亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rsa-pkalgs-00.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
                           country(16) us(840) organization(1) gov(101)                           csor(3) nistalgorithm(4) hashalgs(2) 3 }   There are two possible encodings for the AlgorithmIdentifier   parameters field associated with these object identifiers.  The two   alternatives arise from the fact that when the 1988 syntax for   AlgorithmIdentifier was translated into the 1997 syntax the OPTIONAL   associated with the algorithm identifier parameters got lost.  Later   the OPTIONAL was recovered via a defect report, but by then many   people thought that algorithm parameters were mandatory.  Because of   this history some implementations encode parameters as a NULL element   and others omit them entirely.  The correct encoding is to omit the   parameters field; however, implementations must also handle an   algorithm identifier parameters field which contains a NULL.   The AlgorithmIdentifier parameters field is OPTIONAL.  If present,   the parameters field must contain a NULL.  Implementations MUST   accept an AlgorithmIdentifiers with absent parameters as well as   AlgorithmIdentifiers with NULL parameters.  Within this   specification, there are many places where a NULL parameter is   REQUIRED.  To be clear, the following algorithm identifiers are usedHousley & Kaliski                                               [Page 6]INTERNET DRAFT                                             December 2002   when a NULL parameter MUST be present:      sha1Identifier  AlgorithmIdentifier  ::=  { id-sha1, NULL }      sha256Identifier  AlgorithmIdentifier  ::=  { id-sha256, NULL }      sha384Identifier  AlgorithmIdentifier  ::=  { id-sha384, NULL }      sha512Identifier  AlgorithmIdentifier  ::=  { id-sha512, NULL }2.2  Mask Generation Functions   One mask generation function is used with the RSASSA-PSS signature   algorithm and the RSAES-OAEP key transport algorithm: MGF1 [P1v2.1].   No other mask generation functions are supported by this   specification.   MGF1 is identified by the following object identifier:      id-mgf1  OBJECT IDENTIFIER  ::=  { pkcs-1 8 }   The parameters field associated with id-mgf1 MUST have a   hashAlgorithm value, which identifies the hash function being used   with MGF1.  This value MUST be sha1Identifier, sha256Identifier,   sha384Identifier, or sha512Identifier, as specified in section 2.1.   Implementations MUST support the default value, sha1Identifier, and   implementations MAY support the other three values.   The following algorithm identifiers have been assigned for each of   these alternatives:      mgf1SHA1Identifier  AlgorithmIdentifier  ::=                           { id-mgf1, sha1Identifier }      mgf1SHA256Identifier  AlgorithmIdentifier  ::=                           { id-mgf1, sha256Identifier }      mgf1SHA384Identifier  AlgorithmIdentifier  ::=                           { id-mgf1, sha384Identifier }      mgf1SHA512Identifier  AlgorithmIdentifier  ::=                           { id-mgf1, sha512Identifier }3  RSASSA-PSS Signature Algorithm   This section describes the conventions for using the RSASSA-PSS   signature algorithm with the Internet X.509 certificate and CRL   profile [PROFILE].  The RSASSA-PSS signature algorithm is specifiedHousley & Kaliski                                               [Page 7]INTERNET DRAFT                                             December 2002   in PKCS #1 version 2.1 [P1v2.1].  The four one-way hash functions   discussed in section 2.1 and the one mask generation function   discussed in section 2.2 can be used with RSASSA-PSS.  Conforming CAs   and applications MUST support RSASSA-PSS digital signatures using   SHA-1.  The other three one-way hash functions MAY also be supported.   Certificates and CRLs conforming to [PROFILE] may be signed with any   public key signature algorithm.  The certificate or CRL indicates the   algorithm through an algorithm identifier which appears in the   signatureAlgorithm field within the Certificate or CertificateList.   This algorithm identifier is an object identifier (OID) and optional   parameters.  Section 3.1 specifies the object identifier and   parameters for RSASSA-PSS digital signatures.   The data to be signed (e.g., the one-way hash function output value)   is formatted for the signature algorithm to be used.  Then, a private   key operation (e.g., RSA encryption) is performed to generate the   signature value.  This signature value is then ASN.1 encoded as a BIT   STRING and included in the Certificate or CertificateList in the   signature field.  Section 3.2 specifies the format of RSASSA-PSS   signature values.3.1  RSASSA-PSS Public Keys   When RSASSA-PSS is used in an AlgorithmIdentifier, the parameters   MUST be present, and the parameters MUST employ the RSASSA-PSS-params   syntax.      id-RSASSA-PSS  OBJECT IDENTIFIER  ::=  { pkcs-1 10 }      RSASSA-PSS-params  ::=  SEQUENCE  {         hashAlgorithm      [0] HashAlgorithm DEFAULT                                   sha1Identifier,         maskGenAlgorithm   [1] MaskGenAlgorithm DEFAULT                                   mgf1SHA1Identifier,         saltLength         [2] INTEGER DEFAULT 20,         trailerField       [3] INTEGER DEFAULT 1  }   The fields of type RSASSA-PSS-params have the following meanings:      hashAlgorithm         The hashAlgorithm field identifies the hash function.  It MUST         be one of the algorithm identifiers listed in section 2.1, and         the default hash function is SHA-1.  Implementations MUST         support SHA-1, and implementations MAY support other one-way         hash functions listed in section 2.1.  Implementations that         perform signature generation MUST omit the hashAlgorithm fieldHousley & Kaliski                                               [Page 8]INTERNET DRAFT                                             December 2002         when SHA-1 is used, indicating that the default algorithm was         used.  Implementations that perform signature validation MUST         recognize both the id-sha1 object identifier and an absent         hashAlgorithm field as an indication that SHA-1 was used.      maskGenAlgorithm         The maskGenAlgorithm field identifies the mask generation         function.  It MUST be an algorithm identifier, and the default         mask generation function is MGF1 with SHA-1.  For MGF1, it is         strongly RECOMMENDED that the underlying hash function be the         same as the one identified by hashAlgorithm.  Implementations         MUST support MGF1.  MGF1 requires a one-way hash function, and         it is identified in the parameter field of the MGF1 algorithm         identifier.  Implementations MUST support SHA-1, and         implementations MAY support other one-way hash functions listed         in section 2.1.  The MGF1 algorithm identifier is comprised of         the id-mgf1 object identifier and a parameter that contains the         algorithm identifier of the one-way hash function employed with         MGF1.  The SHA-1 algorithm identifier is comprised of the id-         sha1 object identifier and a parameter of NULL.         Implementations that perform signature generation MUST omit the         maskGenAlgorithm field when MGF1 with SHA-1 is used, indicating         that the default algorithm was used.  Implementations that         perform signature validation MUST recognize both the id-mgf1         and id-sha1 object identifiers as well as an absent         maskGenAlgorithm field as an indication that MGF1 with SHA-1         was used.      saltLength         The saltLength field is the octet length of the salt.  It MUST         be an integer.  For a given hashAlgorithm, the default value of         saltLength is the number of octets in the hash value.  Unlike         the other fields of type RSASSA-PSS-params, saltLength does not         need to be fixed for a given RSA key pair; a different value         could be used for each RSASSA-PSS signature generated.      trailerField         The trailerField field is an integer.  It provides         compatibility with the draft IEEE P1363a [P1363a].  The value         MUST be 1, which represents the trailer field with hexadecimal         value 0xBC.  Other trailer fields, including the trailer field         composed of HashID concatenated with 0xCC that is specified in         IEEE P1363a, are not supported.  Implementations that perform         signature generation MUST omit the trailerField field,         indicating that the default trailer field value was used.Housley & Kaliski                                               [Page 9]INTERNET DRAFT                                             December 2002         Implementations that perform signature validation MUST         recognize both a present and an absent trailerField field.   If the default values of the hashAlgorithm, maskGenAlgorithm, and   trailerField fields of RSASSA-PSS-params are used, then the algorithm   identifier will have the following value:      rSASSA-PSS-Default-Identifier  AlgorithmIdentifier  ::=  {                           { id-RSASSA-PSS,                              { sha1Identifier,                                mgf1SHA1Identifier,                                20,                                1  }  }3.2  RSASSA-PSS Signature Values   The output of the RSASSA-PSS signature algorithm is an octet string,   which has the same length in octets as the RSA modulus n.   Signature values in CMS [CMS] are represented as octet strings, and   the output is used directly.  However, signature values in   certificates and CRLs [PROFILE] are represented as bit strings, and   conversion is needed.   To convert a signature value to a bit string, the most significant   bit of the first octet of the signature value SHALL become the first   bit of the bit string, and so on through the least significant bit of   the last octet of the signature value, which SHALL become the last   bit of the bit string.4  RSAES-OAEP Key Transport Algorithm   This section describes the conventions for using the RSAES-OAEP key   transport algorithm with the Internet X.509 certificate and CRL   profile [PROFILE].  RSAES-OAEP is specified in PKCS #1 version 2.1   [P1v2.1].  The four one-way hash functions discussed in section 2.1   and the one mask generation function discussed in section 2.2 can be   used with RSAES-OAEP.  Conforming CAs and applications MUST support   RSAES-OAEP key transport algorithm using SHA-1.  The other three one-   way hash functions MAY also be supported.   Certificates and CRLs conforming to [PROFILE] may be signed with any   public key signature algorithm.  The certificate or CRL indicates the   algorithm through an algorithm identifier which appears in the   signatureAlgorithm field within the Certificate or CertificateList.   This algorithm identifier is an object identifier (OID) and optional   parameters.  Section 4.1 specifies the object identifier and   parameters for RSAES-OAEP key transport.Housley & Kaliski                                              [Page 10]INTERNET DRAFT                                             December 20024.1  RSAES-OAEP Public Keys   When RSAES-OAEP is used in an AlgorithmIdentifier, the parameters   MUST be present, and the parameters MUST employ the RSAES-OAEP-params   syntax.      id-RSAES-OAEP  OBJECT IDENTIFIER  ::=  { pkcs-1 7 }      RSAES-OAEP-params  ::=  SEQUENCE  {         hashFunc          [0] AlgorithmIdentifier DEFAULT                                  sha1Identifier,         maskGenFunc       [1] AlgorithmIdentifier DEFAULT                                  mgf1SHA1Identifier,         pSourceFunc       [2] AlgorithmIdentifier DEFAULT                                  pSpecifiedEmptyIdentifier  }      pSpecifiedEmptyIdentifier  AlgorithmIdentifier  ::=                           { id-pSpecified, nullOctetString }      nullOctetString  OCTET STRING (SIZE (0))  ::=  { ''H }   The fields of type RSAES-OAEP-params have the following meanings:      hashFunc         The hashFunc field identifies the one-way hash function.  It         MUST be one of the algorithm identifiers listed in section 2.1,         and the default hash function is SHA-1.  Implementations MUST         support SHA-1, and implementations MAY support other one-way         hash functions listed in section 2.1.  Implementations that         perform encryption MUST omit the hashFunc field when SHA-1 is         used, indicating that the default algorithm was used.         Implementations that perform decryption MUST recognize both the         id-sha1 object identifier and an absent hashFunc field as an         indication that SHA-1 was used.      maskGenFunc         The maskGenFunc field identifies the mask generation function.         It MUST be an algorithm identifier, and the default mask         generation function is MGF1 with SHA-1.  For MGF1, it is         strongly RECOMMENDED that the underlying hash function be the         same as the one identified by hashFunc.  Implementations MUST         support MGF1.  MGF1 requires a one-way hash function, and it is         identified in the parameter field of the MGF1 algorithm         identifier.  Implementations MUST support SHA-1, andHousley & Kaliski                                              [Page 11]INTERNET DRAFT                                             December 2002

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美亚洲一区二区在线观看| 麻豆国产欧美日韩综合精品二区 | 色综合天天综合色综合av| 欧美激情一二三区| 91片在线免费观看| 婷婷成人综合网| 日韩精品中文字幕在线不卡尤物| 久久黄色级2电影| 国产欧美精品一区| 91老司机福利 在线| 亚洲va在线va天堂| 欧美r级在线观看| 不卡在线视频中文字幕| 亚洲国产精品久久一线不卡| 欧美疯狂做受xxxx富婆| 激情国产一区二区| 亚洲日本青草视频在线怡红院| 欧美无乱码久久久免费午夜一区| 麻豆精品视频在线观看免费| 欧美激情在线观看视频免费| 欧美在线观看视频一区二区三区| 视频一区欧美精品| 中文字幕不卡三区| 欧美日韩国产一级二级| 国产凹凸在线观看一区二区| 亚洲一区在线观看网站| 26uuu精品一区二区三区四区在线 26uuu精品一区二区在线观看 | 91麻豆精品国产91久久久资源速度| 麻豆精品精品国产自在97香蕉| 中文字幕亚洲不卡| 欧美一区国产二区| 95精品视频在线| 久久电影网电视剧免费观看| 亚洲欧美日韩国产手机在线 | 欧美一级高清片| av男人天堂一区| 精品午夜一区二区三区在线观看| 亚洲婷婷在线视频| 国产调教视频一区| 日韩精品专区在线影院重磅| 色偷偷久久一区二区三区| 国产麻豆一精品一av一免费| 午夜电影一区二区三区| 国产精品对白交换视频| 精品国产伦一区二区三区观看体验 | 亚洲男帅同性gay1069| 精品黑人一区二区三区久久| 欧美三级在线播放| 91在线一区二区三区| 韩国av一区二区三区在线观看| 亚洲国产一区二区三区| 中文字幕制服丝袜成人av | 看片的网站亚洲| 天堂va蜜桃一区二区三区 | 国产精品狼人久久影院观看方式| 日韩精品中文字幕在线不卡尤物| 欧美日韩日本视频| 99re免费视频精品全部| 国产盗摄精品一区二区三区在线| 日韩国产欧美三级| 亚洲制服丝袜一区| 一区二区三区欧美久久| 国产精品高潮呻吟久久| 国产精品欧美一区喷水| 日本一区二区三区视频视频| 精品国产1区二区| 日韩一区二区电影在线| 91麻豆精品久久久久蜜臀| 欧美精选一区二区| 欧美精品三级日韩久久| 欧美日高清视频| 4438x亚洲最大成人网| 欧美福利电影网| 日韩欧美国产综合| 日韩精品一区二区三区视频在线观看| 91精品国产综合久久久久久久 | 国内偷窥港台综合视频在线播放| 老司机精品视频在线| 韩国欧美国产1区| 国产精品亚洲а∨天堂免在线| 国产精品一区二区在线播放| 国产成a人无v码亚洲福利| 国产成人精品综合在线观看 | 亚洲欧洲精品一区二区三区| 国产精品超碰97尤物18| 综合激情成人伊人| 亚洲国产视频直播| 日韩 欧美一区二区三区| 人人精品人人爱| 九九精品视频在线看| 国产精品456| 91蝌蚪porny九色| 91国产成人在线| 91精品国产综合久久国产大片| 欧美大片拔萝卜| 国产女主播视频一区二区| 亚洲免费高清视频在线| 丝袜美腿亚洲综合| 黑人巨大精品欧美黑白配亚洲| 国产成人aaa| 色8久久人人97超碰香蕉987| 日韩欧美一级在线播放| 国产午夜精品久久久久久免费视| 亚洲丝袜美腿综合| 日韩激情一二三区| 国产91精品精华液一区二区三区 | 日本韩国欧美在线| 制服丝袜亚洲精品中文字幕| 久久先锋影音av| 一区二区三区四区亚洲| 蜜臀av性久久久久蜜臀aⅴ四虎| 国产乱子伦一区二区三区国色天香| 99久久精品国产毛片| 欧美日韩成人一区二区| 久久九九久精品国产免费直播| 亚洲一区二区三区影院| 激情综合网激情| 91麻豆国产在线观看| 欧美大片一区二区三区| 亚洲另类在线视频| 国产一区二区三区久久悠悠色av| 91色porny| 久久嫩草精品久久久精品| 亚洲国产成人高清精品| 成人性生交大片免费看中文网站| 欧美日韩国产影片| 国产精品卡一卡二卡三| 久久成人麻豆午夜电影| 欧美在线不卡一区| 国产色综合久久| 日韩av一级电影| 91福利资源站| 日本一区二区三级电影在线观看| 亚洲精品国产成人久久av盗摄| 精品一区二区日韩| 欧美日精品一区视频| 国产精品美女视频| 国产真实精品久久二三区| 欧美日韩国产精品成人| 综合在线观看色| 国产成人亚洲精品狼色在线| 日韩一区二区免费视频| 亚洲激情男女视频| caoporn国产精品| 久久精品一区蜜桃臀影院| 久久精品国产在热久久| 欧美日韩在线播放| 亚洲欧美怡红院| 国产成人精品一区二| 精品国产免费久久| 久久草av在线| 3atv在线一区二区三区| 亚洲大片在线观看| 在线精品亚洲一区二区不卡| 最新久久zyz资源站| 国产91精品一区二区麻豆网站 | 亚洲精品在线观| 毛片一区二区三区| 4hu四虎永久在线影院成人| 亚洲第一成年网| 欧美人xxxx| 日本成人中文字幕| 欧美一区二区三区在线电影| 亚洲一区二区三区四区的| 91麻豆视频网站| 一区二区三区日本| 色8久久精品久久久久久蜜| 一级中文字幕一区二区| 欧美中文字幕亚洲一区二区va在线| 亚洲精品国产一区二区三区四区在线| av网站一区二区三区| 亚洲靠逼com| 欧美日韩国产中文| 免费在线观看一区二区三区| 日韩欧美精品三级| 国产在线精品一区二区夜色 | xf在线a精品一区二区视频网站| 久久精品国产亚洲5555| 久久综合一区二区| 波多野结衣中文一区| 亚洲素人一区二区| 欧美喷水一区二区| 久久国产麻豆精品| 国产欧美日本一区视频| 91免费国产视频网站| 亚洲第一主播视频| 日韩视频一区二区三区在线播放 | 色视频一区二区| 日韩av电影天堂| 国产日韩欧美亚洲| 色综合久久中文字幕| 天堂蜜桃一区二区三区| 久久日韩精品一区二区五区| 不卡的av电影| 石原莉奈在线亚洲三区| 国产婷婷一区二区| 欧美视频精品在线| 久久99这里只有精品| 国产精品久线在线观看| 91精品国产一区二区三区香蕉|