亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2560.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
Network Working Group                                           M. MyersRequest for Comments: 2560                                      VeriSignCategory: Standards Track                                      R. Ankney                                                                  CertCo                                                              A. Malpani                                                                ValiCert                                                             S. Galperin                                                                  My CFO                                                                C. Adams                                                    Entrust Technologies                                                               June 1999                X.509 Internet Public Key Infrastructure               Online Certificate Status Protocol - OCSPStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.1.  Abstract   This document specifies a protocol useful in determining the current   status of a digital certificate without requiring CRLs. Additional   mechanisms addressing PKIX operational requirements are specified in   separate documents.   An overview of the protocol is provided in section 2. Functional   requirements are specified in section 4. Details of the protocol are   in section 5. We cover security issues with the protocol in section   6. Appendix A defines OCSP over HTTP, appendix B accumulates ASN.1   syntactic elements and appendix C specifies the mime types for the   messages.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document (in uppercase, as shown) are to be interpreted as described   in [RFC2119].Myers, et al.               Standards Track                     [Page 1]RFC 2560                       PKIX OCSP                       June 19992.  Protocol Overview   In lieu of or as a supplement to checking against a periodic CRL, it   may be necessary to obtain timely information regarding the   revocation status of a certificate (cf. [RFC2459], Section 3.3).   Examples include high-value funds transfer or large stock trades.   The Online Certificate Status Protocol (OCSP) enables applications to   determine the (revocation) state of an identified certificate. OCSP   may be used to satisfy some of the operational requirements of   providing more timely revocation information than is possible with   CRLs and may also be used to obtain additional status information. An   OCSP client issues a status request to an OCSP responder and suspends   acceptance of the certificate in question until the responder   provides a response.   This protocol specifies the data that needs to be exchanged between   an application checking the status of a certificate and the server   providing that status.2.1  Request   An OCSP request contains the following data:   -- protocol version   -- service request   -- target certificate identifier   -- optional extensions which MAY be processed by the OCSP Responder   Upon receipt of a request, an OCSP Responder determines if:   1. the message is well formed   2. the responder is configured to provide the requested service and   3. the request contains the information needed by the responder If   any one of the prior conditions are not met, the OCSP responder   produces an error message; otherwise, it returns a definitive   response.2.2  Response   OCSP responses can be of various types.  An OCSP response consists of   a response type and the bytes of the actual response. There is one   basic type of OCSP response that MUST be supported by all OCSP   servers and clients. The rest of this section pertains only to this   basic response type.Myers, et al.               Standards Track                     [Page 2]RFC 2560                       PKIX OCSP                       June 1999   All definitive response messages SHALL be digitally signed. The key   used to sign the response MUST belong to one of the following:   -- the CA who issued the certificate in question   -- a Trusted Responder whose public key is trusted by the requester   -- a CA Designated Responder (Authorized Responder) who holds a      specially marked certificate issued directly by the CA, indicating      that the responder may issue OCSP responses for that CA   A definitive response message is composed of:   -- version of the response syntax   -- name of the responder   -- responses for each of the certificates in a request   -- optional extensions   -- signature algorithm OID   -- signature computed across hash of the response   The response for each of the certificates in a request consists of   -- target certificate identifier   -- certificate status value   -- response validity interval   -- optional extensions   This specification defines the following definitive response   indicators for use in the certificate status value:   -- good   -- revoked   -- unknown   The "good" state indicates a positive response to the status inquiry.   At a minimum, this positive response indicates that the certificate   is not revoked, but does not necessarily mean that the certificate   was ever issued or that the time at which the response was produced   is within the certificate's validity interval. Response extensions   may be used to convey additional information on assertions made by   the responder regarding the status of the certificate such as   positive statement about issuance, validity, etc.   The "revoked" state indicates that the certificate has been revoked   (either permanantly or temporarily (on hold)).   The "unknown" state indicates that the responder doesn't know about   the certificate being requested.Myers, et al.               Standards Track                     [Page 3]RFC 2560                       PKIX OCSP                       June 19992.3  Exception Cases   In case of errors, the OCSP Responder may return an error message.   These messages are not signed. Errors can be of the following types:   -- malformedRequest   -- internalError   -- tryLater   -- sigRequired   -- unauthorized   A server produces the "malformedRequest" response if the request   received does not conform to the OCSP syntax.   The response "internalError" indicates that the OCSP responder   reached an inconsistent internal state. The query should be retried,   potentially with another responder.   In the event that the OCSP responder is operational, but unable to   return a status for the requested certificate, the "tryLater"   response can be used to indicate that the service exists, but is   temporarily unable to respond.   The response "sigRequired" is returned in cases where the server   requires the client sign the request in order to construct a   response.   The response "unauthorized" is returned in cases where the client is   not authorized to make this query to this server.2.4  Semantics of thisUpdate, nextUpdate and producedAt   Responses can contain three times in them - thisUpdate, nextUpdate   and producedAt. The semantics of these fields are:   - thisUpdate: The time at which the status being indicated is known                 to be correct   - nextUpdate: The time at or before which newer information will be                 available about the status of the certificate   - producedAt: The time at which the OCSP responder signed this                 response.   If nextUpdate is not set, the responder is indicating that newer   revocation information is available all the time.Myers, et al.               Standards Track                     [Page 4]RFC 2560                       PKIX OCSP                       June 19992.5  Response Pre-production   OCSP responders MAY pre-produce signed responses specifying the   status of certificates at a specified time. The time at which the   status was known to be correct SHALL be reflected in the thisUpdate   field of the response. The time at or before which newer information   will be available is reflected in the nextUpdate field, while the   time at which the response was produced will appear in the producedAt   field of the response.2.6  OCSP Signature Authority Delegation   The key that signs a certificate's status information need not be the   same key that signed the certificate. A certificate's issuer   explicitly delegates OCSP signing authority by issuing a certificate   containing a unique value for extendedKeyUsage in the OCSP signer's   certificate. This certificate MUST be issued directly to the   responder by the cognizant CA.2.7  CA Key Compromise   If an OCSP responder knows that a particular CA's private key has   been compromised, it MAY return the revoked state for all   certificates issued by that CA.3.  Functional Requirements3.1  Certificate Content   In order to convey to OCSP clients a well-known point of information   access, CAs SHALL provide the capability to include the   AuthorityInfoAccess extension (defined in [RFC2459], section 4.2.2.1)   in certificates that can be checked using OCSP.  Alternatively, the   accessLocation for the OCSP provider may be configured locally at the   OCSP client.   CAs that support an OCSP service, either hosted locally or provided   by an Authorized Responder, MUST provide for the inclusion of a value   for a uniformResourceIndicator (URI) accessLocation and the OID value   id-ad-ocsp for the accessMethod in the AccessDescription SEQUENCE.   The value of the accessLocation field in the subject certificate   defines the transport (e.g. HTTP) used to access the OCSP responder   and may contain other transport dependent information (e.g. a URL).Myers, et al.               Standards Track                     [Page 5]RFC 2560                       PKIX OCSP                       June 19993.2  Signed Response Acceptance Requirements   Prior to accepting a signed response as valid, OCSP clients SHALL   confirm that:   1. The certificate identified in a received response corresponds to   that which was identified in the corresponding request;   2. The signature on the response is valid;   3. The identity of the signer matches the intended recipient of the   request.   4. The signer is currently authorized to sign the response.   5. The time at which the status being indicated is known to be   correct (thisUpdate) is sufficiently recent.   6. When available, the time at or before which newer information will   be available about the status of the certificate (nextUpdate) is   greater than the current time.4.  Detailed Protocol   The ASN.1 syntax imports terms defined in [RFC2459]. For signature   calculation, the data to be signed is encoded using the ASN.1   distinguished encoding rules (DER) [X.690].   ASN.1 EXPLICIT tagging is used as a default unless specified   otherwise.   The terms imported from elsewhere are: Extensions,   CertificateSerialNumber, SubjectPublicKeyInfo, Name,   AlgorithmIdentifier, CRLReason4.1  Requests   This section specifies the ASN.1 specification for a confirmation   request. The actual formatting of the message could vary depending on   the transport mechanism used (HTTP, SMTP, LDAP, etc.).4.1.1  Request Syntax   OCSPRequest     ::=     SEQUENCE {       tbsRequest                  TBSRequest,       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }   TBSRequest      ::=     SEQUENCE {Myers, et al.               Standards Track                     [Page 6]RFC 2560                       PKIX OCSP                       June 1999       version             [0]     EXPLICIT Version DEFAULT v1,       requestorName       [1]     EXPLICIT GeneralName OPTIONAL,       requestList                 SEQUENCE OF Request,       requestExtensions   [2]     EXPLICIT Extensions OPTIONAL }   Signature       ::=     SEQUENCE {       signatureAlgorithm      AlgorithmIdentifier,       signature               BIT STRING,       certs               [0] EXPLICIT SEQUENCE OF Certificate   OPTIONAL}   Version         ::=             INTEGER  {  v1(0) }   Request         ::=     SEQUENCE {       reqCert                     CertID,       singleRequestExtensions     [0] EXPLICIT Extensions OPTIONAL }   CertID          ::=     SEQUENCE {       hashAlgorithm       AlgorithmIdentifier,       issuerNameHash      OCTET STRING, -- Hash of Issuer's DN       issuerKeyHash       OCTET STRING, -- Hash of Issuers public key       serialNumber        CertificateSerialNumber }   issuerNameHash is the hash of the Issuer's distinguished name. The   hash shall be calculated over the DER encoding of the issuer's name   field in the certificate being checked. issuerKeyHash is the hash of   the Issuer's public key. The hash shall be calculated over the value   (excluding tag and length) of the subject public key field in the   issuer's certificate. The hash algorithm used for both these hashes,   is identified in hashAlgorithm. serialNumber is the serial number of   the certificate for which status is being requested.4.1.2  Notes on the Request Syntax   The primary reason to use the hash of the CA's public key in addition   to the hash of the CA's name, to identify the issuer, is that it is   possible that two CAs may choose to use the same Name (uniqueness in   the Name is a recommendation that cannot be enforced). Two CAs will   never, however, have the same public key unless the CAs either   explicitly decided to share their private key, or the key of one of   the CAs was compromised.   Support for any specific extension is OPTIONAL. The critical flag   SHOULD NOT be set for any of them.  Section 4.4 suggests several   useful extensions.  Additional extensions MAY be defined in   additional RFCs. Unrecognized extensions MUST be ignored (unless they   have the critical flag set and are not understood).Myers, et al.               Standards Track                     [Page 7]RFC 2560                       PKIX OCSP                       June 1999   The requestor MAY choose to sign the OCSP request. In that case, the   signature is computed over the tbsRequest structure. If the request   is signed, the requestor SHALL specify its name in the requestorName   field. Also, for signed requests, the requestor MAY include   certificates that help the OCSP responder verify the requestor's   signature in the certs field of Signature.4.2  Response Syntax   This section specifies the ASN.1 specification for a confirmation   response. The actual formatting of the message could vary depending   on the transport mechanism used (HTTP, SMTP, LDAP, etc.).4.2.1  ASN.1 Specification of the OCSP Response   An OCSP response at a minimum consists of a responseStatus field   indicating the processing status of the prior request. If the value   of responseStatus is one of the error conditions, responseBytes are   not set.   OCSPResponse ::= SEQUENCE {      responseStatus         OCSPResponseStatus,      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }   OCSPResponseStatus ::= ENUMERATED {       successful            (0),  --Response has valid confirmations       malformedRequest      (1),  --Illegal confirmation request       internalError         (2),  --Internal error in issuer       tryLater              (3),  --Try again later                                   --(4) is not used       sigRequired           (5),  --Must sign the request       unauthorized          (6)   --Request unauthorized   }

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品一区二区x88av| 91在线云播放| 成人午夜视频在线观看| 欧美日韩三级在线| 日韩免费高清视频| 中文字幕一区av| 免费成人av在线| 色婷婷av一区二区| 亚洲国产高清不卡| 老司机精品视频一区二区三区| 99麻豆久久久国产精品免费| 欧美精品一区二区三区蜜臀 | 最新热久久免费视频| 97久久精品人人爽人人爽蜜臀| 亚洲精品中文字幕乱码三区| 国产v日产∨综合v精品视频| 欧美成人国产一区二区| 亚洲成在线观看| 日本黄色一区二区| 日韩理论片中文av| 成人黄色网址在线观看| 久久综合九色综合久久久精品综合 | 不卡电影一区二区三区| 亚洲精品国产一区二区三区四区在线| 欧美日韩国产高清一区二区三区| 亚洲最大成人综合| 9l国产精品久久久久麻豆| 亚洲综合在线免费观看| 国产91精品一区二区麻豆网站| 亚洲天堂中文字幕| 在线成人小视频| 日本网站在线观看一区二区三区| 欧美日韩国产色站一区二区三区| 免费av成人在线| 最新热久久免费视频| 日韩一区二区三区精品视频| 琪琪久久久久日韩精品| 国产精品久久久久aaaa樱花| proumb性欧美在线观看| 石原莉奈在线亚洲二区| 欧美一区二区三区啪啪| 日本午夜一本久久久综合| 国产精品天天摸av网| 99久久er热在这里只有精品66| 一区二区成人在线视频| 日韩欧美高清dvd碟片| 国产iv一区二区三区| 亚洲午夜激情网页| 日本韩国欧美在线| 国产综合色精品一区二区三区| 2024国产精品| 欧美天天综合网| 日韩专区中文字幕一区二区| 亚洲欧洲色图综合| 欧美tickling挠脚心丨vk| 欧美专区亚洲专区| 免费成人在线视频观看| 亚洲免费观看高清完整版在线观看熊 | 欧美一区午夜精品| 99国产精品视频免费观看| 精品一二三四在线| 国内久久精品视频| 色综合久久综合网欧美综合网| 麻豆国产精品777777在线| 欧美日本精品一区二区三区| 丁香另类激情小说| 久久 天天综合| 日韩va欧美va亚洲va久久| 一区二区三区蜜桃网| 国产精品久久久久精k8| 国产欧美日韩精品a在线观看| 91玉足脚交白嫩脚丫在线播放| 亚洲精品国产第一综合99久久 | 欧美日韩一级二级三级| 99久久精品国产观看| 国产盗摄视频一区二区三区| 亚洲精品免费看| 中文字幕中文在线不卡住| 中文字幕精品一区二区三区精品| 精品人伦一区二区色婷婷| 在线播放亚洲一区| 69堂精品视频| 久久久久国产精品人| 男人的天堂久久精品| 亚洲福利一区二区三区| 亚洲成人综合在线| 亚洲成人免费视| 日韩—二三区免费观看av| 天堂av在线一区| 麻豆91小视频| 国产精品一区二区在线播放| 成人妖精视频yjsp地址| 成人国产精品免费观看视频| 91丨porny丨户外露出| 色吧成人激情小说| 欧美特级限制片免费在线观看| 欧美男人的天堂一二区| 91精品在线一区二区| 日韩区在线观看| 国产婷婷色一区二区三区在线| 91麻豆精品国产91久久久| 日韩免费视频一区二区| 久久日一线二线三线suv| 国产拍欧美日韩视频二区| 亚洲女厕所小便bbb| 亚洲高清一区二区三区| 精品一区二区三区在线视频| 成人av在线网站| 欧美午夜一区二区三区免费大片| 欧美成人高清电影在线| 中文字幕免费一区| 亚洲午夜在线视频| 国产一区二区三区观看| 蜜臀av亚洲一区中文字幕| 韩国精品主播一区二区在线观看 | 无吗不卡中文字幕| 一区二区久久久| 蜜桃视频免费观看一区| 风间由美一区二区三区在线观看| 日本久久一区二区三区| 欧美大胆一级视频| 1区2区3区精品视频| 日韩经典一区二区| 成人国产一区二区三区精品| 这里只有精品99re| 国产精品久久久久桃色tv| 午夜在线成人av| 成人av在线观| 精品国产一区二区亚洲人成毛片| 成人欧美一区二区三区白人| 久热成人在线视频| 色综合网色综合| 欧美日韩午夜影院| 国产片一区二区三区| 首页亚洲欧美制服丝腿| jvid福利写真一区二区三区| 欧美成人猛片aaaaaaa| 亚洲激情校园春色| 国产高清无密码一区二区三区| 欧美精品久久久久久久久老牛影院| 日本一区二区三区久久久久久久久不| 亚洲电影在线播放| 成人午夜av电影| 久久综合久久鬼色中文字| 丝袜亚洲另类欧美| 日本电影亚洲天堂一区| 中文一区二区完整视频在线观看| 美国av一区二区| 欧美人与z0zoxxxx视频| 亚洲猫色日本管| 99久久综合精品| 国产精品久久久久久久岛一牛影视| 久久99久久精品欧美| 欧美日本乱大交xxxxx| 一区二区三区成人| 97se亚洲国产综合在线| 国产精品美女久久久久aⅴ国产馆 国产精品美女久久久久av爽李琼 国产精品美女久久久久高潮 | 91精品国产综合久久精品性色| 亚洲精品高清视频在线观看| 成人精品gif动图一区| 久久久精品一品道一区| 麻豆成人av在线| 欧美电影精品一区二区| 日韩av电影免费观看高清完整版 | 99国产精品国产精品毛片| 国产亚洲一区字幕| 激情深爱一区二区| 欧美不卡一区二区三区四区| 久久国产精品免费| 3d动漫精品啪啪| 免费观看一级欧美片| 91精品国产丝袜白色高跟鞋| 免费在线看成人av| 91精品国产综合久久久久久 | 成人国产一区二区三区精品| 国产精品久久久一本精品| 成人福利视频在线看| 中文字幕一区二区三区在线不卡 | 久久蜜桃av一区精品变态类天堂| 激情综合色综合久久| 久久你懂得1024| 成人黄色国产精品网站大全在线免费观看| 国产精品乱人伦一区二区| 成a人片国产精品| 一个色综合av| 51午夜精品国产| 国产综合久久久久影院| 国产日韩av一区| 色婷婷综合久久久久中文 | 国产亲近乱来精品视频| 91一区二区三区在线观看| 一区二区三区在线影院| 欧美日本国产视频| 国产在线看一区| 亚洲欧美综合色| 91.xcao| 成人黄页毛片网站| 亚洲一区二区成人在线观看| 日韩一区二区不卡| 高清成人在线观看|