亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rsa-pkalgs-00.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
         implementations MAY support other one-way hash functions listed         in section 2.1.  The MGF1 algorithm identifier is comprised of         the id-mgf1 object identifier and a parameter that contains the         algorithm identifier of the one-way hash function employed with         MGF1.  The SHA-1 algorithm identifier is comprised of the id-         sha1 object identifier and a parameter of NULL.         Implementations that perform encryption MUST omit the         maskGenFunc field when MGF1 with SHA-1 is used, indicating that         the default algorithm was used.  Implementations that perform         decryption MUST recognize both the id-mgf1 and id-sha1 object         identifiers as well as an absent maskGenFunc field as an         indication that MGF1 with SHA-1 was used.      pSourceFunc         The pSourceFunc field identifies the source (and possibly the         value) of the encoding parameters, commonly called P.         Implementations MUST represent P by an algorithm identifier,         id-pSpecified, indicating that P is explicitly provided as an         OCTET STRING in the parameters.  The default value for P is an         empty string.  In this case, pHash in EME-OAEP contains the         hash of a zero length string.  Implementations MUST support a         zero length P value.  Implementations that perform encryption         MUST omit the pSourceFunc field when a zero length P value is         used, indicating that the default value was used.         Implementations that perform decryption MUST recognize both the         id-pSpecified object identifier and an absent pSourceFunc field         as an indication that a zero length P value was used.         Implementations that perform decryption MUST support a zero         length P value, and they MAY support other values.   If the default values of the hashFunc, maskGenFunc, and pSourceFunc   fields of RSAES-OAEP-params are used, then the algorithm identifier   will have the following value:      rSAES-OAEP-Default-Identifier  AlgorithmIdentifier  ::=                            { id-RSAES-OAEP,                               { sha1Identifier,                                 mgf1SHA1Identifier,                                 pSpecifiedEmptyIdentifier  }  }5  PKCS #1 Version 1.5 Signature Algorithm   RFC 2313 [P1v1.5] specifies the PKCS #1 Version 1.5 signature   algorithm.  This specification is also included in PKCS #1 Version   2.1 [P1v2.1].  RFC 3279 [PKALGS] specifies the use of the PKCS #1   Version 1.5 signature algorithm with the MD2, MD5, and the SHA-1 one-Housley & Kaliski                                              [Page 12]INTERNET DRAFT                                             December 2002   way hash functions.  This section specifies the algorithm identifiers   for using the SHA-256, SHA-384, and SHA-512 one-way hash functions   with the PKCS #1 version 1.5 signature algorithm.   The RSASSA-PSS signature algorithm is preferred over the PKCS #1   Version 1.5 signature algorithm.  Although no attacks are known   against PKCS #1 Version 1.5 signature algorithm, in the interest of   increased robustness, RSASSA-PSS signature algorithm is recommended   for eventual adoption, especially by new applications.  This section   is included for compatibility with existing applications, and while   still appropriate for new applications, a gradual transition to the   RSASSA-PSS signature algorithm is encouraged.   The PKCS #1 Version 1.5 signature algorithm with these one-way hash   functions and the RSA encryption algorithm is implemented using the   padding and encoding conventions described in RFC 2313 [P1v1.5].  The   message digest is computed using the SHA-256, SHA-384, or SHA-512   one-way hash function.   The PKCS #1 version 1.5 signature algorithm, as specified in RFC 2313   includes a data encoding step.  In this step, the message digest and   the object identifier for the one-way hash function used to compute   the message digest are combined.  When performing the data encoding   step, the id-sha256, id-sha384, and id-sha512 object identifiers (see   section 2.1) MUST be used to specify the SHA-256, SHA-384, and   SHA-512 one-way hash functions, respectively.   The object identifier used to identify the PKCS #1 version 1.5   signature algorithm with SHA-256 is:      sha256WithRSAEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 11 }   The object identifier used to identify the PKCS #1 version 1.5   signature algorithm with SHA-384 is:      sha384WithRSAEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 12 }   The object identifier used to identify the PKCS #1 version 1.5   signature algorithm with SHA-512 is:      sha512WithRSAEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 13 }   When any of these three object identifiers appears within an   AlgorithmIdentifier, the parameters MUST be NULL.   The RSA signature generation process and the encoding of the result   is described in detail in RFC 2313 [P1v1.5].Housley & Kaliski                                              [Page 13]INTERNET DRAFT                                             December 20026  ASN.1 Module   PKIX1-PSS-OAEP-Algorithms     { iso(1) identified-organization(3) dod(6)       internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)       id-mod-pkix1-rsa-pkalgs(TBD) }   DEFINITIONS EXPLICIT TAGS ::= BEGIN   -- EXPORTS All;   IMPORTS      AlgorithmIdentifier          FROM PKIX1Explicit88 -- RFC 3280          { iso(1) identified-organization(3) dod(6) internet(1)            security(5) mechanisms(5) pkix(7) id-mod(0)            id-pkix1-explicit(18) };   -- ============================   --   Basic object identifiers   -- ============================   pkcs-1  OBJECT IDENTIFIER  ::=  { iso(1) member-body(2)                           us(840) rsadsi(113549) pkcs(1) 1 }   -- When rsaEncryption is used in an AlgorithmIdentifier the   -- parameters MUST be present and MUST be NULL.   rsaEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 1 }   -- When id-RSAES-OAEP is used in an AlgorithmIdentifier the   -- parameters MUST be present and MUST be RSAES-OAEP-params.   id-RSAES-OAEP  OBJECT IDENTIFIER  ::=  { pkcs-1 7 }   -- When id-pSpecified is used in an AlgorithmIdentifier the   -- parameters MUST be an OCTET STRING.   id-pSpecified  OBJECT IDENTIFIER  ::=  { pkcs-1 9 }Housley & Kaliski                                              [Page 14]INTERNET DRAFT                                             December 2002   -- When id-RSASSA-PSS is used in an AlgorithmIdentifier the   -- parameters MUST be present and MUST be RSASSA-PSS-params.   id-RSASSA-PSS  OBJECT IDENTIFIER  ::=  { pkcs-1 10 }   -- When id-mgf1 is used in an AlgorithmIdentifier the parameters   -- MUST be present and MUST be a HashAlgorithm.   id-mgf1  OBJECT IDENTIFIER  ::=  { pkcs-1 8 }   -- When the following OIDs are used in an AlgorithmIdentifier the   -- parameters MUST be present and MUST be NULL.   sha256WithRSAEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 11 }   sha384WithRSAEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 12 }   sha512WithRSAEncryption  OBJECT IDENTIFIER  ::=  { pkcs-1 13 }   -- When the following OIDs are used in an AlgorithmIdentifier the   -- parameters SHOULD be absent, but if the parameters are present,   -- they MUST be NULL.   id-sha1  OBJECT IDENTIFIER  ::=  { iso(1)                        identified-organization(3) oiw(14)                        secsig(3) algorithms(2) 26 }   id-sha256  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                        country(16) us(840) organization(1) gov(101)                        csor(3) nistalgorithm(4) hashalgs(2) 1 }   id-sha384  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                        country(16) us(840) organization(1) gov(101)                        csor(3) nistalgorithm(4) hashalgs(2) 2 }   id-sha512  OBJECT IDENTIFIER  ::=  { joint-iso-itu-t(2)                        country(16) us(840) organization(1) gov(101)                        csor(3) nistalgorithm(4) hashalgs(2) 3 }Housley & Kaliski                                              [Page 15]INTERNET DRAFT                                             December 2002   -- =============   --   Constant   -- =============   nullOctetString  OCTET STRING (SIZE (0))  ::=  { ''H }   -- =========================   --   Algorithm Identifiers   -- =========================   sha1Identifier  AlgorithmIdentifier  ::=  { id-sha1, NULL }   sha256Identifier  AlgorithmIdentifier  ::=  { id-sha256, NULL }   sha384Identifier  AlgorithmIdentifier  ::=  { id-sha384, NULL }   sha512Identifier  AlgorithmIdentifier  ::=  { id-sha512, NULL }   mgf1SHA1Identifier  AlgorithmIdentifier  ::=                        { id-mgf1, sha1Identifier }   mgf1SHA256Identifier  AlgorithmIdentifier  ::=                        { id-mgf1, sha256Identifier }   mgf1SHA384Identifier  AlgorithmIdentifier  ::=                        { id-mgf1, sha384Identifier }   mgf1SHA512Identifier  AlgorithmIdentifier  ::=                        { id-mgf1, sha512Identifier }   pSpecifiedEmptyIdentifier  AlgorithmIdentifier  ::=                        { id-pSpecified, nullOctetString }   rSASSA-PSS-Default-Identifier  AlgorithmIdentifier  ::=  {                        { id-RSASSA-PSS,                           { sha1Identifier,                             mgf1SHA1Identifier,                             20,                             1  }  }   rSASSA-PSS-SHA256-Identifier  AlgorithmIdentifier  ::=  {                        { id-RSASSA-PSS,                           { sha256Identifier,                             mgf1SHA256Identifier,                             20,                             1  }  }Housley & Kaliski                                              [Page 16]INTERNET DRAFT                                             December 2002   rSASSA-PSS-SHA384-Identifier  AlgorithmIdentifier  ::=  {                        { id-RSASSA-PSS,                           { sha384Identifier,                             mgf1SHA384Identifier,                             20,                             1  }  }   rSASSA-PSS-SHA512-Identifier  AlgorithmIdentifier  ::=  {                        { id-RSASSA-PSS,                           { sha512Identifier,                             mgf1SHA512Identifier,                             20,                             1  }  }   rSAES-OAEP-Default-Identifier  AlgorithmIdentifier  ::=                        { id-RSAES-OAEP,                           { sha1Identifier,                             mgf1SHA1Identifier,                             pSpecifiedEmptyIdentifier  }  }   rSAES-OAEP-SHA256-Identifier  AlgorithmIdentifier  ::=                        { id-RSAES-OAEP,                           { sha256Identifier,                             mgf1SHA256Identifier,                             pSpecifiedEmptyIdentifier  }  }   rSAES-OAEP-SHA384-Identifier  AlgorithmIdentifier  ::=

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
2023国产一二三区日本精品2022| 日韩美女啊v在线免费观看| 精品美女一区二区| 久久久国际精品| 亚洲精品视频在线观看免费| 日韩和欧美一区二区| 激情文学综合丁香| 欧美午夜影院一区| 94-欧美-setu| 日韩一区二区三区电影| 精品乱码亚洲一区二区不卡| 国产女人aaa级久久久级| 91在线观看下载| 欧美无人高清视频在线观看| 国产精品入口麻豆原神| 久久精品国产亚洲一区二区三区| 色婷婷综合久久久| 国产精品萝li| 国产成人精品午夜视频免费| 欧美一区二区三区在线电影| 亚洲电影一区二区| 91在线无精精品入口| 中文在线一区二区| 国产盗摄女厕一区二区三区| 精品va天堂亚洲国产| 看电影不卡的网站| 日韩一级片在线播放| 日本伊人午夜精品| 欧美日韩成人综合| 天堂一区二区在线| 欧美日韩精品一二三区| 亚洲高清免费一级二级三级| 91官网在线免费观看| 一区二区免费在线| 91福利视频在线| 亚洲一二三区视频在线观看| 日本高清不卡aⅴ免费网站| 一区二区三区免费| 在线观看www91| 亚洲成人免费av| 欧美日韩国产色站一区二区三区| 亚洲国产综合色| 欧美福利一区二区| 青青青伊人色综合久久| 日韩精品中文字幕一区二区三区 | 欧美高清dvd| 日韩精品一区第一页| 欧美一区二区在线播放| 激情伊人五月天久久综合| 亚洲精品在线观| 成人一级黄色片| 一区二区三区久久| 欧美日韩成人高清| 国产一区二区导航在线播放| 国产精品午夜免费| 色婷婷综合视频在线观看| 午夜影院在线观看欧美| 日韩一级视频免费观看在线| 国产一区二区三区黄视频 | 激情综合色播激情啊| 欧美精品一区二| av亚洲精华国产精华精| 亚洲国产精品一区二区久久| 欧美成人精品高清在线播放| av在线不卡网| 日韩和欧美的一区| 国产精品乱码久久久久久| 欧美午夜免费电影| 国产麻豆午夜三级精品| 亚洲免费观看高清完整| 欧美一区二区观看视频| 不卡的av在线播放| 免费xxxx性欧美18vr| 国产精品日韩精品欧美在线| 欧美日本精品一区二区三区| 国产成人精品影院| 亚洲成人精品在线观看| 欧美韩国日本综合| 日韩一区二区三区电影| 在线免费av一区| 国产一区二区三区最好精华液| 亚洲精品高清在线观看| 2020日本不卡一区二区视频| 色香蕉成人二区免费| 国产福利一区二区| 蜜桃av噜噜一区二区三区小说| 亚洲欧洲99久久| 日韩欧美色综合网站| 91蜜桃婷婷狠狠久久综合9色| 久久99国产精品久久99| 亚洲综合色成人| 中文字幕av一区二区三区高 | 99久久久无码国产精品| 美腿丝袜一区二区三区| 亚洲一区二区三区爽爽爽爽爽| 欧美极品另类videosde| 精品久久久久久久久久久久久久久久久| 91日韩在线专区| 懂色一区二区三区免费观看| 美女视频黄免费的久久 | 亚洲成人动漫精品| 亚洲久草在线视频| 中文字幕av一区二区三区高| 久久影院午夜论| 日韩精品一区在线观看| 日韩丝袜情趣美女图片| 在线播放中文一区| 欧美日韩和欧美的一区二区| 91成人看片片| 欧美在线视频不卡| 91久久精品一区二区三区| 91污在线观看| 99久久伊人久久99| 成人免费va视频| av一区二区三区四区| 成人av资源下载| 不卡的av电影| 91一区二区三区在线观看| 成人黄色在线视频| 高清国产一区二区| 国产精品18久久久久久久网站| 国产精品18久久久久久久久| 精品亚洲成a人在线观看| 精品一区二区三区蜜桃| 国产又黄又大久久| 成人夜色视频网站在线观看| kk眼镜猥琐国模调教系列一区二区 | 精品日本一线二线三线不卡| 欧美va在线播放| 久久久久国产一区二区三区四区| 国产日韩欧美制服另类| 国产精品精品国产色婷婷| 中文字幕一区二区三区av| 亚洲精品视频一区| 日本美女视频一区二区| 欧美aaaaaa午夜精品| 韩国毛片一区二区三区| 成人精品国产福利| 欧美熟乱第一页| 精品国产3级a| 国产精品欧美久久久久无广告| 亚洲欧洲在线观看av| 亚洲精品日日夜夜| 蜜臀久久99精品久久久久宅男| 国模娜娜一区二区三区| 99国产精品久久久久久久久久| 欧美日韩国产a| 久久品道一品道久久精品| 国产精品久久久久久久蜜臀 | 99re亚洲国产精品| 欧美日韩一区二区欧美激情| 欧美xxxx老人做受| 亚洲视频免费在线| 久久国产精品色婷婷| 91老司机福利 在线| 欧美哺乳videos| 亚洲欧美在线视频观看| 日本不卡的三区四区五区| 成人免费视频免费观看| 555www色欧美视频| 中文字幕亚洲区| 老色鬼精品视频在线观看播放| 99v久久综合狠狠综合久久| 日韩欧美一区二区免费| 日韩毛片精品高清免费| 韩国午夜理伦三级不卡影院| 一本在线高清不卡dvd| 日韩视频免费直播| 亚洲一线二线三线视频| 国产福利不卡视频| 欧美人狂配大交3d怪物一区| 国产精品视频免费| 精品一区二区三区在线播放| 在线精品视频一区二区| 欧美国产亚洲另类动漫| 青青草精品视频| 日本韩国视频一区二区| 中文在线一区二区| 激情文学综合网| 91精品国产综合久久福利| 国产精品免费aⅴ片在线观看| 捆绑紧缚一区二区三区视频| 欧美日韩激情一区二区三区| 亚洲视频免费观看| 粉嫩av一区二区三区粉嫩| 久久综合狠狠综合| 美女视频网站久久| 日韩色视频在线观看| 丝袜脚交一区二区| 欧美日韩综合不卡| 一区二区高清免费观看影视大全 | 中文字幕免费在线观看视频一区| 免费看日韩a级影片| 欧美日韩精品免费观看视频| 一二三区精品视频| 色国产综合视频| 亚洲精品国久久99热| 91亚洲精华国产精华精华液| 最新国产精品久久精品| 欧美日韩一区不卡|