亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rfc2511.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁(yè) / 共 4 頁(yè)
字號(hào):
Network Working Group                                           M. MyersRequest for Comments: 2511                                      VeriSignCategory: Standards Track                                       C. Adams                                                    Entrust Technologies                                                                 D. Solo                                                                Citicorp                                                                 D. Kemp                                                                     DoD                                                              March 1999           Internet X.509 Certificate Request Message FormatStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.1.  Abstract   This document describes the Certificate Request Message Format   (CRMF).  This syntax is used to convey a request for a certificate to   a Certification Authority (CA) (possibly via a Registration Authority   (RA)) for the purposes of X.509 certificate production.  The request   will typically include a public key and associated registration   information.   The key words "MUST", "REQUIRED", "SHOULD", "RECOMMENDED", and "MAY"   in this document (in uppercase, as shown) are to be interpreted as   described in RFC 2119.2.  Overview   Construction of a certification request involves the following steps:   a)  A CertRequest value is constructed.  This value may include the       public key, all or a portion of the end-entity's (EE's) name,       other requested certificate fields, and additional control       information related to the registration process.Myers, et. al.              Standards Track                     [Page 1]RFC 2511                  Internet X.509 CRMF                 March 1999   b)  A proof of possession (of the private key corresponding to the       public key for which a certificate is being requested) value may       be calculated across the CertRequest value.   c)  Additional registration information may be combined with the       proof of possession value and the CertRequest structure to form a       CertReqMessage.   d)  The CertReqMessage is securely communicated to a CA. Specific       means of secure transport are beyond the scope of this       specification.3. CertReqMessage Syntax   A certificate request message is composed of the certificate request,   an optional proof of possession field and an optional registration   information field.CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsgCertReqMsg ::= SEQUENCE {    certReq   CertRequest,    pop       ProofOfPossession  OPTIONAL,    -- content depends upon key type    regInfo   SEQUENCE SIZE(1..MAX) of AttributeTypeAndValue OPTIONAL }   The proof of possession field is used to demonstrate that the entity   to be associated with the certificate is actually in possession of   the corresponding private key.  This field may be calculated across   the contents of the certReq field and varies in structure and content   by public key algorithm type and operational mode.   The regInfo field SHOULD only contain supplementary information   related to the context of the certification request when such   information is required to fulfill a certification request.  This   information MAY include subscriber contact information, billing   information or other ancillary information useful to fulfillment of   the certification request.   Information directly related to certificate content SHOULD be   included in the certReq content.  However, inclusion of additional   certReq content by RAs may invalidate the pop field.  Data therefore   intended for certificate content MAY be provided in regInfo.   See Section 8 and Appendix B for example regInfo contents.Myers, et. al.              Standards Track                     [Page 2]RFC 2511                  Internet X.509 CRMF                 March 19994. Proof of Possession (POP)   In order to prevent certain attacks and to allow a CA/RA to properly   check the validity of the binding between an end entity and a key   pair, the PKI management operations specified here make it possible   for an end entity to prove that it has possession of (i.e., is able   to use) the private key corresponding to the public key for which a   certificate is requested.  A given CA/RA is free to choose how to   enforce POP (e.g., out-of-band procedural means versus the CRMF in-   band message) in its certification exchanges (i.e., this may be a   policy issue).  However, it is MANDATED that CAs/RAs MUST enforce POP   by some means because there are currently many non-PKIX operational   protocols in use (various electronic mail protocols are one example)   that do not explicitly check the binding between the end entity and   the private key.  Until operational protocols that do verify the   binding (for signature, encryption, and key agreement key pairs)   exist, and are ubiquitous, this binding can only be assumed to have   been verified by the CA/RA. Therefore, if the binding is not verified   by the CA/RA, certificates in the Internet Public-Key Infrastructure   end up being somewhat less meaningful.   POP is accomplished in different ways depending on the type of key   for which a certificate is requested. If a key can be used for   multiple purposes (e.g., an RSA key) then any of the methods MAY be   used.   This specification allows for cases where POP is validated by the CA,   the RA, or both.  Some policies may require the CA to verify POP   during certification, in which case the RA MUST forward the end   entity's CertRequest and ProofOfPossession fields unaltered to the   CA, and as an option MAY also verify POP.  If the CA is not required   by policy to verify POP, then the RA SHOULD forward the end entity's   request and proof unaltered to the CA as above.  If this is not   possible (for example because the RA verifies POP by an out-of-band   method), then the RA MAY attest to the CA that the required proof has   been validated. If the CA uses an out-of-band method to verify POP   (such as physical delivery of CA-generated private keys), then the   ProofOfPossession field is not used.4.1 Signature Keys   For signature keys, the end entity can sign a value to prove   possession of the private key.Myers, et. al.              Standards Track                     [Page 3]RFC 2511                  Internet X.509 CRMF                 March 19994.2 Key Encipherment Keys   For key encipherment keys, the end entity can provide the private key   to the CA/RA, or can be required to decrypt a value in order to prove   possession of the private key. Decrypting a value can be achieved   either directly or indirectly.   The direct method is for the RA/CA to issue a random challenge to   which an immediate response by the end entity is required.   The indirect method is to issue a certificate which is encrypted for   the end entity (and have the end entity demonstrate its ability to   decrypt this certificate in a confirmation message). This allows a CA   to issue a certificate in a form which can only be used by the   intended end entity.4.3 Key Agreement Keys   For key agreement keys, the end entity can use any of the three   methods given in Section 5.2 for encryption keys.  For the direct and   indirect methods, the end entity and the PKI management entity (i.e.,   CA or RA) must establish a shared secret key in order to prove that   the end entity has possession of the private key (i.e., in order to   decrypt the encrypted certificate or to construct the response to the   issued challenge).  Note that this need not impose any restrictions   on the keys that can be certified by a given CA -- in particular, for   Diffie-Hellman keys the end entity may freely choose its algorithm   parameters -- provided that the CA can generate a short-term (or   one-time) key pair with the appropriate parameters when necessary.   The end entity may also MAC the certificate request (using a shared   secret key derived from a Diffie-Hellman computation) as a fourth   alternative for demonstrating POP.  This option may be used only if   the CA already has a DH certificate that is known to the end entity   and if the EE is willing to use the CA's DH parameters.4.4 Proof of Possession Syntax   ProofOfPossession ::= CHOICE {       raVerified        [0] NULL,       -- used if the RA has already verified that the requester is in       -- possession of the private key       signature         [1] POPOSigningKey,       keyEncipherment   [2] POPOPrivKey,       keyAgreement      [3] POPOPrivKey }   POPOSigningKey ::= SEQUENCE {       poposkInput         [0] POPOSigningKeyInput OPTIONAL,Myers, et. al.              Standards Track                     [Page 4]RFC 2511                  Internet X.509 CRMF                 March 1999       algorithmIdentifier     AlgorithmIdentifier,       signature               BIT STRING }       -- The signature (using "algorithmIdentifier") is on the       -- DER-encoded value of poposkInput.  NOTE: If the CertReqMsg       -- certReq CertTemplate contains the subject and publicKey values,       -- then poposkInput MUST be omitted and the signature MUST be       -- computed on the DER-encoded value of CertReqMsg certReq.  If       -- the CertReqMsg certReq CertTemplate does not contain the public       -- key and subject values, then poposkInput MUST be present and       -- MUST be signed.  This strategy ensures that the public key is       -- not present in both the poposkInput and CertReqMsg certReq       -- CertTemplate fields.   POPOSigningKeyInput ::= SEQUENCE {       authInfo            CHOICE {           sender              [0] GeneralName,           -- used only if an authenticated identity has been           -- established for the sender (e.g., a DN from a           -- previously-issued and currently-valid certificate)           publicKeyMAC        PKMACValue },           -- used if no authenticated GeneralName currently exists for           -- the sender; publicKeyMAC contains a password-based MAC           -- on the DER-encoded value of publicKey       publicKey           SubjectPublicKeyInfo }  -- from CertTemplate   PKMACValue ::= SEQUENCE {      algId  AlgorithmIdentifier,      -- the algorithm value shall be PasswordBasedMac      --     {1 2 840 113533 7 66 13}      -- the parameter value is PBMParameter      value  BIT STRING }   POPOPrivKey ::= CHOICE {       thisMessage       [0] BIT STRING,       -- posession is proven in this message (which contains the private       -- key itself (encrypted for the CA))       subsequentMessage [1] SubsequentMessage,       -- possession will be proven in a subsequent message       dhMAC             [2] BIT STRING }       -- for keyAgreement (only), possession is proven in this message       -- (which contains a MAC (over the DER-encoded value of the       -- certReq parameter in CertReqMsg, which must include both subject       -- and publicKey) based on a key derived from the end entity's       -- private DH key and the CA's public DH key);       -- the dhMAC value MUST be calculated as per the directions given       -- in Appendix A.   SubsequentMessage ::= INTEGER {Myers, et. al.              Standards Track                     [Page 5]RFC 2511                  Internet X.509 CRMF                 March 1999       encrCert (0),       -- requests that resulting certificate be encrypted for the       -- end entity (following which, POP will be proven in a       -- confirmation message)       challengeResp (1) }       -- requests that CA/RA engage in challenge-response exchange with       -- end entity in order to prove private key possession   It is expected that protocols which incorporate this specification   will include the confirmation and challenge-response messages   necessary to a complete protocol.4.4.1  Use of Password-Based MAC   The following algorithm SHALL be used when publicKeyMAC is used in   POPOSigningKeyInput to prove the authenticity of a request.   PBMParameter ::= SEQUENCE {         salt                OCTET STRING,         owf                 AlgorithmIdentifier,         -- AlgId for a One-Way Function (SHA-1 recommended)         iterationCount      INTEGER,         -- number of times the OWF is applied         mac                 AlgorithmIdentifier         -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],   }   -- or HMAC [RFC2104, RFC2202])   The process of using PBMParameter to compute publicKeyMAC and so   authenticate the origin of a public key certification request   consists of two stages. The first stage uses shared secret   information to produce a MAC key. The second stage MACs the public   key in question using this MAC key to produce an authenticated value.   Initialization of the first stage of algorithm assumes the existence   of a shared secret distributed in a trusted fashion between CA/RA and   end-entity.  The salt value is appended to the shared secret and the   one way function (owf) is applied iterationCount times, where the   salted secret is the input to the first iteration and, for each   successive iteration, the input is set to be the output of the   previous iteration, yielding a key K.   In the second stage, K and the public key are inputs to HMAC as   documented in [HMAC] to produce a value for publicKeyMAC as follows:   publicKeyMAC = Hash( K XOR opad, Hash( K XOR ipad, public key) )   where ipad and opad are defined in [RFC2104].Myers, et. al.              Standards Track                     [Page 6]RFC 2511                  Internet X.509 CRMF                 March 1999   The AlgorithmIdentifier for owf SHALL be SHA-1 {1 3 14 3 2 26} and   for mac SHALL be HMAC-SHA1 {1 3 6 1 5 5 8 1 2}.5.  CertRequest syntax   The CertRequest syntax consists of a request identifier, a template   of certificate content, and an optional sequence of control   information.

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久国产剧场电影| 91精品国产一区二区| 国产盗摄视频一区二区三区| 蜜臀a∨国产成人精品| 日韩和欧美一区二区| 性欧美大战久久久久久久久| 午夜欧美大尺度福利影院在线看| 亚洲高清在线视频| 无码av免费一区二区三区试看| 亚洲成人tv网| 秋霞电影网一区二区| 免费xxxx性欧美18vr| 精品中文字幕一区二区| 精品一区二区国语对白| 国产麻豆精品一区二区| 成人在线视频一区| 成人精品国产一区二区4080| 99久久精品国产导航| 91美女福利视频| 欧美日韩精品一区二区在线播放| 8v天堂国产在线一区二区| 日韩视频在线永久播放| 欧美v国产在线一区二区三区| 国产欧美日韩在线视频| √…a在线天堂一区| 亚洲一区二区欧美日韩| 美女www一区二区| 国产成人精品三级| 色哟哟在线观看一区二区三区| 欧美在线一二三四区| 日韩欧美综合在线| 国产精品丝袜91| 亚洲国产一区视频| 国内精品自线一区二区三区视频| 成人午夜电影网站| 欧美性猛片xxxx免费看久爱| 日韩欧美久久久| 国产精品久久久久三级| 亚洲电影你懂得| 国产成人精品免费在线| 欧美日韩精品欧美日韩精品| 久久久久久9999| 亚洲一区在线看| 国产乱码精品一区二区三区av| 91成人免费在线| 久久一二三国产| 一区二区三区中文字幕| 精品一区二区三区香蕉蜜桃| 色综合久久综合网97色综合| 日韩一级片在线播放| 亚洲精品日韩综合观看成人91| 免费成人在线网站| 色综合久久久久网| 精品久久一二三区| 亚洲国产精品综合小说图片区| 国产一区二区三区四区五区入口| 在线观看国产日韩| 欧美激情一区二区三区全黄| 日韩av一级片| 日本黄色一区二区| 国产欧美日本一区二区三区| 日韩精品成人一区二区三区| 成人av在线影院| 欧美电视剧在线观看完整版| 亚洲制服丝袜在线| 成人中文字幕在线| 亚洲精品在线观看视频| 天天影视涩香欲综合网| 色狠狠av一区二区三区| 久久久久免费观看| 免费不卡在线视频| 欧美日韩免费一区二区三区视频| 国产精品久久久久一区| 国产一区二区91| 91精品国产91久久综合桃花| 亚洲综合一区在线| av一区二区三区在线| 久久久夜色精品亚洲| 久久精品国产第一区二区三区| 欧美午夜电影一区| 亚洲欧美激情视频在线观看一区二区三区 | 国产中文字幕一区| 欧美剧情电影在线观看完整版免费励志电影| 国产精品无码永久免费888| 老司机免费视频一区二区三区| 欧美美女黄视频| 亚洲综合男人的天堂| 99久久精品国产一区二区三区| 欧美激情一二三区| 国产精品一区二区在线观看网站| 日韩限制级电影在线观看| 日本色综合中文字幕| 欧美日韩国产综合久久| 亚洲成a人v欧美综合天堂| 91国产视频在线观看| 亚洲日本一区二区三区| 成人av资源网站| 综合久久综合久久| 99精品偷自拍| 一区二区三区欧美| 在线国产电影不卡| 一区二区日韩av| 欧美性大战久久久| 午夜精品成人在线视频| 欧美精品在欧美一区二区少妇| 日精品一区二区| 欧美一区二区免费视频| 久久精品国产免费| 欧美精品一区二| 国产精品资源站在线| 国产精品三级电影| 91一区二区在线观看| 亚洲精品国产成人久久av盗摄| 色婷婷香蕉在线一区二区| 亚洲一区二区不卡免费| 欧美日韩国产精品自在自线| 日本欧美一区二区| 精品不卡在线视频| 粉嫩嫩av羞羞动漫久久久| 亚洲视频一区二区在线| 欧美日韩不卡一区二区| 蜜臀av一区二区在线观看 | 激情久久久久久久久久久久久久久久| 欧美一级高清片在线观看| 国产在线播精品第三| 国产日韩av一区| 91网站最新地址| 午夜国产精品影院在线观看| 欧美大片在线观看一区二区| 国产传媒一区在线| 亚洲欧美区自拍先锋| 777xxx欧美| 国产一区二区三区四区五区入口| 国产精品久久久久aaaa樱花 | 中文字幕一区二区三区不卡在线 | 欧美日韩免费视频| 精品一区二区三区免费毛片爱| 国产清纯美女被跳蛋高潮一区二区久久w| caoporen国产精品视频| 亚洲高清免费在线| 久久久精品天堂| 91成人国产精品| 国精产品一区一区三区mba视频| 亚洲三级小视频| 欧美一区二区精美| av在线不卡网| 天天综合色天天综合| 中文一区二区在线观看| 欧美日韩一区二区在线视频| 国产一区二区三区最好精华液| 亚洲色图欧洲色图| 日韩欧美国产电影| 91毛片在线观看| 精品一区二区av| 一区二区三区欧美| 国产日产欧美一区二区视频| 欧美日韩mp4| 成人h动漫精品一区二区| 日韩电影免费在线观看网站| 国产精品成人午夜| 日韩视频在线你懂得| 色综合天天综合| 国产在线精品一区二区不卡了| 一区二区成人在线| 久久久激情视频| 欧美日韩激情一区二区三区| 不卡的av中国片| 另类人妖一区二区av| 亚洲一区二区成人在线观看| 欧美国产精品v| 日韩一区二区三区高清免费看看| 97超碰欧美中文字幕| 国内精品久久久久影院色| 亚洲第四色夜色| 亚洲嫩草精品久久| 亚洲国产精品二十页| 精品少妇一区二区| 欧美精品国产精品| 一本大道久久a久久精品综合| 风流少妇一区二区| 国产一区二区三区在线看麻豆| 青青草国产精品亚洲专区无| 一区二区不卡在线视频 午夜欧美不卡在| 久久久久久亚洲综合| 日韩欧美一级精品久久| 欧美裸体一区二区三区| 欧美午夜在线观看| 色呦呦日韩精品| 色综合视频一区二区三区高清| 国产成人欧美日韩在线电影| 久久99国内精品| 蜜臀久久久99精品久久久久久| 性做久久久久久久免费看| 一二三区精品视频| 亚洲精品videosex极品| 1000部国产精品成人观看| 亚洲欧美综合色| 亚洲欧洲一区二区在线播放| 欧美国产乱子伦 | 成人综合在线网站|