亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rfc2560.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
   Ambarish Malpani   ValiCert, Inc.   1215 Terra Bella Ave.   Mountain View, CA 94043   Phone: 650.567.5457   EMail: ambarish@valicert.com   Slava Galperin   My CFO, Inc.   1945 Charleston Road   Mountain View, CA   EMail: galperin@mycfo.com   Carlisle Adams   Entrust Technologies   750 Heron Road, Suite E08   Ottawa, Ontario   K1V 1A7   Canada   EMail: cadams@entrust.comMyers, et al.               Standards Track                    [Page 16]RFC 2560                       PKIX OCSP                       June 1999Appendix A.A.1 OCSP over HTTP   This section describes the formatting that will be done to the   request and response to support HTTP.A.1.1 Request   HTTP based OCSP requests can use either the GET or the POST method to   submit their requests. To enable HTTP caching, small requests (that   after encoding are less than 255 bytes), MAY be submitted using GET.   If HTTP caching is not important, or the request is greater than 255   bytes, the request SHOULD be submitted using POST.  Where privacy is   a requirement, OCSP transactions exchanged using HTTP MAY be   protected using either TLS/SSL or some other lower layer protocol.   An OCSP request using the GET method is constructed as follows:   GET {url}/{url-encoding of base-64 encoding of the DER encoding of   the OCSPRequest}   where {url} may be derived from the value of AuthorityInfoAccess or   other local configuration of the OCSP client.   An OCSP request using the POST method is constructed as follows: The   Content-Type header has the value "application/ocsp-request" while   the body of the message is the binary value of the DER encoding of   the OCSPRequest.A.1.2 Response   An HTTP-based OCSP response is composed of the appropriate HTTP   headers, followed by the binary value of the DER encoding of the   OCSPResponse. The Content-Type header has the value   "application/ocsp-response". The Content-Length header SHOULD specify   the length of the response. Other HTTP headers MAY be present and MAY   be ignored if not understood by the requestor.Myers, et al.               Standards Track                    [Page 17]RFC 2560                       PKIX OCSP                       June 1999Appendix B.  OCSP in ASN.1OCSP DEFINITIONS EXPLICIT TAGS::=BEGINIMPORTS      -- Directory Authentication Framework (X.509)             Certificate, AlgorithmIdentifier, CRLReason             FROM AuthenticationFramework { joint-iso-itu-t ds(5)                      module(1) authenticationFramework(7) 3 }-- PKIX Certificate Extensions             AuthorityInfoAccessSyntax          FROM PKIX1Implicit88 {iso(1) identified-organization(3)                  dod(6) internet(1) security(5) mechanisms(5) pkix(7)                  id-mod(0) id-pkix1-implicit-88(2)}          Name, GeneralName, CertificateSerialNumber, Extensions,           id-kp, id-ad-ocsp             FROM PKIX1Explicit88 {iso(1) identified-organization(3)                  dod(6) internet(1) security(5) mechanisms(5) pkix(7)                  id-mod(0) id-pkix1-explicit-88(1)};OCSPRequest     ::=     SEQUENCE {    tbsRequest                  TBSRequest,    optionalSignature   [0]     EXPLICIT Signature OPTIONAL }TBSRequest      ::=     SEQUENCE {    version             [0] EXPLICIT Version DEFAULT v1,    requestorName       [1] EXPLICIT GeneralName OPTIONAL,    requestList             SEQUENCE OF Request,    requestExtensions   [2] EXPLICIT Extensions OPTIONAL }Signature       ::=     SEQUENCE {    signatureAlgorithm   AlgorithmIdentifier,    signature            BIT STRING,    certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }Version  ::=  INTEGER  {  v1(0) }Request ::=     SEQUENCE {    reqCert                    CertID,    singleRequestExtensions    [0] EXPLICIT Extensions OPTIONAL }Myers, et al.               Standards Track                    [Page 18]RFC 2560                       PKIX OCSP                       June 1999CertID ::= SEQUENCE {    hashAlgorithm            AlgorithmIdentifier,    issuerNameHash     OCTET STRING, -- Hash of Issuer's DN    issuerKeyHash      OCTET STRING, -- Hash of Issuers public key    serialNumber       CertificateSerialNumber }OCSPResponse ::= SEQUENCE {   responseStatus         OCSPResponseStatus,   responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }OCSPResponseStatus ::= ENUMERATED {    successful            (0),      --Response has valid confirmations    malformedRequest      (1),      --Illegal confirmation request    internalError         (2),      --Internal error in issuer    tryLater              (3),      --Try again later                                    --(4) is not used    sigRequired           (5),      --Must sign the request    unauthorized          (6)       --Request unauthorized}ResponseBytes ::=       SEQUENCE {    responseType   OBJECT IDENTIFIER,    response       OCTET STRING }BasicOCSPResponse       ::= SEQUENCE {   tbsResponseData      ResponseData,   signatureAlgorithm   AlgorithmIdentifier,   signature            BIT STRING,   certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }ResponseData ::= SEQUENCE {   version              [0] EXPLICIT Version DEFAULT v1,   responderID              ResponderID,   producedAt               GeneralizedTime,   responses                SEQUENCE OF SingleResponse,   responseExtensions   [1] EXPLICIT Extensions OPTIONAL }ResponderID ::= CHOICE {   byName   [1] Name,   byKey    [2] KeyHash }KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key                         --(excluding the tag and length fields)SingleResponse ::= SEQUENCE {   certID                       CertID,   certStatus                   CertStatus,   thisUpdate                   GeneralizedTime,Myers, et al.               Standards Track                    [Page 19]RFC 2560                       PKIX OCSP                       June 1999   nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL,   singleExtensions     [1]     EXPLICIT Extensions OPTIONAL }CertStatus ::= CHOICE {    good                [0]     IMPLICIT NULL,    revoked             [1]     IMPLICIT RevokedInfo,    unknown             [2]     IMPLICIT UnknownInfo }RevokedInfo ::= SEQUENCE {    revocationTime              GeneralizedTime,    revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }UnknownInfo ::= NULL -- this can be replaced with an enumerationArchiveCutoff ::= GeneralizedTimeAcceptableResponses ::= SEQUENCE OF OBJECT IDENTIFIERServiceLocator ::= SEQUENCE {    issuer    Name,    locator   AuthorityInfoAccessSyntax }-- Object Identifiersid-kp-OCSPSigning            OBJECT IDENTIFIER ::= { id-kp 9 }id-pkix-ocsp                 OBJECT IDENTIFIER ::= { id-ad-ocsp }id-pkix-ocsp-basic           OBJECT IDENTIFIER ::= { id-pkix-ocsp 1 }id-pkix-ocsp-nonce           OBJECT IDENTIFIER ::= { id-pkix-ocsp 2 }id-pkix-ocsp-crl             OBJECT IDENTIFIER ::= { id-pkix-ocsp 3 }id-pkix-ocsp-response        OBJECT IDENTIFIER ::= { id-pkix-ocsp 4 }id-pkix-ocsp-nocheck         OBJECT IDENTIFIER ::= { id-pkix-ocsp 5 }id-pkix-ocsp-archive-cutoff  OBJECT IDENTIFIER ::= { id-pkix-ocsp 6 }id-pkix-ocsp-service-locator OBJECT IDENTIFIER ::= { id-pkix-ocsp 7 }ENDMyers, et al.               Standards Track                    [Page 20]RFC 2560                       PKIX OCSP                       June 1999Appendix C. MIME registrationsC.1 application/ocsp-request   To: ietf-types@iana.org   Subject: Registration of MIME media type application/ocsp-request   MIME media type name: application   MIME subtype name: ocsp-request   Required parameters: None   Optional parameters: None   Encoding considerations: binary   Security considerations: Carries a  request for information. This   request may optionally be cryptographically signed.   Interoperability considerations: None   Published specification: IETF PKIX Working Group Draft on Online   Certificate Status Protocol - OCSP   Applications which use this media type: OCSP clients   Additional information:      Magic number(s): None      File extension(s): .ORQ      Macintosh File Type Code(s): none   Person & email address to contact for further information:   Ambarish Malpani <ambarish@valicert.com>   Intended usage: COMMON   Author/Change controller:   Ambarish Malpani <ambarish@valicert.com>C.2 application/ocsp-response   To: ietf-types@iana.org   Subject: Registration of MIME media type application/ocsp-response   MIME media type name: applicationMyers, et al.               Standards Track                    [Page 21]RFC 2560                       PKIX OCSP                       June 1999   MIME subtype name: ocsp-response   Required parameters: None   Optional parameters: None   Encoding considerations: binary   Security considerations: Carries a cryptographically signed response   Interoperability considerations: None   Published specification: IETF PKIX Working Group Draft on Online   Certificate Status Protocol - OCSP   Applications which use this media type: OCSP servers   Additional information:   Magic number(s): None   File extension(s): .ORS   Macintosh File Type Code(s): none   Person & email address to contact for further information:   Ambarish Malpani <ambarish@valicert.com>   Intended usage: COMMON   Author/Change controller:   Ambarish Malpani <ambarish@valicert.com>Myers, et al.               Standards Track                    [Page 22]RFC 2560                       PKIX OCSP                       June 1999Full Copyright Statement   Copyright (C) The Internet Society (1999).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Myers, et al.               Standards Track                    [Page 23]

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
粉嫩高潮美女一区二区三区| 色综合一个色综合亚洲| 亚洲欧美另类图片小说| 91精品国产综合久久久久久| 99久久国产综合精品色伊| 蜜桃一区二区三区在线| 一区二区三区在线观看欧美| 久久嫩草精品久久久精品一| 欧美日本在线视频| 99久久免费视频.com| 国产伦精品一区二区三区免费迷| 亚洲一级二级在线| 欧美激情综合网| 日韩免费电影网站| 欧美日韩国产高清一区| 在线免费观看视频一区| 99久久久精品免费观看国产蜜| 久久国产剧场电影| 裸体在线国模精品偷拍| 亚洲福利视频一区| 亚洲精选视频在线| 国产精品激情偷乱一区二区∴| 国产日韩欧美精品电影三级在线| 日韩一区二区视频| 6080午夜不卡| 欧美日韩高清一区二区不卡 | 国产精品123| 精品一区二区三区在线观看国产| 亚洲午夜激情av| 亚洲精品国产品国语在线app| 中文字幕第一区综合| 国产日韩精品一区| 久久先锋资源网| 精品国产伦一区二区三区免费| 日韩午夜在线观看视频| 欧美理论在线播放| 欧美精品1区2区| 欧美精品国产精品| 日韩一级视频免费观看在线| 欧美美女直播网站| 欧美日韩综合不卡| 91精品国产综合久久久久久久久久 | 亚洲色图一区二区| 国产精品久久久久永久免费观看| 久久精品亚洲精品国产欧美kt∨| 久久久国产精品午夜一区ai换脸| 精品电影一区二区| 久久久久国色av免费看影院| 国产偷国产偷亚洲高清人白洁| 久久精品一区蜜桃臀影院| 国产亚洲精品超碰| 欧美国产欧美综合| 自拍偷拍欧美激情| 亚洲一二三四区不卡| 日韩精品久久久久久| 日韩av电影一区| 久久97超碰色| 精品88久久久久88久久久| 亚洲国产高清不卡| 一区二区三区在线视频免费| 午夜精品久久一牛影视| 美女国产一区二区| 国产成人超碰人人澡人人澡| 国产**成人网毛片九色 | 日本高清成人免费播放| 欧美日韩国产小视频| 欧美α欧美αv大片| 国产亲近乱来精品视频| 亚洲欧美日韩中文播放| 日本在线不卡视频一二三区| 国产九九视频一区二区三区| 91国偷自产一区二区三区成为亚洲经典 | 色中色一区二区| 欧美在线观看你懂的| 精品粉嫩aⅴ一区二区三区四区| 国产三区在线成人av| 一区二区三区在线观看国产| 免费观看成人av| 99久久综合色| 精品日本一线二线三线不卡| 亚洲欧美激情小说另类| 美脚の诱脚舐め脚责91| aa级大片欧美| 日韩精品一区二区三区四区视频| 成人免费视频在线观看| 免费观看在线综合| 色综合久久中文综合久久牛| 精品成人免费观看| 亚洲综合免费观看高清完整版在线| 久久精品99久久久| 日本韩国欧美一区二区三区| 久久久精品2019中文字幕之3| 一区二区三区欧美激情| 风间由美一区二区av101| 欧美乱妇15p| 亚洲欧美在线另类| 国产一区二区三区免费看| 欧美亚洲愉拍一区二区| 国产精品久久久久久久久晋中| 日韩和欧美的一区| 色综合天天综合网天天狠天天| 久久伊人蜜桃av一区二区| 亚洲国产婷婷综合在线精品| av在线不卡观看免费观看| 欧美成va人片在线观看| 婷婷国产v国产偷v亚洲高清| 99re6这里只有精品视频在线观看| 欧美大片在线观看一区| 亚洲 欧美综合在线网络| 成人sese在线| 国产片一区二区| 国产一区二区导航在线播放| 欧美一级搡bbbb搡bbbb| 亚洲成av人影院在线观看网| 亚洲欧美二区三区| 成人性生交大合| 国产午夜精品久久| 激情六月婷婷久久| 69成人精品免费视频| 天天色综合成人网| 欧美亚洲综合另类| 一区二区三区欧美在线观看| 一本高清dvd不卡在线观看| 国产精品久久久久精k8| 国产精品1024久久| 国产日韩欧美不卡| 成人免费av在线| 久久久99免费| 福利电影一区二区三区| 亚洲国产成人午夜在线一区| 成人综合在线观看| 国产女主播一区| 成人毛片老司机大片| 中文无字幕一区二区三区 | 99在线精品一区二区三区| 日本一区二区电影| www.日本不卡| 亚洲男女一区二区三区| 91福利视频网站| 亚洲精品乱码久久久久久黑人| 91女厕偷拍女厕偷拍高清| 亚洲欧美另类久久久精品 | 欧美视频在线不卡| 午夜视频一区在线观看| 91精品福利在线一区二区三区| 免费观看91视频大全| 精品噜噜噜噜久久久久久久久试看| 麻豆精品在线视频| 91精品国产免费| 国产一区二区精品久久99| 国产精品美女久久久久久久| 99精品久久只有精品| 亚洲综合一区在线| 欧美精品日韩一本| 国产专区综合网| 中文字幕亚洲区| 欧美综合在线视频| 免费人成网站在线观看欧美高清| 久久免费国产精品| 99久久久精品| 日韩在线卡一卡二| 国产亚洲成年网址在线观看| 91玉足脚交白嫩脚丫在线播放| 亚洲国产日韩a在线播放性色| 制服丝袜一区二区三区| 国产精品伊人色| 亚洲免费av在线| 日韩精品一区二区三区四区视频| 高清不卡在线观看av| 亚洲影院在线观看| 欧美sm美女调教| 色一情一乱一乱一91av| 麻豆精品视频在线观看免费| 国产精品免费看片| 欧美日韩不卡一区二区| 高清不卡一区二区在线| 亚洲不卡一区二区三区| 久久综合九色综合久久久精品综合 | 国产毛片精品视频| 一区二区三区四区不卡在线 | 亚洲福利电影网| 2021中文字幕一区亚洲| 色婷婷久久久综合中文字幕| 美女性感视频久久| 成人欧美一区二区三区小说| 日韩免费看网站| 91国模大尺度私拍在线视频| 激情小说亚洲一区| 亚洲影院久久精品| 欧美极品美女视频| 欧美一区二区三区免费观看视频| 丁香婷婷综合网| 美女视频免费一区| 亚洲韩国一区二区三区| 国产精品美女一区二区| 精品99久久久久久| 欧美电影在哪看比较好| 91蜜桃视频在线| 国产精品一区久久久久| 免费成人在线播放|