亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2511bis-05.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
   Suite 6734   9800 Savage Road   Fort Meade, MD 20755   EMail: dpkemp@missi.ncsc.milMyers, et. al.             Expires May 2003                    [Page 13]Internet Draft                                                  May 2001Appendix A. Constructing "dhMAC"   This Appendix describes the method for computing the bit string   "dhMAC" in the proof-of-possession POPOPrivKey structure for Diffie-   Hellman certificate requests.   1. The entity generates a DH public/private key-pair.       The DH parameters used to calculate the public SHOULD be those       specified in the CA's DH certificate.       From CA's DH certificate:          CApub = g^x mod p   (where g and p are the established DH                               parameters and x is the CA's private                               DH component)       For entity E:          DH private value = y          Epub = DH public value = g^y mod p   2. The MACing process will then consist of the following steps.   a) The value of the certReq field is DER encoded, yielding a binary      string. This will be the 'text' referred to in [HMAC], the data to      which HMAC-SHA1 is applied.   b) A shared DH secret is computed, as follows,                      shared secret = Kec = g^xy mod p      [This is done by the entity E as CApub^y and by the CA as Epub^x,      where CApub is retrieved from the CA's DH certificate and Epub is      retrieved from the actual certification request.]   c)  A key K is derived from the shared secret Kec and the subject and      issuer names in the CA's certificate as follows:      K = SHA1(DER-encoded-subjectName | Kec | DER-encoded-issuerName)      where "|" means concatenation.  If subjectName in the CA      certificate is an empty SEQUENCE then DER-encoded-subjectAltName      should be used instead; similarly, if issuerName is an empty      SEQUENCE then DER-encoded-issuerAltName should be used instead.   d) Compute HMAC-SHA1 over the data 'text' as per [RFC2104] as:         SHA1(K XOR opad, SHA1(K XOR ipad, text))Myers, et. al.             Expires May 2003                    [Page 14]Internet Draft                                                  May 2001      where,         opad (outer pad) = the byte 0x36 repeated 64 times      and         ipad (inner pad) = the byte 0x5C repeated 64 times.      Namely,         (1) Append zeros to the end of K to create a 64 byte string             (e.g., if K is of length 16 bytes it will be appended with             48 zero bytes 0x00).         (2) XOR (bitwise exclusive-OR) the 64 byte string computed in             step (1) with ipad.         (3) Append the data stream 'text' to the 64 byte string             resulting from step (2).         (4) Apply SHA1 to the stream generated in step (3).         (5) XOR (bitwise exclusive-OR) the 64 byte string computed in             step (1) with opad.         (6) Append the SHA1 result from step (4) to the 64 byte string             resulting from step (5).         (7) Apply SHA1 to the stream generated in step (6) and output             the result.          Sample code is also provided in [RFC2104, RFC2202].   e) The output of (d) is encoded as a BIT STRING (the value "dhMAC").   3. The proof-of-possession process requires the CA to carry out      steps (a) through (d) and then simply compare the result of step      (d) with what it received as the "dhMAC" value. If they match then      the following can be concluded.       1) The Entity possesses the private key corresponding to the          public key in the certification request (because it needed the          private key to calculate the shared secret).       2) Only the intended CA can actually verify the request (because          the CA requires its own private key to compute the same shared          secret).  This helps to protect from rogue CAs.References   [RFC2104] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC:  Keyed             Hashing for Message Authentication", RFC 2104, February             1997.   [RFC2202] Cheng, P. and R. Glenn, "Test Cases for HMAC-MD5 and HMAC-             SHA-1", RFC 2202, September 1997.Acknowledgements   The details of this Appendix were provided by Hemma Prafullchandra.Myers, et. al.             Expires May 2003                    [Page 15]Internet Draft                                                  May 2001Appendix B. Use of RegInfo for Name-Value Pairs   The "value" field of the id-regInfo-utf8Pairs string (with "tag"   field equal to 12 and appropriate "length" field) will contain a   series of UTF8 name/value pairs.   This Appendix lists some common examples of such pairs for the   purpose of promoting interoperability among independent   implementations of this specification.  It is recognized that this   list is not exhaustive and will grow with time and implementation   experience.B.1. Example Name/Value Pairs   When regInfo is used to convey one or more name-value pairs (via id-   regInfo-utf8Pairs), the first and subsequent pairs SHALL be   structured as follows:      [name?value][%name?value]*%   This string is then encoded into a UTF8STRING and placed into the   regInfo SEQUENCE.   Reserved characters are encoded using the %xx mechanism of [RFC1738],   unless they are used for their reserved purposes.   The following table defines a recommended set of named elements.   The value in the column "Name Value" is the exact text string that   will appear in the regInfo.      Name Value      ----------      version            -- version of this variation of regInfo use      corp_company       -- company affiliation of subscriber      org_unit           -- organizational unit      mail_firstName     -- personal name component      mail_middleName    -- personal name component      mail_lastName      -- personal name component      mail_email         -- subscriber's email address      jobTitle           -- job title of subscriber      employeeID         -- employee identification number or string      mailStop           -- mail stop      issuerName         -- name of CA      subjectName        -- name of Subject      validity           -- validity intervalMyers, et. al.             Expires May 2003                    [Page 16]Internet Draft                                                  May 2001   For example:      version?1%corp_company?Acme, Inc.%org_unit?Engineering%      mail_firstName?John%mail_lastName?Smith%jobTitle?Team Leader%      mail_email?john@acme.com%B.1.1. IssuerName, SubjectName and Validity Value Encoding   When they appear in id-regInfo-utf8Pairs syntax as named elements,   the encoding of values for issuerName, subjectName and validity SHALL   use the following syntax.  The characters [] indicate an optional   field, ::= and | have their usual BNF meanings, and all other symbols   (except spaces which are insignificant) outside non-terminal names   are terminals.  Alphabetics are case-sensitive.      issuerName  ::= <names>      subjectName ::= <names>      <names>     ::= <name> | <names>:<name>      <validity>  ::= validity ? [<notbefore>]-[<notafter>]      <notbefore> ::= <time>      <notafter>  ::= <time>   Where <time> is UTC time in the form YYYYMMDD[HH[MM[SS]]].  HH, MM,   and SS default to 00 and are omitted if at the and of value 00.   Example validity encoding:      validity?-19991231%   is a validity interval with no value for notBefore and a value of   December 31, 1999 for notAfter.   Each name comprises a single character name form identifier followed   by a name value of one or UTF8 characters. Within a name value, when   it is necessary to disambiguate a character which has formatting   significance at an outer level, the escape sequence %xx SHALL be   used, where xx represents the hex value for the encoding concerned.   The percent symbol is represented by %%.      <name> ::= X<xname>|O<oname>|E<ename>|D<dname>|U<uname>|I<iname>   Name forms and value formats are as follows:   X.500 directory name form (identifier "X"):Myers, et. al.             Expires May 2003                    [Page 17]Internet Draft                                                  May 2001   <xname> ::= <rdns>      <rdns>  ::= <rdn> | <rdns> , <rdn>      <rdn>   ::= <avas>      <avas>  ::= <ava> | <avas> + <ava>      <ava>   ::= <attyp> = <avalue>      <attyp> ::= OID.<oid> | <stdat>   Standard attribute type <stdat> is an alphabetic attribute type   identifier from the following set:      C      (country)      L      (locality)      ST     (state or province)      O      (organization)      OU     (organizational unit)      CN     (common name)      STREET (street address)      E      (E-mail address).   <avalue> is a name component in the form of a UTF8 character string   of 1 to 64 characters, with the restriction that in the IA5 subset of   UTF8 only the characters of ASN.1 PrintableString may be used.   Other name form (identifier "O"):      <oname> ::= <oid> , <utf8string>   E-mail address (rfc822name) name form (identifier "E"):      <ename> ::= <ia5string>   DNS name form (identifier "D"):      <dname> ::= <ia5string>   URI name form (identifier "U"):      <uname> ::= <ia5string>   IP address (identifier "I"):      <iname> ::= <oid>   For example:      issuerName?XOU=Our CA,O=Acme,C=US%      subjectName?XCN=John Smith, O=Acme, C=US, E=john@acme.com%References   [RFC1738]  Berners-Lee, T., Masinter, L. and M.  McCahill,             "Uniform Resource Locators (URL)", RFC 1738, December 1994.Myers, et. al.             Expires May 2003                    [Page 18]Internet Draft                                                  May 2001Appendix C. ASN.1 Structures and OIDsPKIXCRMF {iso(1) identified-organization(3) dod(6) internet(1)   security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-crmf(5)}DEFINITIONS IMPLICIT TAGS ::=BEGINIMPORTS     -- Directory Authentication Framework (X.509)        Version, AlgorithmIdentifier, Name, Time,        SubjectPublicKeyInfo, Extensions, UniqueIdentifier           FROM PKIX1Explicit88 {iso(1) identified-organization(3) dod(6)               internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)               id-pkix1-explicit-88(1)}     -- Certificate Extensions (X.509)        GeneralName           FROM PKIX1Implicit88 {iso(1) identified-organization(3) dod(6)                  internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)                  id-pkix1-implicit-88(2)}     -- Cryptographic Message Syntax        EnvelopedData           FROM CryptographicMessageSyntax { iso(1) member-body(2)                us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16)                modules(0) cms(1) };CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsgCertReqMsg ::= SEQUENCE {    certReq   CertRequest,    pop       ProofOfPossession  OPTIONAL,    -- content depends upon key type    regInfo   SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue OPTIONAL }CertRequest ::= SEQUENCE {    certReqId     INTEGER,          -- ID for matching request and reply    certTemplate  CertTemplate,  -- Selected fields of cert to be issued    controls      Controls OPTIONAL }   -- Attributes affecting issuance

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美丰满少妇xxxbbb| 国产一区欧美一区| 欧美吻胸吃奶大尺度电影| 亚洲精品免费在线| 在线看日韩精品电影| 夜色激情一区二区| 欧美日韩在线播放三区四区| 日韩中文欧美在线| 久久婷婷成人综合色| 国产精品一区2区| 国产精品色哟哟| 91久久精品一区二区三| 亚洲综合色在线| 欧美一区二区三区爱爱| 国产乱子轮精品视频| 最新成人av在线| 91精品国产综合久久福利| 韩国欧美一区二区| 亚洲日本一区二区| 91麻豆精品国产自产在线 | 97se狠狠狠综合亚洲狠狠| 亚洲少妇中出一区| 欧美一区二区视频在线观看2020| 久久不见久久见免费视频7| 中文字幕国产一区| 欧美日韩精品一区二区天天拍小说 | 91精品国产91久久久久久一区二区| 久久99这里只有精品| 中文字幕一区免费在线观看| 91久久线看在观草草青青| 精品一区二区成人精品| 亚洲人成网站色在线观看| 欧美一级日韩一级| 91啪亚洲精品| 国产乱码字幕精品高清av| 一区二区三区欧美| 国产性天天综合网| 在线成人免费观看| 播五月开心婷婷综合| 美女视频黄a大片欧美| 亚洲色图清纯唯美| 国产夜色精品一区二区av| 欧美美女bb生活片| 91小宝寻花一区二区三区| 久久国产精品无码网站| 亚洲国产视频一区| 国产精品久久久久久久久搜平片 | 在线91免费看| 91香蕉视频污在线| 国产精品一区三区| 日本不卡不码高清免费观看| 亚洲免费电影在线| 国产欧美视频一区二区| 日韩欧美一区电影| 欧美猛男超大videosgay| 91日韩一区二区三区| 成人免费看视频| 国产呦萝稀缺另类资源| 美女尤物国产一区| 日韩高清在线一区| 一区二区视频免费在线观看| 中文一区在线播放| 国产色产综合色产在线视频| 日韩一区二区三区电影| 欧美日韩一区二区在线观看| 91蜜桃在线观看| 成人精品gif动图一区| 国产麻豆一精品一av一免费| 激情综合色播激情啊| 免费观看久久久4p| 免费精品视频在线| 麻豆成人在线观看| 男男gaygay亚洲| 免费在线一区观看| 极品美女销魂一区二区三区| 久久9热精品视频| 国产乱码一区二区三区| 国产精品白丝jk白祙喷水网站| 美女在线视频一区| 国产原创一区二区三区| 国产制服丝袜一区| 国产在线播放一区三区四| 国产成人精品一区二区三区四区| 国产精品一二三四| 国产成人亚洲精品青草天美| 成人精品一区二区三区中文字幕| 国产精品自在在线| 不卡区在线中文字幕| 91污片在线观看| 欧美亚洲精品一区| 日韩视频免费观看高清完整版在线观看| 欧美电影一区二区| 欧美va亚洲va| 欧美国产日韩亚洲一区| 亚洲欧洲www| 亚洲夂夂婷婷色拍ww47| 日韩精品一级中文字幕精品视频免费观看| 日韩 欧美一区二区三区| 国产在线播精品第三| 99久久精品免费看| 欧美日韩黄色一区二区| 日韩免费高清电影| 国产精品久久毛片| 亚洲成人av电影| 国产一区二区久久| 色欲综合视频天天天| 日韩午夜精品视频| 国产精品大尺度| 婷婷一区二区三区| 国产精品中文字幕欧美| 一本色道久久综合亚洲aⅴ蜜桃 | 亚洲欧美在线视频观看| 一区二区高清在线| 秋霞av亚洲一区二区三| 粉嫩在线一区二区三区视频| 精品视频在线看| 国产亚洲精品7777| 五月婷婷综合网| 成人av网站大全| 日韩西西人体444www| 亚洲精品日产精品乱码不卡| 美女性感视频久久| 色婷婷精品大视频在线蜜桃视频| 在线成人小视频| 亚洲图片激情小说| 久久成人免费日本黄色| 欧美性色黄大片手机版| ww久久中文字幕| 日韩高清不卡在线| bt7086福利一区国产| 精品日韩欧美一区二区| 亚洲国产人成综合网站| 国产**成人网毛片九色| 日韩免费看网站| 亚洲综合视频在线观看| 国产成人亚洲精品青草天美| 制服视频三区第一页精品| 亚洲乱码精品一二三四区日韩在线 | 久久中文字幕电影| 亚洲成年人影院| 91色在线porny| 久久精品综合网| 麻豆成人91精品二区三区| 欧美人牲a欧美精品| 亚洲色欲色欲www| 成人免费视频视频在线观看免费| 日韩欧美一区二区三区在线| 亚洲无线码一区二区三区| 色综合久久88色综合天天免费| 国产日产欧美一区二区视频| 开心九九激情九九欧美日韩精美视频电影| 色哟哟欧美精品| 国产精品女上位| 懂色中文一区二区在线播放| 337p日本欧洲亚洲大胆色噜噜| 青青草成人在线观看| 欧美日韩一区中文字幕| 亚洲最大的成人av| 日本电影欧美片| 一区二区三区波多野结衣在线观看 | 亚洲精品日产精品乱码不卡| 9久草视频在线视频精品| 亚洲国产精品国自产拍av| 国产精品综合视频| 国产亚洲精品精华液| 国产91对白在线观看九色| 欧美韩日一区二区三区| 国产精品77777| 国产精品免费久久久久| 成人午夜大片免费观看| 国产精品天干天干在观线| 成人激情文学综合网| 国产精品国产三级国产有无不卡 | 久久国产精品免费| 精品久久久久一区二区国产| 精品一区二区在线播放| 久久久精品国产99久久精品芒果 | 亚洲高清不卡在线观看| 欧美日本视频在线| 久久国产精品72免费观看| 久久无码av三级| 成人白浆超碰人人人人| 综合电影一区二区三区| 欧美亚洲免费在线一区| 日韩中文字幕不卡| 久久精品亚洲乱码伦伦中文| 成人性生交大片免费看中文网站| 亚洲日本在线天堂| 91精品国产综合久久精品| 国产一区亚洲一区| 最新中文字幕一区二区三区| 欧美性猛片xxxx免费看久爱| 日韩精品一二三四| 久久久www成人免费毛片麻豆 | 国产在线播放一区二区三区| 国产精品免费视频网站| 欧美视频一区二| 狠狠色狠狠色综合| 中文字幕一区二区三区av| 欧美日韩国产天堂|