亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2560.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
Network Working Group                                           M. MyersRequest for Comments: 2560                                      VeriSignCategory: Standards Track                                      R. Ankney                                                                  CertCo                                                              A. Malpani                                                                ValiCert                                                             S. Galperin                                                                  My CFO                                                                C. Adams                                                    Entrust Technologies                                                               June 1999                X.509 Internet Public Key Infrastructure               Online Certificate Status Protocol - OCSPStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.1.  Abstract   This document specifies a protocol useful in determining the current   status of a digital certificate without requiring CRLs. Additional   mechanisms addressing PKIX operational requirements are specified in   separate documents.   An overview of the protocol is provided in section 2. Functional   requirements are specified in section 4. Details of the protocol are   in section 5. We cover security issues with the protocol in section   6. Appendix A defines OCSP over HTTP, appendix B accumulates ASN.1   syntactic elements and appendix C specifies the mime types for the   messages.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document (in uppercase, as shown) are to be interpreted as described   in [RFC2119].Myers, et al.               Standards Track                     [Page 1]RFC 2560                       PKIX OCSP                       June 19992.  Protocol Overview   In lieu of or as a supplement to checking against a periodic CRL, it   may be necessary to obtain timely information regarding the   revocation status of a certificate (cf. [RFC2459], Section 3.3).   Examples include high-value funds transfer or large stock trades.   The Online Certificate Status Protocol (OCSP) enables applications to   determine the (revocation) state of an identified certificate. OCSP   may be used to satisfy some of the operational requirements of   providing more timely revocation information than is possible with   CRLs and may also be used to obtain additional status information. An   OCSP client issues a status request to an OCSP responder and suspends   acceptance of the certificate in question until the responder   provides a response.   This protocol specifies the data that needs to be exchanged between   an application checking the status of a certificate and the server   providing that status.2.1  Request   An OCSP request contains the following data:   -- protocol version   -- service request   -- target certificate identifier   -- optional extensions which MAY be processed by the OCSP Responder   Upon receipt of a request, an OCSP Responder determines if:   1. the message is well formed   2. the responder is configured to provide the requested service and   3. the request contains the information needed by the responder If   any one of the prior conditions are not met, the OCSP responder   produces an error message; otherwise, it returns a definitive   response.2.2  Response   OCSP responses can be of various types.  An OCSP response consists of   a response type and the bytes of the actual response. There is one   basic type of OCSP response that MUST be supported by all OCSP   servers and clients. The rest of this section pertains only to this   basic response type.Myers, et al.               Standards Track                     [Page 2]RFC 2560                       PKIX OCSP                       June 1999   All definitive response messages SHALL be digitally signed. The key   used to sign the response MUST belong to one of the following:   -- the CA who issued the certificate in question   -- a Trusted Responder whose public key is trusted by the requester   -- a CA Designated Responder (Authorized Responder) who holds a      specially marked certificate issued directly by the CA, indicating      that the responder may issue OCSP responses for that CA   A definitive response message is composed of:   -- version of the response syntax   -- name of the responder   -- responses for each of the certificates in a request   -- optional extensions   -- signature algorithm OID   -- signature computed across hash of the response   The response for each of the certificates in a request consists of   -- target certificate identifier   -- certificate status value   -- response validity interval   -- optional extensions   This specification defines the following definitive response   indicators for use in the certificate status value:   -- good   -- revoked   -- unknown   The "good" state indicates a positive response to the status inquiry.   At a minimum, this positive response indicates that the certificate   is not revoked, but does not necessarily mean that the certificate   was ever issued or that the time at which the response was produced   is within the certificate's validity interval. Response extensions   may be used to convey additional information on assertions made by   the responder regarding the status of the certificate such as   positive statement about issuance, validity, etc.   The "revoked" state indicates that the certificate has been revoked   (either permanantly or temporarily (on hold)).   The "unknown" state indicates that the responder doesn't know about   the certificate being requested.Myers, et al.               Standards Track                     [Page 3]RFC 2560                       PKIX OCSP                       June 19992.3  Exception Cases   In case of errors, the OCSP Responder may return an error message.   These messages are not signed. Errors can be of the following types:   -- malformedRequest   -- internalError   -- tryLater   -- sigRequired   -- unauthorized   A server produces the "malformedRequest" response if the request   received does not conform to the OCSP syntax.   The response "internalError" indicates that the OCSP responder   reached an inconsistent internal state. The query should be retried,   potentially with another responder.   In the event that the OCSP responder is operational, but unable to   return a status for the requested certificate, the "tryLater"   response can be used to indicate that the service exists, but is   temporarily unable to respond.   The response "sigRequired" is returned in cases where the server   requires the client sign the request in order to construct a   response.   The response "unauthorized" is returned in cases where the client is   not authorized to make this query to this server.2.4  Semantics of thisUpdate, nextUpdate and producedAt   Responses can contain three times in them - thisUpdate, nextUpdate   and producedAt. The semantics of these fields are:   - thisUpdate: The time at which the status being indicated is known                 to be correct   - nextUpdate: The time at or before which newer information will be                 available about the status of the certificate   - producedAt: The time at which the OCSP responder signed this                 response.   If nextUpdate is not set, the responder is indicating that newer   revocation information is available all the time.Myers, et al.               Standards Track                     [Page 4]RFC 2560                       PKIX OCSP                       June 19992.5  Response Pre-production   OCSP responders MAY pre-produce signed responses specifying the   status of certificates at a specified time. The time at which the   status was known to be correct SHALL be reflected in the thisUpdate   field of the response. The time at or before which newer information   will be available is reflected in the nextUpdate field, while the   time at which the response was produced will appear in the producedAt   field of the response.2.6  OCSP Signature Authority Delegation   The key that signs a certificate's status information need not be the   same key that signed the certificate. A certificate's issuer   explicitly delegates OCSP signing authority by issuing a certificate   containing a unique value for extendedKeyUsage in the OCSP signer's   certificate. This certificate MUST be issued directly to the   responder by the cognizant CA.2.7  CA Key Compromise   If an OCSP responder knows that a particular CA's private key has   been compromised, it MAY return the revoked state for all   certificates issued by that CA.3.  Functional Requirements3.1  Certificate Content   In order to convey to OCSP clients a well-known point of information   access, CAs SHALL provide the capability to include the   AuthorityInfoAccess extension (defined in [RFC2459], section 4.2.2.1)   in certificates that can be checked using OCSP.  Alternatively, the   accessLocation for the OCSP provider may be configured locally at the   OCSP client.   CAs that support an OCSP service, either hosted locally or provided   by an Authorized Responder, MUST provide for the inclusion of a value   for a uniformResourceIndicator (URI) accessLocation and the OID value   id-ad-ocsp for the accessMethod in the AccessDescription SEQUENCE.   The value of the accessLocation field in the subject certificate   defines the transport (e.g. HTTP) used to access the OCSP responder   and may contain other transport dependent information (e.g. a URL).Myers, et al.               Standards Track                     [Page 5]RFC 2560                       PKIX OCSP                       June 19993.2  Signed Response Acceptance Requirements   Prior to accepting a signed response as valid, OCSP clients SHALL   confirm that:   1. The certificate identified in a received response corresponds to   that which was identified in the corresponding request;   2. The signature on the response is valid;   3. The identity of the signer matches the intended recipient of the   request.   4. The signer is currently authorized to sign the response.   5. The time at which the status being indicated is known to be   correct (thisUpdate) is sufficiently recent.   6. When available, the time at or before which newer information will   be available about the status of the certificate (nextUpdate) is   greater than the current time.4.  Detailed Protocol   The ASN.1 syntax imports terms defined in [RFC2459]. For signature   calculation, the data to be signed is encoded using the ASN.1   distinguished encoding rules (DER) [X.690].   ASN.1 EXPLICIT tagging is used as a default unless specified   otherwise.   The terms imported from elsewhere are: Extensions,   CertificateSerialNumber, SubjectPublicKeyInfo, Name,   AlgorithmIdentifier, CRLReason4.1  Requests   This section specifies the ASN.1 specification for a confirmation   request. The actual formatting of the message could vary depending on   the transport mechanism used (HTTP, SMTP, LDAP, etc.).4.1.1  Request Syntax   OCSPRequest     ::=     SEQUENCE {       tbsRequest                  TBSRequest,       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }   TBSRequest      ::=     SEQUENCE {Myers, et al.               Standards Track                     [Page 6]RFC 2560                       PKIX OCSP                       June 1999       version             [0]     EXPLICIT Version DEFAULT v1,       requestorName       [1]     EXPLICIT GeneralName OPTIONAL,       requestList                 SEQUENCE OF Request,       requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }   Signature       ::=     SEQUENCE {       signatureAlgorithm      AlgorithmIdentifier,       signature               BIT STRING,       certs               [0] EXPLICIT SEQUENCE OF Certificate   OPTIONAL}   Version         ::=             INTEGER  {  v1(0) }   Request         ::=     SEQUENCE {       reqCert                     CertID,       singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }   CertID          ::=     SEQUENCE {       hashAlgorithm       AlgorithmIdentifier,       issuerNameHash      OCTET STRING, -- Hash of Issuer's DN       issuerKeyHash       OCTET STRING, -- Hash of Issuers public key       serialNumber        CertificateSerialNumber }   issuerNameHash is the hash of the Issuer's distinguished name. The   hash shall be calculated over the DER encoding of the issuer's name   field in the certificate being checked. issuerKeyHash is the hash of   the Issuer's public key. The hash shall be calculated over the value   (excluding tag and length) of the subject public key field in the   issuer's certificate. The hash algorithm used for both these hashes,   is identified in hashAlgorithm. serialNumber is the serial number of   the certificate for which status is being requested.4.1.2  Notes on the Request Syntax   The primary reason to use the hash of the CA's public key in addition   to the hash of the CA's name, to identify the issuer, is that it is   possible that two CAs may choose to use the same Name (uniqueness in   the Name is a recommendation that cannot be enforced). Two CAs will   never, however, have the same public key unless the CAs either   explicitly decided to share their private key, or the key of one of   the CAs was compromised.   Support for any specific extension is OPTIONAL. The critical flag   SHOULD NOT be set for any of them.  Section 4.4 suggests several   useful extensions.  Additional extensions MAY be defined in   additional RFCs. Unrecognized extensions MUST be ignored (unless they   have the critical flag set and are not understood).Myers, et al.               Standards Track                     [Page 7]RFC 2560                       PKIX OCSP                       June 1999   The requestor MAY choose to sign the OCSP request. In that case, the   signature is computed over the tbsRequest structure. If the request   is signed, the requestor SHALL specify its name in the requestorName   field. Also, for signed requests, the requestor MAY include   certificates that help the OCSP responder verify the requestor's   signature in the certs field of Signature.4.2  Response Syntax   This section specifies the ASN.1 specification for a confirmation   response. The actual formatting of the message could vary depending   on the transport mechanism used (HTTP, SMTP, LDAP, etc.).4.2.1  ASN.1 Specification of the OCSP Response   An OCSP response at a minimum consists of a responseStatus field   indicating the processing status of the prior request. If the value   of responseStatus is one of the error conditions, responseBytes are   not set.   OCSPResponse ::= SEQUENCE {      responseStatus         OCSPResponseStatus,      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }   OCSPResponseStatus ::= ENUMERATED {       successful            (0),  --Response has valid confirmations       malformedRequest      (1),  --Illegal confirmation request       internalError         (2),  --Internal error in issuer       tryLater              (3),  --Try again later                                   --(4) is not used       sigRequired           (5),  --Must sign the request       unauthorized          (6)   --Request unauthorized   }

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
狠狠色丁香九九婷婷综合五月| 色狠狠综合天天综合综合| youjizz久久| 日韩欧美亚洲国产精品字幕久久久| 国产日韩精品一区| 蜜桃视频在线观看一区二区| 成人黄色大片在线观看| 精品免费99久久| 五月激情综合色| 91免费观看视频在线| 久久亚洲精华国产精华液 | 亚洲国产精品精华液2区45| 亚洲va国产va欧美va观看| 成人激情动漫在线观看| 精品久久久久久久久久久久久久久 | 综合分类小说区另类春色亚洲小说欧美| 亚洲午夜私人影院| 一本到不卡免费一区二区| 欧美经典一区二区| 国内一区二区在线| 日韩午夜在线观看| 三级亚洲高清视频| 欧美日免费三级在线| 亚洲视频在线观看三级| 国产成人午夜精品5599| 亚洲精品一区二区三区蜜桃下载| 热久久国产精品| 在线成人免费视频| 丝袜美腿亚洲一区| 欧美顶级少妇做爰| 日本一道高清亚洲日美韩| 欧美日韩亚洲综合| 亚洲高清视频在线| 欧美日本高清视频在线观看| 亚洲自拍偷拍av| 欧美男同性恋视频网站| 亚洲123区在线观看| 欧美绝品在线观看成人午夜影视| 亚洲一区精品在线| 欧美理论片在线| 久久机这里只有精品| 精品美女在线播放| 国产在线播放一区三区四| 欧美电影免费观看高清完整版在线观看 | 久久久精品蜜桃| 国产乱人伦精品一区二区在线观看 | 亚洲精品久久久蜜桃| 日本高清不卡视频| 偷拍日韩校园综合在线| 337p亚洲精品色噜噜狠狠| 奇米色777欧美一区二区| 日韩免费视频一区二区| 精品无码三级在线观看视频| 久久精品视频在线看| 成人av电影在线| 一区二区欧美国产| 欧美精品777| 国产麻豆午夜三级精品| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ原创 | 一区二区三区四区蜜桃| 欧美精品v国产精品v日韩精品 | 精品国产在天天线2019| 成人av网站大全| 视频一区欧美精品| 欧美经典一区二区| 在线成人小视频| 国产不卡在线视频| 午夜精品久久久久久久99樱桃| 日韩欧美高清一区| 99久久er热在这里只有精品15| 夜夜夜精品看看| 久久综合av免费| 在线视频国产一区| 国产中文字幕精品| 一区二区三区在线视频免费| 日韩精品一区二区三区swag| 97精品久久久午夜一区二区三区 | 亚洲丝袜精品丝袜在线| 日韩一区二区视频| 91捆绑美女网站| 国产在线精品一区二区| 一区二区成人在线观看| 久久久久久久久久久久久夜| 欧美在线视频日韩| 国产成人综合视频| 日韩经典一区二区| 亚洲色图.com| 国产欧美一区二区三区沐欲| 欧美日韩视频在线一区二区| 成人美女视频在线看| 日韩va欧美va亚洲va久久| 综合欧美一区二区三区| 国产亚洲一区二区在线观看| 欧美精品在欧美一区二区少妇| 成人黄色小视频在线观看| 国模无码大尺度一区二区三区 | 一区在线播放视频| 欧美变态口味重另类| 欧美日韩国产大片| 色诱视频网站一区| 不卡在线视频中文字幕| 国产大陆亚洲精品国产| 日韩1区2区日韩1区2区| 亚洲精品视频在线观看网站| 国产精品传媒入口麻豆| 欧美精品一区二区久久久| 欧美一区二区在线看| 色婷婷久久久综合中文字幕 | 国产又黄又大久久| 美女在线一区二区| 日韩精品1区2区3区| 视频一区二区国产| 亚洲成人一区二区| 亚洲国产精品精华液网站| 亚洲免费观看高清完整| 成人欧美一区二区三区白人| 国产精品女同互慰在线看| 国产蜜臀av在线一区二区三区| 欧美精品一区二区三区蜜桃视频| 欧美r级在线观看| 亚洲精品一区二区三区香蕉| 久久伊人中文字幕| 国产亚洲欧洲997久久综合 | 亚洲一区二区三区四区的| 国产精品国产三级国产普通话三级| 亚洲国产精品成人综合| 国产精品蜜臀在线观看| 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆| 亚洲国产精品v| 亚洲日本在线看| 亚洲精品成人a在线观看| 亚洲电影一级黄| 秋霞午夜av一区二区三区| 精品一区二区综合| 国产白丝网站精品污在线入口| 粉嫩久久99精品久久久久久夜| av电影在线观看一区| 在线观看免费一区| 日韩三级视频在线看| 久久久噜噜噜久久人人看 | 日韩精品1区2区3区| 狂野欧美性猛交blacked| 国产一区二区三区在线观看免费 | 亚洲乱码精品一二三四区日韩在线| 一区二区三区在线观看动漫 | 91精品国产欧美一区二区成人| 欧美一卡二卡三卡| 亚洲国产精品激情在线观看| 伊人婷婷欧美激情| 美女看a上一区| av在线综合网| 日韩欧美一区二区久久婷婷| 久久九九影视网| 国产精品99久久久久久久女警 | 欧美久久久久久久久中文字幕| 日韩精品一区二区三区视频| 最新高清无码专区| 日韩和欧美一区二区三区| 国产.欧美.日韩| 欧美理论电影在线| 国产精品国产三级国产aⅴ无密码| 丝袜美腿亚洲一区| 99久久精品情趣| 欧美成人在线直播| 亚洲激情男女视频| 福利一区在线观看| 欧美精品第一页| 日韩理论在线观看| 国产专区欧美精品| 91麻豆精品91久久久久同性| 国产精品每日更新在线播放网址| 午夜视频在线观看一区| 国产69精品久久777的优势| 欧美一级精品在线| 亚洲图片欧美色图| www.日本不卡| 久久久亚洲高清| 欧美aaa在线| 欧美日韩高清一区二区三区| 国产精品毛片高清在线完整版| 蜜臀av一级做a爰片久久| 欧美性受xxxx黑人xyx性爽| 欧美高清在线视频| 国产成人精品亚洲777人妖| 日韩精品一区二区三区视频播放 | 欧美一级片在线| 亚洲国产欧美另类丝袜| 成人av免费网站| 国产精品国产三级国产aⅴ无密码 国产精品国产三级国产aⅴ原创 | 亚洲第四色夜色| 一本色道久久综合精品竹菊| 欧美国产激情二区三区| 成人精品小蝌蚪| 中文字幕成人在线观看| 国产福利91精品一区| 国产目拍亚洲精品99久久精品| 国产乱人伦偷精品视频不卡| 久久久www成人免费无遮挡大片| 久久精品99久久久| 久久综合九色欧美综合狠狠|