亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2511.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
CertRequest ::= SEQUENCE {    certReqId     INTEGER,          -- ID for matching request and reply    certTemplate  CertTemplate,  -- Selected fields of cert to be issued    controls      Controls OPTIONAL }   -- Attributes affecting issuanceCertTemplate ::= SEQUENCE {    version      [0] Version               OPTIONAL,    serialNumber [1] INTEGER               OPTIONAL,    signingAlg   [2] AlgorithmIdentifier   OPTIONAL,    issuer       [3] Name                  OPTIONAL,    validity     [4] OptionalValidity      OPTIONAL,    subject      [5] Name                  OPTIONAL,    publicKey    [6] SubjectPublicKeyInfo  OPTIONAL,    issuerUID    [7] UniqueIdentifier      OPTIONAL,    subjectUID   [8] UniqueIdentifier      OPTIONAL,    extensions   [9] Extensions            OPTIONAL }  OptionalValidity ::= SEQUENCE {      notBefore  [0] Time OPTIONAL,      notAfter   [1] Time OPTIONAL } --at least one must be present  Time ::= CHOICE {      utcTime        UTCTime,      generalTime    GeneralizedTime }6. Controls Syntax   The generator of a CertRequest may include one or more control values   pertaining to the processing of the request.   Controls  ::= SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue   The following controls are defined (it is recognized that this list   may expand over time):  regToken; authenticator; pkiPublicationInfo;   pkiArchiveOptions; oldCertID; protocolEncrKey.Myers, et. al.              Standards Track                     [Page 7]RFC 2511                  Internet X.509 CRMF                 March 19996.1 Registration Token Control   A regToken control contains one-time information (either based on a   secret value or on knowledge) intended to be used by the CA to verify   the identity of the subject prior to issuing a certificate.  Upon   receipt of a certification request containing a value for regToken,   the receiving CA verifies the information in order to confirm the   identity claimed in the certification request.   The value for regToken may be generated by the CA and provided out of   band to the subscriber, or may otherwise be available to both the CA   and the subscriber.  The security of any out-of-band exchange should   be commensurate with the risk of the CA accepting an intercepted   value from someone other than the intended subscriber.   The regToken control would typically be used only for initialization   of an end entity into the PKI, whereas the authenticator control (see   Section 7.2) would typically be used for initial as well as   subsequent certification requests.   In some instances of use the value for regToken could be a text   string or a numeric quantity such as a random number.  The value in   the latter case could be encoded either as a binary quantity or as a   text string representation of the binary quantity.  To ensure a   uniform encoding of values regardless of the nature of the quantity,   the encoding of regToken SHALL be UTF8.6.2 Authenticator Control.   An authenticator control contains information used in an ongoing   basis to establish a non-cryptographic check of identity in   communication with the CA.  Examples include:  mother's maiden name,   last four digits of social security number, or other knowledge-based   information shared with the subscriber's CA; a hash of such   information; or other information produced for this purpose.  The   value for an authenticator control may be generated by the subscriber   or by the CA.   In some instances of use the value for regToken could be a text   string or a numeric quantity such as a random number.  The value in   the latter case could be encoded either as a binary quantity or as a   text string representation of the binary quantity.  To ensure a   uniform encoding of values regardless of the nature of the quantity,   the encoding of authenticator SHALL be UTF8.Myers, et. al.              Standards Track                     [Page 8]RFC 2511                  Internet X.509 CRMF                 March 19996.3 Publication Information Control   The pkiPublicationInfo control enables subscribers to control the   CA's publication of the certificate.  It is defined by the following   syntax:   PKIPublicationInfo ::= SEQUENCE {        action     INTEGER {                     dontPublish (0),                     pleasePublish (1) },        pubInfos  SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }          -- pubInfos MUST NOT be present if action is "dontPublish"          -- (if action is "pleasePublish" and pubInfos is omitted,          -- "dontCare" is assumed)   SinglePubInfo ::= SEQUENCE {         pubMethod    INTEGER {             dontCare    (0),             x500        (1),             web         (2),             ldap        (3) },         pubLocation  GeneralName OPTIONAL }   If the dontPublish option is chosen, the requester indicates that the   PKI should not publish the certificate (this may indicate that the   requester intends to publish the certificate him/herself).   If the dontCare method is chosen, or if the PKIPublicationInfo   control is omitted from the request, the requester indicates that the   PKI MAY publish the certificate using whatever means it chooses.   If the requester wishes the certificate to appear in at least some   locations but wishes to enable the CA to make the certificate   available in other repositories, set two values of SinglePubInfo for   pubInfos: one with x500, web or ldap value and one with dontCare.   The pubLocation field, if supplied, indicates where the requester   would like the certificate to be found (note that the CHOICE within   GeneralName includes a URL and an IP address, for example).6.4  Archive Options Control   The pkiArchiveOptions control enables subscribers to supply   information needed to establish an archive of the private key   corresponding to the public key of the certification request.  It is   defined by the following syntax:Myers, et. al.              Standards Track                     [Page 9]RFC 2511                  Internet X.509 CRMF                 March 1999PKIArchiveOptions ::= CHOICE {      encryptedPrivKey     [0] EncryptedKey,      -- the actual value of the private key      keyGenParameters     [1] KeyGenParameters,      -- parameters which allow the private key to be re-generated      archiveRemGenPrivKey [2] BOOLEAN }      -- set to TRUE if sender wishes receiver to archive the private      -- key of a key pair which the receiver generates in response to      -- this request; set to FALSE if no archival is desired.EncryptedKey ::= CHOICE {      encryptedValue        EncryptedValue,      envelopedData     [0] EnvelopedData }      -- The encrypted private key MUST be placed in the envelopedData      -- encryptedContentInfo encryptedContent OCTET STRING.EncryptedValue ::= SEQUENCE {      intendedAlg   [0] AlgorithmIdentifier  OPTIONAL,      -- the intended algorithm for which the value will be used      symmAlg       [1] AlgorithmIdentifier  OPTIONAL,      -- the symmetric algorithm used to encrypt the value      encSymmKey    [2] BIT STRING           OPTIONAL,      -- the (encrypted) symmetric key used to encrypt the value      keyAlg        [3] AlgorithmIdentifier  OPTIONAL,      -- algorithm used to encrypt the symmetric key      valueHint     [4] OCTET STRING         OPTIONAL,      -- a brief description or identifier of the encValue content      -- (may be meaningful only to the sending entity, and used only      -- if EncryptedValue might be re-examined by the sending entity      -- in the future)        encValue       BIT STRING }KeyGenParameters ::= OCTET STRING   An alternative to sending the key is to send the information about   how to re-generate the key using the KeyGenParameters choice (e.g.,   for many RSA implementations one could send the first random numbers   tested for primality). The actual syntax for this parameter may be   defined in a subsequent version of this document or in another   standard.Myers, et. al.              Standards Track                    [Page 10]RFC 2511                  Internet X.509 CRMF                 March 19996.5  OldCert ID Control   If present, the OldCertID control specifies the certificate to be   updated by the current certification request.  The syntax of its   value is:   CertId ::= SEQUENCE {         issuer           GeneralName,         serialNumber     INTEGER     }6.6  Protocol Encryption Key Control   If present, the protocolEncrKey control specifies a key the CA is to   use in encrypting a response to CertReqMessages.   This control can be used when a CA has information to send to the   subscriber that needs to be encrypted.  Such information includes a   private key generated by the CA for use by the subscriber.   The encoding of protocolEncrKey SHALL be SubjectPublicKeyInfo.7.  Object Identifiers   The OID id-pkix has the value   id-pkix  OBJECT IDENTIFIER  ::= { iso(1) identified-organization(3)   dod(6) internet(1) security(5) mechanisms(5) pkix(7) }   -- arc for Internet X.509 PKI protocols and their components   id-pkip  OBJECT IDENTIFIER :: { id-pkix pkip(5) }   -- Registration Controls in CRMF   id-regCtrl  OBJECT IDENTIFIER ::= { id-pkip regCtrl(1) }   id-regCtrl-regToken            OBJECT IDENTIFIER ::= { id-regCtrl 1 }   id-regCtrl-authenticator       OBJECT IDENTIFIER ::= { id-regCtrl 2 }   id-regCtrl-pkiPublicationInfo  OBJECT IDENTIFIER ::= { id-regCtrl 3 }   id-regCtrl-pkiArchiveOptions   OBJECT IDENTIFIER ::= { id-regCtrl 4 }   id-regCtrl-oldCertID           OBJECT IDENTIFIER ::= { id-regCtrl 5 }   id-regCtrl-protocolEncrKey     OBJECT IDENTIFIER ::= { id-regCtrl 6 }   -- Registration Info in CRMF   id-regInfo       OBJECT IDENTIFIER ::= { id-pkip id-regInfo(2) }   id-regInfo-asciiPairs    OBJECT IDENTIFIER ::= { id-regInfo 1 }   --with syntax OCTET STRING   id-regInfo-certReq       OBJECT IDENTIFIER ::= { id-regInfo 2 }   --with syntax CertRequestMyers, et. al.              Standards Track                    [Page 11]RFC 2511                  Internet X.509 CRMF                 March 19998.  Security Considerations   The security of CRMF delivery is reliant upon the security mechanisms   of the protocol or process used to communicate with CAs.  Such   protocol or process needs to ensure the integrity, data origin   authenticity, and privacy of the message.  Encryption of a CRMF is   strongly recommended if it contains subscriber-sensitive information   and if the CA has an encryption certificate that is known to the end   entity.9. References   [HMAC] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC:  Keyed-          Hashing for Message Authentication", RFC 2104, February 1997.10. Acknowledgments   The authors gratefully acknowledge the contributions of Barbara Fox,   Warwick Ford, Russ Housley and John Pawling, whose review and   comments significantly clarified and improved the utility of this   specification.Myers, et. al.              Standards Track                    [Page 12]RFC 2511                  Internet X.509 CRMF                 March 199911. Authors' Addresses   Michael Myers   VeriSign, Inc.   1390 Shorebird Way   Mountain View, CA  94019   EMail: mmyers@verisign.com   Carlisle Adams   Entrust Technologies   750 Heron Road, Suite E08   Ottawa, Canada, K1V 1A7   EMail: cadams@entrust.com   Dave Solo   Citicorp   666 Fifth Ave, 3rd Floor   New York, Ny 10103   EMail: david.solo@citicorp.com

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品视频自拍| 亚洲成人免费在线观看| 一区二区三区精密机械公司| 捆绑调教一区二区三区| 色综合久久久久综合体桃花网| 日韩一级黄色片| 一区二区在线观看免费| 国产成人午夜视频| 在线综合视频播放| 亚洲国产成人精品视频| 99精品一区二区三区| 国产欧美精品一区aⅴ影院| 日本欧美久久久久免费播放网| 91色婷婷久久久久合中文| 国产亚洲一区二区三区四区| 免费的成人av| 在线电影国产精品| 亚洲国产乱码最新视频| 91亚洲男人天堂| 国产精品福利一区| 懂色一区二区三区免费观看| 久久久精品人体av艺术| 久久99久久精品| 日韩免费视频一区| 捆绑变态av一区二区三区| 欧美一级片免费看| 日本强好片久久久久久aaa| 777精品伊人久久久久大香线蕉| 亚洲成人精品一区二区| 欧美日韩午夜在线视频| 午夜av区久久| 91精品国产一区二区| 日本亚洲天堂网| 欧美电影免费观看高清完整版在线| 免费日韩伦理电影| 欧美mv和日韩mv的网站| 国精品**一区二区三区在线蜜桃 | 久色婷婷小香蕉久久| 91精品在线免费观看| 奇米影视7777精品一区二区| 日韩欧美国产午夜精品| 精品一区二区三区日韩| 久久色在线观看| 高清beeg欧美| 亚洲精品国产a| 欧美日韩国产一区| 麻豆精品在线观看| 国产日韩综合av| 91美女在线视频| 天堂午夜影视日韩欧美一区二区| 91精品国产综合久久久久久| 国产在线精品视频| 国产精品免费aⅴ片在线观看| 91麻豆国产福利在线观看| 亚洲国产一区二区三区| 日韩欧美色电影| www.成人网.com| 天天色综合成人网| 久久久一区二区| 色婷婷久久综合| 免费日韩伦理电影| 一色桃子久久精品亚洲| 欧美午夜影院一区| 国产精品影音先锋| 亚洲国产中文字幕在线视频综合| 精品国产一区二区三区av性色| 成人午夜电影久久影院| 亚洲狠狠爱一区二区三区| 欧美精品一区二区久久久| 99久久99久久精品国产片果冻 | 亚洲色图视频网站| 欧美精品乱码久久久久久按摩 | 欧美在线一区二区三区| 国精产品一区一区三区mba视频 | 国产成人av影院| 亚洲午夜视频在线观看| 欧美极品美女视频| 欧美一区二区私人影院日本| 99re成人精品视频| 精品一区免费av| 亚洲成人午夜影院| 亚洲欧美影音先锋| 2020国产精品久久精品美国| 欧美日韩久久久| 北条麻妃国产九九精品视频| 国产一区中文字幕| 视频一区视频二区中文| 亚洲色图视频免费播放| 国产日韩欧美a| 日韩欧美视频一区| 欧美日韩高清不卡| 91在线小视频| 国产99久久久国产精品潘金网站| 日韩电影在线观看电影| 一区二区免费在线播放| 国产精品麻豆一区二区| 久久久久久日产精品| 精品入口麻豆88视频| 91麻豆精品国产自产在线观看一区| 色综合av在线| 91亚洲国产成人精品一区二三| 国产精品一二三区| 精品一区二区三区在线观看 | 91论坛在线播放| 成人激情小说乱人伦| 国产一区二区三区不卡在线观看| 日韩在线一区二区三区| 亚洲第一电影网| 亚洲国产精品一区二区www在线| 国产精品国产精品国产专区不蜜| 国产三级精品视频| 日本一区二区免费在线| 欧美激情一区二区三区全黄| 国产无一区二区| 日本一区二区三区dvd视频在线| 久久久久久影视| 久久久电影一区二区三区| 久久久一区二区| 国产欧美日韩卡一| 国产精品狼人久久影院观看方式| 日本一区二区成人在线| 中文字幕一区视频| 亚洲卡通欧美制服中文| 一区二区三区视频在线看| 亚洲综合色视频| 五月天中文字幕一区二区| 免费日韩伦理电影| 国产一区二区三区黄视频 | 免费成人深夜小野草| 青青草伊人久久| 久久精品国产99国产精品| 国产曰批免费观看久久久| 高清不卡在线观看| 色婷婷精品久久二区二区蜜臂av| 91福利精品第一导航| 4438成人网| 久久久久国产精品免费免费搜索| 中文字幕乱码日本亚洲一区二区| 国产精品久久久久久亚洲毛片 | 91年精品国产| 在线播放亚洲一区| 欧美精品一区二区三区在线播放| 日本一区二区免费在线| 亚洲一级二级在线| 久久精品99国产精品日本| 懂色av一区二区在线播放| 91福利在线导航| 久久只精品国产| 亚洲黄色av一区| 玖玖九九国产精品| 色婷婷综合久久久久中文| 欧美成人a视频| 亚洲精品国产精品乱码不99| 免费av网站大全久久| 91香蕉国产在线观看软件| 91精品国产日韩91久久久久久| 国产精品全国免费观看高清| 五月激情丁香一区二区三区| 成人精品高清在线| 欧美一区永久视频免费观看| 国产精品久久久久久一区二区三区| 日韩极品在线观看| 波多野结衣亚洲一区| 91精品国产全国免费观看 | 极品销魂美女一区二区三区| 99re亚洲国产精品| 欧美mv日韩mv| 天天操天天色综合| 一本一本大道香蕉久在线精品| 欧美一级日韩免费不卡| 亚洲日本va午夜在线影院| 精品无人码麻豆乱码1区2区| 欧美四级电影网| 中文字幕一区二区三区在线不卡 | 紧缚捆绑精品一区二区| 欧美日韩一区在线| 亚洲欧美在线高清| 成人综合在线观看| 久久精品人人做人人爽人人| 日韩激情在线观看| 欧美日韩视频在线观看一区二区三区| 亚洲欧洲无码一区二区三区| 国产精品99久久久久久有的能看| 欧美一区二区三区四区视频| 伊人夜夜躁av伊人久久| 99国产精品久久久久久久久久| 欧美激情一区在线观看| 国内精品伊人久久久久av影院| 91麻豆精品国产91久久久使用方法 | 亚洲人成人一区二区在线观看| 国产另类ts人妖一区二区| 日韩西西人体444www| 日韩影院在线观看| 欧美老人xxxx18| 石原莉奈在线亚洲二区| 欧美日韩精品一区二区三区| 亚洲网友自拍偷拍| 欧美日韩视频在线第一区| 性欧美疯狂xxxxbbbb| 欧美日韩视频第一区|