 9久草视频在线视频精品| 日韩毛片高清在线播放| 色悠悠久久综合| 亚洲一区二区在线播放相泽| 欧美日韩电影一区| 精品综合久久久久久8888| 2014亚洲片线观看视频免费| 国产一区二三区| 国产精品乱码久久久久久| 91麻豆国产自产在线观看| 亚洲午夜久久久久久久久电影院 | 免费一级片91| 国产偷v国产偷v亚洲高清| 99免费精品在线| 一区二区三区久久久| 欧美一级搡bbbb搡bbbb| 国产激情一区二区三区四区 | 91麻豆免费看| 日韩av在线发布| 国产精品视频一二三| 日本道精品一区二区三区 | 国产成人精品亚洲777人妖 | 91网站视频在线观看| 亚洲综合视频在线观看| 欧美变态凌虐bdsm| 91麻豆国产福利在线观看| 日韩电影在线一区二区| 国产喂奶挤奶一区二区三区| 在线观看日产精品| 精品亚洲aⅴ乱码一区二区三区| 中文一区一区三区高中清不卡| 一本一本久久a久久精品综合麻豆 一本一道波多野结衣一区二区 | xnxx国产精品| 日本韩国精品在线| 久久99精品国产| 亚洲人亚洲人成电影网站色| 91精品国模一区二区三区| 成人激情电影免费在线观看| 偷拍与自拍一区| 国产精品国产三级国产普通话蜜臀| 欧美日韩一区二区三区四区| 国产xxx精品视频大全| 首页欧美精品中文字幕| 中文字幕一区二区三| 欧美一区二区三区免费在线看 | 日韩精品中文字幕一区| 成人久久久精品乱码一区二区三区| 日日摸夜夜添夜夜添精品视频 | 欧美国产精品久久| 7777精品伊人久久久大香线蕉最新版| 高清不卡一二三区| 蜜臀av一区二区在线免费观看 | 精品久久人人做人人爱| 欧美三级在线视频| 91在线观看地址| 国产精品一区二区三区乱码|