亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3039.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   must be unique for the subject, and must be maintained under the   subject's sole control.  That is, a CA should not issue a qualified   certificate if the means to use the private key is not protected   against unintended usage.  This implies that the CA have some   knowledge about the subject's cryptographic module.   The CA must further verify that the public key contained in the   certificate is legitimately representing the subject.   CAs should not issue CA certificates with policy mapping extensions   indicating acceptance of another CA's policy unless these conditions   are met.   Combining the nonRepudiation bit in the keyUsage certificate   extension with other keyUsage bits may have security implications and   this specification therefore recommends against such practices.   The ability to compare two qualified certificates to determine if   they represent the same physical entity is dependent on the semantics   of the subjects' names.  The semantics of a particular attribute may   be different for different issuers.  Comparing names without   knowledge of the semantics of names in these particular certificates   may provide misleading results.   This specification is a profile of RFC 2459.  The security   considerations section of that document applies to this specification   as well.Santesson, et al.           Standards Track                    [Page 14]RFC 3039             Qualified Certificates Profile         January 20015 References   [RFC 2119] Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119, March 1997.   [RFC 2247] Kille, S., Wahl, M., Grimstad, A., Huber, R. and S.              Sataluri, "Using Domains in LDAP/X.500 Distinguished              Names", RFC 2247, January 1998.   [RFC 2459] Housley, R., Ford, W., Polk, W. and D. Solo, "Internet              X.509 Public Key Infrastructure: Certificate and CRL              Profile", RFC 2459, January 1999.   [RFC 2985] Nystrom, M. and B. Kaliski, "PKCS #9: Selected Object              Classes and Attribute Types Version 2.0", RFC 2985,              November 2000.   [X.501]    ITU-T Recommendation X.501: Information Technology - Open              Systems Interconnection - The Directory: Models, June              1993.   [X.509]    ITU-T Recommendation X.509: Information Technology - Open              Systems Interconnection - The Directory: Authentication              Framework, June 1997.   [X.520]    ITU-T Recommendation X.520: Information Technology - Open              Systems Interconnection - The Directory: Selected              Attribute Types, June 1993.   [X.680]    ITU-T Recommendation X.680: Information Technology -              Abstract Syntax Notation One, 1997.   [ISO 3166] ISO Standard 3166: Codes for the representation of names              of countries, 1993.Santesson, et al.           Standards Track                    [Page 15]RFC 3039             Qualified Certificates Profile         January 20016 Intellectual Property Rights   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.Santesson, et al.           Standards Track                    [Page 16]RFC 3039             Qualified Certificates Profile         January 2001A. ASN.1 definitions   As in RFC 2459, ASN.1 modules are supplied in two different variants   of the ASN.1 syntax.   Appendix A.1 is in the 1988 syntax, and does not use macros.   However, since the module imports type definitions from modules in   RFC 2459 which are not completely in the 1988 syntax, the same   comments as in RFC 2459 regarding its use applies here as well; i.e.,   Appendix A.1 may be parsed by an 1988 ASN.1-parser by removing the   definitions for the UNIVERSAL types and all references to them in RFC   2459's 1988 modules.   Appendix A.2 is in the 1993 syntax.  However, since the module   imports type definitions from modules in RFC 2459 which are not   completely in the 1993 syntax, the same comments as in RFC 2459   regarding its use applies here as well; i.e., Appendix A.2 may be   parsed by an 1993 ASN.1-parser by removing the UTF8String choice from   the definition of DirectoryString in the module PKIX1Explicit93 in   RFC 2459.  Appendix A.2 may be parsed "as is" by an 1997 ASN.1   parser, however.   In case of discrepancies between these modules, the 1988 module is   the normative one.A.1 1988 ASN.1 ModulePKIXqualified88 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-mod-qualified-cert-88(10) }DEFINITIONS EXPLICIT TAGS ::=BEGIN-- EXPORTS ALL --IMPORTSGeneralName    FROM PKIX1Implicit88 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-pkix1-implicit-88(2)}AlgorithmIdentifier, DirectoryString, Attribute, AttributeType,    id-pkix, id-pe, id-at    FROM PKIX1Explicit88 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)Santesson, et al.           Standards Track                    [Page 17]RFC 3039             Qualified Certificates Profile         January 2001    id-pkix1-explicit-88(1)};-- Locally defined OIDs-- Arc for QC personal data attributesid-pda  OBJECT IDENTIFIER ::= { id-pkix 9 }-- Arc for QC statementsid-qcs  OBJECT IDENTIFIER ::= { id-pkix 11 }-- Attributesid-at-serialNumber          AttributeType ::= { id-at 5 }SerialNumber ::=            PrintableString (SIZE(1..64))id-at-postalAddress         AttributeType ::= { id-at 16 }PostalAddress ::=           SEQUENCE SIZE (1..6) OF DirectoryStringid-at-pseudonym             AttributeType ::= { id-at 65 }Pseudonym ::=               DirectoryStringdomainComponent             AttributeType ::=                            { 0 9 2342 19200300 100 1 25 }DomainComponent ::=         IA5Stringid-pda-dateOfBirth          AttributeType ::= { id-pda 1 }DateOfBirth ::=             GeneralizedTimeid-pda-placeOfBirth         AttributeType ::= { id-pda 2 }PlaceOfBirth ::=            DirectoryStringid-pda-gender               AttributeType ::= { id-pda 3 }Gender ::=                  PrintableString (SIZE(1))                            -- "M", "F", "m" or "f"id-pda-countryOfCitizenship AttributeType ::= { id-pda 4 }CountryOfCitizenship ::=    PrintableString (SIZE (2))                            -- ISO 3166 Country Codeid-pda-countryOfResidence   AttributeType ::= { id-pda 5 }CountryOfResidence ::=      PrintableString (SIZE (2))                            -- ISO 3166 Country Code-- Private extensions-- Biometric info extensionid-pe-biometricInfo OBJECT IDENTIFIER  ::= {id-pe 2}Santesson, et al.           Standards Track                    [Page 18]RFC 3039             Qualified Certificates Profile         January 2001BiometricSyntax ::= SEQUENCE OF BiometricDataBiometricData ::= SEQUENCE {    typeOfBiometricData  TypeOfBiometricData,    hashAlgorithm        AlgorithmIdentifier,    biometricDataHash    OCTET STRING,    sourceDataUri        IA5String OPTIONAL }TypeOfBiometricData ::= CHOICE {    predefinedBiometricType   PredefinedBiometricType,    biometricDataOid          OBJECT IDENTIFIER }PredefinedBiometricType ::= INTEGER {    picture(0),handwritten-signature(1)}    (picture|handwritten-signature)-- QC Statements Extensionid-pe-qcStatements OBJECT IDENTIFIER ::= { id-pe 3}QCStatements ::= SEQUENCE OF QCStatementQCStatement ::= SEQUENCE {    statementId        OBJECT IDENTIFIER,    statementInfo      ANY DEFINED BY statementId OPTIONAL}-- QC statementsid-qcs-pkixQCSyntax-v1   OBJECT IDENTIFIER ::= { id-qcs 1 }--  This statement identifies conformance with syntax and--  semantics defined in this Qualified Certificate profile--  (Version 1). This statement may optionally contain--  additional semantics information as specified below.SemanticsInformation  ::= SEQUENCE {    semanticsIndentifier        OBJECT IDENTIFIER OPTIONAL,    nameRegistrationAuthorities NameRegistrationAuthorities OPTIONAL    } -- At least one field shall be presentNameRegistrationAuthorities ::= SEQUENCE SIZE (1..MAX) OF GeneralNameENDA.2 1993 ASN.1  ModulePKIXqualified93 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-mod-qualified-cert-93(11) }Santesson, et al.           Standards Track                    [Page 19]RFC 3039             Qualified Certificates Profile         January 2001DEFINITIONS EXPLICIT TAGS ::=BEGIN-- EXPORTS ALL --IMPORTSauthorityKeyIdentifier, subjectKeyIdentifier, keyUsage,    extendedKeyUsage, privateKeyUsagePeriod, certificatePolicies,    policyMappings, subjectAltName, issuerAltName, basicConstraints,    nameConstraints, policyConstraints, cRLDistributionPoints,    subjectDirectoryAttributes, authorityInfoAccess, GeneralName,    OTHER-NAME    FROM PKIX1Implicit93 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-pkix1-implicit-93(4)}id-pkix, AlgorithmIdentifier, ATTRIBUTE, Extension, EXTENSION,    DirectoryString{}, ub-name, id-pe, id-at, id-at-commonName,    id-at-surname, id-at-countryName, id-at-localityName,    id-at-stateOrProvinceName, id-at-organizationName,    id-at-organizationalUnitName, id-at-givenName, id-at-dnQualifier,    pkcs9email, title, organizationName, organizationalUnitName,    stateOrProvinceName, localityName, countryName,    generationQualifier, dnQualifier, initials, givenName, surname,    commonName, name    FROM PKIX1Explicit93 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-pkix1-explicit-93(3)};-- Object Identifiers-- Externally defined OIDsid-at-serialNumber  OBJECT IDENTIFIER ::= { id-at 5}id-at-postalAddress OBJECT IDENTIFIER ::= { id-at 16 }id-at-pseudonym     OBJECT IDENTIFIER ::= { id-at 65 }id-domainComponent  OBJECT IDENTIFIER ::= { 0 9 2342 19200300 100 1 25 }-- Locally defined OIDs-- Arc for QC personal data attributesid-pda  OBJECT IDENTIFIER ::= { id-pkix 9 }-- Arc for QC statementsid-qcs  OBJECT IDENTIFIER ::= { id-pkix 11 }-- Private extensionsSantesson, et al.           Standards Track                    [Page 20]RFC 3039             Qualified Certificates Profile         January 2001

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧洲精品天堂一级| 亚洲美女视频在线| 中文字幕日韩精品一区| 亚洲成人久久影院| 国产风韵犹存在线视精品| 在线观看一区日韩| 中文字幕av一区二区三区免费看| 亚洲成人动漫在线观看| av午夜精品一区二区三区| 欧美成人免费网站| 亚洲午夜久久久久久久久久久 | 1区2区3区国产精品| 久久电影网站中文字幕 | 国产精品亚洲综合一区在线观看| 在线观看成人小视频| 国产日韩欧美精品综合| 日本大胆欧美人术艺术动态| 欧美伊人精品成人久久综合97 | 在线不卡a资源高清| 亚洲男人的天堂av| 成人中文字幕合集| 久久久91精品国产一区二区精品| 蜜臀精品久久久久久蜜臀| 欧美高清视频www夜色资源网| 亚洲免费在线观看| 91浏览器入口在线观看| 国产精品久线观看视频| 成人丝袜18视频在线观看| 精品国产伦理网| 日本不卡在线视频| 777久久久精品| 亚洲综合免费观看高清完整版在线| 国产成a人亚洲| 国产亚洲综合在线| 国产·精品毛片| 久久久综合精品| 韩国中文字幕2020精品| 精品国产伦一区二区三区免费| 精品在线一区二区| 久久久天堂av| 91网址在线看| 亚洲激情图片一区| 欧美日韩在线播放一区| 五月天欧美精品| 日韩精品一区二区三区视频在线观看| 日韩电影免费在线看| 精品久久久久久最新网址| 国模一区二区三区白浆| 国产精品每日更新在线播放网址| 国产成人av自拍| 亚洲精品亚洲人成人网| 欧美日韩一区不卡| 黑人巨大精品欧美一区| 国产精品久久久久精k8 | 亚洲女同女同女同女同女同69| 在线视频你懂得一区二区三区| 亚洲一区二区三区免费视频| 日韩亚洲欧美一区二区三区| 国内精品国产成人| 亚洲另类在线视频| 欧美一区二区三级| 福利一区在线观看| 亚洲伊人色欲综合网| 日韩欧美国产成人一区二区| 成人高清视频免费观看| 亚洲永久精品大片| 26uuu亚洲综合色| 91丨九色丨尤物| 久热成人在线视频| 国产精品国产三级国产有无不卡| 欧美视频一区二| 国产精品1区2区3区| 亚洲第一在线综合网站| 久久精品一区二区| 欧美人妖巨大在线| 国产91富婆露脸刺激对白| 天天综合色天天综合色h| 久久精品男人的天堂| 欧美精品精品一区| 不卡的av在线播放| 美女免费视频一区| 亚洲国产欧美在线人成| 国产片一区二区| 日韩欧美一级在线播放| 色综合久久中文字幕综合网| 精品午夜一区二区三区在线观看| 亚洲女性喷水在线观看一区| 国产日韩欧美精品电影三级在线| 欧美日韩国产欧美日美国产精品| 成人a级免费电影| 极品少妇一区二区三区精品视频| 伊人色综合久久天天人手人婷| 精品国产91九色蝌蚪| 欧美高清视频www夜色资源网| 不卡视频在线看| 国产福利精品一区二区| 久久狠狠亚洲综合| 午夜精品久久久久久久久| 亚洲日本在线视频观看| 国产日韩精品一区二区三区 | 国产午夜亚洲精品不卡| 6080午夜不卡| 欧美日韩一区二区三区视频| 色哟哟欧美精品| 99久久久久久| 99久久婷婷国产综合精品电影| 国产综合色在线视频区| 久久99精品国产.久久久久久| 亚洲va欧美va国产va天堂影院| 亚洲三级理论片| 一区二区三区日韩欧美精品| 亚洲色图欧美在线| 亚洲欧洲成人精品av97| 国产午夜三级一区二区三| 国产亚洲欧洲997久久综合 | 中文字幕va一区二区三区| 久久久久国产一区二区三区四区| 欧美大尺度电影在线| 91精品国产高清一区二区三区| 日韩一区二区免费在线电影 | 国产三级欧美三级日产三级99| 久久人人爽爽爽人久久久| 精品伦理精品一区| 国产日产欧美一区| 中文字幕第一页久久| 亚洲女人的天堂| 亚洲一区二区不卡免费| 午夜精品一区在线观看| 偷窥少妇高潮呻吟av久久免费| 亚洲综合在线观看视频| 婷婷综合久久一区二区三区| 日日摸夜夜添夜夜添亚洲女人| 日韩高清一级片| 久久se精品一区精品二区| 国产91露脸合集magnet| 色噜噜久久综合| 欧美一区二区三区日韩视频| 337p粉嫩大胆色噜噜噜噜亚洲 | 欧美三级在线播放| 在线成人高清不卡| 久久久综合精品| 玉足女爽爽91| 欧美aaa在线| 国产不卡免费视频| 色国产综合视频| 欧美一区三区二区| 中国av一区二区三区| 亚洲最快最全在线视频| 老司机免费视频一区二区| 懂色一区二区三区免费观看| 一本久久a久久精品亚洲| 日韩一级高清毛片| 成人欧美一区二区三区| 蜜桃一区二区三区在线| 91网站最新网址| 日韩一区二区免费视频| 亚洲欧美日韩中文字幕一区二区三区| 首页欧美精品中文字幕| 国产福利91精品一区二区三区| 欧美唯美清纯偷拍| 久久先锋资源网| 亚洲成精国产精品女| 成人av在线电影| 91麻豆精品91久久久久同性| 国产精品久久久久久久久晋中 | 亚洲综合在线免费观看| 国内欧美视频一区二区 | 婷婷激情综合网| 成人免费看视频| 精品日产卡一卡二卡麻豆| 亚洲综合免费观看高清在线观看| 国产中文一区二区三区| 欧美日韩精品免费观看视频 | 午夜精品久久久久久久久久久| 岛国精品一区二区| 精品少妇一区二区三区在线视频| 亚洲免费观看高清完整版在线观看熊| 韩国中文字幕2020精品| 欧美一区在线视频| 亚洲综合在线视频| 色婷婷综合激情| 成人免费在线播放视频| 国产馆精品极品| 精品国产91乱码一区二区三区 | 成人黄色在线视频| 精品人伦一区二区色婷婷| 日日嗨av一区二区三区四区| 91色乱码一区二区三区| 国产精品久久久久久久久快鸭| 国内外成人在线| 久久综合精品国产一区二区三区| 日本成人在线网站| 在线播放一区二区三区| 亚洲成人免费av| 欧美日韩免费高清一区色橹橹| 亚洲码国产岛国毛片在线| 91婷婷韩国欧美一区二区| 日韩久久一区二区| 日本道色综合久久| 亚洲一区二区三区自拍|