亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc3039.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號(hào):
   in the DIT.  In cases where the subject name, as specified in the   subject field, specifies a public X.500 directory entry, the   countryName attribute SHOULD always be present.   The commonName attribute value SHALL, when present, contain a name of   the subject.  This MAY be in the subject's preferred presentation   format, or a format preferred by the CA, or some other format.   Pseudonyms, nicknames and names with spelling other than defined by   the registered name MAY be used.  To understand the nature of the   name presented in commonName, complying applications MAY have to   examine present values of the givenName and surname attributes, or   the pseudonym attribute.Santesson, et al.           Standards Track                     [Page 7]RFC 3039             Qualified Certificates Profile         January 2001   Note: Many client implementations presuppose the presence of the   commonName attribute value in the subject field and use this value to   display the subject's name regardless of present givenName, surname   or pseudonym attribute values.   The surname and givenName attribute types SHALL, if present, contain   the registered name of the subject, in accordance with the laws under   which the CA prepares the certificate.  These attributes SHALL be   used in the subject field if the commonName attribute is not present.   In cases where the subject only has a single name registered, the   givenName attribute SHALL be used and the surname attribute SHALL be   omitted.   The pseudonym attribute type SHALL, if present, contain a pseudonym   of the subject.  Use of the pseudonym attribute MUST NOT be combined   with use of any of the attributes surname and/or givenName.   The serialNumber attribute type SHALL, when present, be used to   differentiate between names where the subject field would otherwise   be identical.  This attribute has no defined semantics beyond   ensuring uniqueness of subject names.  It MAY contain a number or   code assigned by the CA or an identifier assigned by a government or   civil authority.  It is the CA's responsibility to ensure that the   serialNumber is sufficient to resolve any subject name collisions.   The organizationName and the organizationalUnitName attribute types   SHALL, when present, be used to store the name and relevant   information of an organization with which the subject is associated.   The type of association between the organization and the subject is   beyond the scope of this document.   The postalAddress, the stateOrProvinceName and the localityName   attribute types SHALL, when present, be used to store address and   geographical information with which the subject is associated.  If an   organizationName value also is present then the postalAddress,   stateOrProvinceName and localityName attribute values SHALL be   associated with the specified organization.  The type of association   between the postalAddress, stateOrProvinceName and the localityName   and either the subject or the organizationName is beyond the scope of   this document.   Compliant implementations SHALL be able to interpret the attributes   named in this section.Santesson, et al.           Standards Track                     [Page 8]RFC 3039             Qualified Certificates Profile         January 20013.2  Certificate Extensions   This specification provides additional details regarding the contents   of five certificate extensions.  These extensions are the subject   directory attributes, certificate policies, key usage, private   extension for biometric information and private extension for   Qualified Certificate statements.3.2.1  Subject Directory Attributes   The subjectDirectoryAttributes extension MAY contain additional   attributes, associated with the subject, as complement to present   information in the subject field and the subject alternative name   extension.   Attributes suitable for storage in this extension are attributes,   which are not part of the subject's distinguished name, but which MAY   still be useful for other purposes (e.g., authorization).   This extension MUST NOT be marked critical.   Compliant implementations SHALL be able to interpret the following   attributes:      title;      dateOfBirth;      placeOfBirth;      gender;      countryOfCitizenship; and      countryOfResidence.   Other attributes MAY be included according to local definitions.   The title attribute type SHALL, when present, be used to store a   designated position or function of the subject within the   organization specified by present organizational attributes in the   subject field.  The association between the title, the subject and   the organization is beyond the scope of this document.   The dateOfBirth attribute SHALL, when present, contain the value of   the date of birth of the subject.  The manner in which the date of   birth is associated with the subject is outside the scope of this   document.   The placeOfBirth attribute SHALL, when present, contain the value of   the place of birth of the subject.  The manner in which the place of   birth is associated with the subject is outside the scope of this   document.Santesson, et al.           Standards Track                     [Page 9]RFC 3039             Qualified Certificates Profile         January 2001   The gender attribute SHALL, when present, contain the value of the   gender of the subject.  For females the value "F" (or "f") and for   males the value "M" (or "m") have to be used.  The manner in which   the gender is associated with the subject is outside the scope of   this document.   The countryOfCitizenship attribute SHALL, when present, contain the   identifier of at least one of the subject's claimed countries of   citizenship at the time that the certificate was issued.  If the   subject is a citizen of more than one country, more than one country   MAY be present.  Determination of citizenship is a matter of law and   is outside the scope of this document.   The countryOfResidence attribute SHALL, when present, contain the   value of at least one country in which the subject is resident.  If   the subject is a resident of more than one country, more than one   country MAY be present.  Determination of residence is a matter of   law and is outside the scope of this document.3.2.2 Certificate Policies   The certificate policies extension SHALL contain the identifier of at   least one certificate policy which reflects the practices and   procedures undertaken by the CA.  The certificate policy extension   MAY be marked critical.   Information provided by the issuer stating the purpose of the   certificate as discussed in Section 2.2 SHOULD be evident through   indicated policies.   The certificate policies extension SHOULD include all policy   information needed for validation of the certificate.  If policy   information is included in the QCStatements extension (see 3.2.5),   then this information SHOULD also be defined by indicated policies.   Certificate policies MAY be combined with any qualifier defined in   RFC 2459.3.2.3  Key Usage   The key usage extension SHALL be present.  If the key usage   nonRepudiation bit is asserted then it SHOULD NOT be combined with   any other key usage , i.e., if set, the key usage non-repudiation   SHOULD be set exclusively.   The key usage extension MAY be marked critical.Santesson, et al.           Standards Track                    [Page 10]RFC 3039             Qualified Certificates Profile         January 20013.2.4  Biometric Information   This section defines an extension for storage of biometric   information.  Biometric information is stored in the form of a hash   of a biometric template.   The purpose of this extension is to provide means for authentication   of biometric information.  The biometric information that corresponds   to the stored hash is not stored in this extension, but the extension   MAY include an URI pointing to a location where this information can   be obtained.  If included, this URI does not imply that this is the   only way to access this information.   It is RECOMMENDED that biometric information in this extension is   limited to information types suitable for human verification, i.e.,   where the decision of whether the information is an accurate   representation of the subject is naturally performed by a person.   This implies a usage where the biometric information is represented   by, for example, a graphical image displayed to the relying party,   which MAY be used by the relying party to enhance identification of   the subject.   This extension MUST NOT be marked critical.      biometricInfo  EXTENSION ::= {          SYNTAX             BiometricSyntax          IDENTIFIED BY      id-pe-biometricInfo }      id-pe-biometricInfo OBJECT IDENTIFIER  ::= {id-pe 2}      BiometricSyntax ::= SEQUENCE OF BiometricData      BiometricData ::= SEQUENCE {          typeOfBiometricData  TypeOfBiometricData,          hashAlgorithm        AlgorithmIdentifier,          biometricDataHash    OCTET STRING,          sourceDataUri        IA5String OPTIONAL }      TypeOfBiometricData ::= CHOICE {          predefinedBiometricType    PredefinedBiometricType,          biometricDataID            OBJECT IDENTIFIER }      PredefinedBiometricType ::= INTEGER { picture(0),          handwritten-signature(1)} (picture|handwritten-signature,...)Santesson, et al.           Standards Track                    [Page 11]RFC 3039             Qualified Certificates Profile         January 2001   The predefined biometric type picture, when present, SHALL identify   that the source picture is in the form of a displayable graphical   image of the subject.  The hash of the graphical image SHALL only be   calculated over the image data excluding any labels defining the   image type.   The predefined biometric type handwritten-signature, when present,   SHALL identify that the source data is in the form of a displayable   graphical image of the subject's handwritten signature.  The hash of   the graphical image SHALL only be calculated over the image data   excluding any labels defining the image type.3.2.5  Qualified Certificate Statements   This section defines an extension for inclusion of defined statements   related to Qualified Certificates.   A typical statement suitable for inclusion in this extension MAY be a   statement by the issuer that the certificate is issued as a Qualified   Certificate in accordance with a particular legal system (as   discussed in Section 2.2).   Other statements suitable for inclusion in this extension MAY be   statements related to the applicable legal jurisdiction within which   the certificate is issued.  As an example this MAY include a maximum   reliance limit for the certificate indicating restrictions on CA's   liability.   Each statement SHALL include an object identifier for the statement   and MAY also include optional qualifying data contained in the   statementInfo parameter.   If the statementInfo parameter is included then the object identifier   of the statement SHALL define the syntax and SHOULD define the   semantics of this parameter.  If the object identifier does not   define the semantics, a relying party may have to consult a relevant   certificate policy or CPS to determine the exact semantics.   This extension may be critical or non-critical.  If the extension is   critical, this means that all statements included in the extension   are regarded as critical.      qcStatements  EXTENSION ::= {          SYNTAX             QCStatements          IDENTIFIED BY      id-pe-qcStatements }      id-pe-qcStatements     OBJECT IDENTIFIER ::= { id-pe 3 }Santesson, et al.           Standards Track                    [Page 12]RFC 3039             Qualified Certificates Profile         January 2001      QCStatements ::= SEQUENCE OF QCStatement      QCStatement ::= SEQUENCE {          statementId   QC-STATEMENT.&Id({SupportedStatements}),          statementInfo QC-STATEMENT.&Type          ({SupportedStatements}{@statementId}) OPTIONAL }      SupportedStatements QC-STATEMENT ::= { qcStatement-1,...}3.2.5.1 Predefined Statements   This profile includes one predefined object identifier (id-qcs-   pkixQCSyntax-v1), identifying conformance with syntax and semantics   defined in this profile.  This Qualified Certificate profile is   referred to as version 1.      qcStatement-1 QC-STATEMENT ::= { SYNTAX SemanticsInformation          IDENTIFIED BY id-qcs-pkixQCSyntax-v1 }      --  This statement identifies conformance with syntax and      --  semantics defined in this Qualified Certificate profile      --  (Version 1). The SemanticsInformation may optionally contain      --  additional semantics information as specified.      SemanticsInformation ::= SEQUENCE {          semanticsIdentifier        OBJECT IDENTIFIER   OPTIONAL,          nameRegistrationAuthorities NameRegistrationAuthorities                                                          OPTIONAL }          (WITH COMPONENTS {..., semanticsIdentifier PRESENT}|           WITH COMPONENTS {..., nameRegistrationAuthorities PRESENT})      NameRegistrationAuthorities ::=  SEQUENCE SIZE (1..MAX) OF          GeneralName   The SementicsInformation component identified by id-qcs-   pkixQCSyntax-v1 MAY contain a semantics identifier and MAY identify   one or more name registration authorities.   The semanticsIdentifier component, if present, SHALL contain an OID,   defining semantics for attributes and names in basic certificate   fields and certificate extensions.  The OID may define semantics for   all, or for a subgroup of all present attributes and/or names.   The NameRegistrationAuthorities component, if present, SHALL contain   a name of one or more name registration authorities, responsible for   registration of attributes or names associated with the subject.  The   association between an identified name registration authority and   present attributes MAY be defined by a semantics identifier OID, by a   certificate policy (or CPS) or some other implicit factors.Santesson, et al.           Standards Track                    [Page 13]RFC 3039             Qualified Certificates Profile         January 2001   If a value of type SemanticsInformation is present in a QCStatement   then at least one of the fields semanticsIdentifier and   nameRegistrationAuthorities must be present, as indicated.4  Security Considerations   The legal value of a digital signature that is validated with a   Qualified Certificate will be highly dependent upon the policy   governing the use of the associated private key.  Both the private   key holder as well as the relying party should make sure that the   private key is used only with the consent of the legitimate key   holder.   Since the public keys are for public use with legal implications for   involved parties, certain conditions should exist before CAs issue   certificates as Qualified Certificates.  The associated private keys

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲成人在线观看视频| 91香蕉视频mp4| 久久精品99国产精品| 亚洲成av人综合在线观看| 亚洲精品乱码久久久久久黑人| 国产精品久久久久毛片软件| 欧美国产精品一区二区三区| 久久精品一二三| 久久婷婷久久一区二区三区| 久久久国产一区二区三区四区小说 | 色就色 综合激情| 91香蕉视频在线| 一本色道久久加勒比精品| 91麻豆高清视频| 欧美亚洲综合色| 4hu四虎永久在线影院成人| 欧美日韩国产成人在线免费| 777精品伊人久久久久大香线蕉| 欧美精品免费视频| 日韩欧美国产一区二区三区| 精品国产乱码久久久久久牛牛| 久久久久国产精品麻豆ai换脸| 国产校园另类小说区| 国产精品福利影院| 亚洲激情自拍偷拍| 欧美a一区二区| 国产一区二区三区免费播放| 国产99久久久国产精品潘金网站| 91视频免费播放| 欧美老肥妇做.爰bbww| 欧美xxxxxxxx| 国产欧美日产一区| 亚洲男女毛片无遮挡| 亚洲国产va精品久久久不卡综合| 日韩不卡免费视频| 成人中文字幕在线| 91蜜桃网址入口| 欧美日产国产精品| 久久久精品天堂| 亚洲人成网站影音先锋播放| 日韩在线卡一卡二| 国产在线播放一区三区四| www.亚洲色图| 欧美精品乱码久久久久久按摩 | 亚洲大型综合色站| 韩国三级中文字幕hd久久精品| 波多野结衣中文字幕一区 | 欧美一区二区三区不卡| 久久久久久9999| 一区二区不卡在线视频 午夜欧美不卡在 | 国产精品久久精品日日| 亚洲va国产天堂va久久en| 国产一区二区在线影院| 在线观看精品一区| 久久精品视频一区二区| 亚洲综合免费观看高清在线观看| 日韩电影在线看| 成人av在线一区二区三区| 在线综合+亚洲+欧美中文字幕| 国产人妖乱国产精品人妖| 午夜电影网亚洲视频| 福利一区福利二区| 欧美精品99久久久**| 国产精品久久久久久户外露出 | 视频一区二区三区入口| 成人av集中营| 久久―日本道色综合久久| 亚洲超碰97人人做人人爱| 国产91丝袜在线播放九色| 在线观看91av| 亚洲人成在线播放网站岛国 | 欧美精品一区视频| 婷婷久久综合九色综合伊人色| 成人理论电影网| 精品国产一区二区三区四区四 | 欧美a级理论片| 欧美三电影在线| 国产精品国产自产拍高清av王其| 美腿丝袜一区二区三区| 欧美日韩精品欧美日韩精品| 中文字幕av一区 二区| 精品亚洲成a人| 欧美日韩一级二级三级| 国产精品电影一区二区| 国产精品88888| 日韩一级欧美一级| 亚洲尤物视频在线| 91老司机福利 在线| 中文字幕乱码久久午夜不卡| 蜜臀av一区二区在线观看| 在线一区二区视频| 亚洲综合小说图片| 91蝌蚪porny| 亚洲欧美在线观看| 成人亚洲一区二区一| 久久久99精品久久| 国内精品视频666| 日韩欧美一级二级三级| 日本亚洲最大的色成网站www| 欧美在线色视频| 有码一区二区三区| 91社区在线播放| 一区精品在线播放| 91亚洲精品久久久蜜桃网站 | 亚洲精品日韩综合观看成人91| a4yy欧美一区二区三区| 自拍偷自拍亚洲精品播放| 不卡的av电影| 亚洲日本电影在线| 91国在线观看| 午夜av一区二区三区| 精品视频一区二区三区免费| 夜夜嗨av一区二区三区中文字幕| 色成年激情久久综合| 亚洲激情中文1区| 欧美日韩电影一区| 裸体健美xxxx欧美裸体表演| 亚洲精品一区二区在线观看| 国产精品66部| 国产精品日产欧美久久久久| 色婷婷狠狠综合| 亚洲一级不卡视频| 欧美一区二区性放荡片| 精品亚洲porn| 亚洲国产精品成人综合色在线婷婷| 成人精品免费看| 亚洲乱码国产乱码精品精98午夜| 欧美午夜电影一区| 蜜桃久久精品一区二区| 久久久激情视频| 色视频一区二区| 日韩高清在线电影| 精品国产凹凸成av人网站| 成人免费毛片嘿嘿连载视频| 又紧又大又爽精品一区二区| 日韩一区二区在线观看视频播放| 国产福利电影一区二区三区| 亚洲欧美一区二区三区孕妇| 欧美麻豆精品久久久久久| 精品一区二区久久久| 亚洲三级电影全部在线观看高清| 欧美日韩亚洲高清一区二区| 国内外成人在线| 亚洲免费大片在线观看| 欧美成人三级在线| 91亚洲精品一区二区乱码| 视频一区在线视频| 欧美极品aⅴ影院| 欧美三级在线视频| 国产黑丝在线一区二区三区| 一区二区欧美视频| 欧美精品一区二区三区四区| 色八戒一区二区三区| 看片的网站亚洲| 亚洲精选在线视频| www一区二区| 欧美丝袜丝交足nylons| 国内精品久久久久影院一蜜桃| 樱桃国产成人精品视频| 日韩精品一区国产麻豆| 色激情天天射综合网| 国产成人免费高清| 日韩—二三区免费观看av| 亚洲欧美一区二区不卡| 26uuu精品一区二区在线观看| 在线观看免费成人| 成人性视频免费网站| 青娱乐精品在线视频| 亚洲日本丝袜连裤袜办公室| 久久男人中文字幕资源站| 欧美挠脚心视频网站| 色综合av在线| 成人av集中营| 国产精品原创巨作av| 免费成人深夜小野草| 亚洲欧美一区二区三区国产精品 | 久久午夜羞羞影院免费观看| 欧美精品久久天天躁| 色噜噜夜夜夜综合网| av一区二区久久| 国产成人丝袜美腿| 久久爱另类一区二区小说| 亚洲不卡av一区二区三区| 亚洲精品va在线观看| 国产精品久久久久久久第一福利| 久久噜噜亚洲综合| 精品国产污污免费网站入口 | 欧美日韩午夜在线| 91麻豆123| 99国产精品国产精品久久| 国产不卡免费视频| 国产精品一区二区久激情瑜伽 | 欧美老肥妇做.爰bbww| 欧美性色综合网| 欧洲生活片亚洲生活在线观看| 成人深夜视频在线观看| 国产精品亚洲午夜一区二区三区 | 日韩欧美精品在线视频| 91精品啪在线观看国产60岁| 欧美色精品天天在线观看视频|