亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3029.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
4. Functional Requirements for DVCS   The DVCS MUST   1. provide a signed response in the form of a data validation      certificate to the requester, as defined by policy, or an error      response.  The DVCS service definition and the policy define how      much information that has been used by the DVCS to generate the      response will be included in a data validation certificate, e.g.,      public key certificates, CRLs, and responses from other OCSP      servers, DVCS, or others.   2. indicate in the data validation certificate whether or not the      signed document, the public key certificate(s), or the data were      validated, and, if not, the reason why the verification failed.   3. include a strictly monotonically increasing serial number in each      data validation certificate.   4. include a time of day value or a time stamp token into each data      validation certificate.   5. sign each data certification token using a key that has been      certified with a dvcs signing extended key purpose, and include a      reference to this certificate as a signed attribute in the      signature.   6. check the validity of its own signing key and certificate before      delivering data validation certificates and MUST not deliver data      validation certificate in case of failure.   A DVCS SHOULD include within each data validation certificate a   policy identifier to determine the trust and validation policy used   for DVC's signature.5. Data Certification Server Transactions   A DVCS transaction begins with a client preparing a Data Validation   and Certification Request.  The request always contains data for   which validity, correctness or possession is to be certified.   The request MAY be encapsulated using a security envelope to provide   for authentication of both requester and server.  Requester   authentication can be achieved by several of the formats described in   CMS, in particular, signedData.Adams, et al.                 Experimental                      [Page 7]RFC 3029                     DVCS Protocols                February 2001   The DVCS client chooses an appropriate transport mechanism to convey   the requests to a DVCS.  It may also be necessary to choose a   transport mechanism providing confidentiality and, in particular,   allowing authentication of the DVCS by the requestor, e.g., TLS or   CMS or S/MIME encryption.   If the request is valid, the DVCS performs all necessary   verifications steps, and generates a Data Validation Certificate   (DVC), and sends a response message containing the DVC back to the   requestor.   The Data Validation Certificate is formed as a signed document (CMS   SignedData).   As with the request, it may be necessary to choose a transport   mechanism that provides for confidentiality to carry the DVC.  DVCs   are not necessarily transported the same way as requests, e.g., they   can be returned using e-mail after an online request received via   HTTPS.   If the request was invalid, the DVCS generates a response message   containing an appropriate error notification.   Upon receiving the response, the requesting entity SHOULD verify its   validity, i.e., whether it contains an acceptable time, the correct   name for the DVCS, the correct request information and message   imprint, a valid signature, and satisfactory status, service and   policy fields.   When verifying the validity of a DVC, it is up to the requestor's   application to check whether a DVCS's signing certificate is valid.   Depending on the usage environment, different methods, online or out   of band, e.g., CRLs, DVCS, or OCSP, may have to be used.   After all checks have passed, the data validation certificate can be   used to authenticate the correctness or possession of the   corresponding data.   A DVCS may return more than one DVC corresponding to one request.  In   this case, all but one request have a global status of 'WAITING'.6. Identification of the DVCS   In order to be able to import elements from dvcs the following object   identifier is used as a ASN.1 module identifier.   id-mod-dvcs OBJECT IDENTIFIER ::= {iso(1) identified-organization(3)     dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) 15}Adams, et al.                 Experimental                      [Page 8]RFC 3029                     DVCS Protocols                February 2001   The DVCS that use SignedData to provide authentication for DVCs MUST   sign all data certification messages with a key whose corresponding   certificate MUST contain the extended key usage field extension as   defined in [RFC2459] Section 4.2.1.14 with KeyPurposeID having value   id-kp-dvcs.  This extension MUST be marked as critical.   The Data Validation Certificate MUST contain an ESSCertID   authenticated attribute for the certificate used by the DVCS for   signing.   id-kp-dvcs  OBJECT IDENTIFIER ::= {iso(1) identified-organization(3)        dod(6) internet(1) security(5) mechanisms(5) pkix(7) kp(3) 10}   Consistent KeyUsage bits:   digitalSignature, nonRepudiation, keyCertSign, cRLSign   A DVCS's certificate MAY contain an Authority Information Access   extension [RFC2459] in order to convey the method of contacting the   DVCS.  The accessMethod field in this extension MUST contain the OID   id-ad-dvcs:   id-ad-dvcs  OBJECT IDENTIFIER ::= {iso(1) identified-organization(3)        dod(6) internet(1) security(5) mechanisms(5) pkix(7) ad(48) 4}   The value of the 'accessLocation' field defines the transport (e.g.,   an URI) used to access the DVCS.7. Common Data Types   There are several common data types that occur in the request and the   response data structures.  These data types are either defined by   this document or imported from other sources.  This chapter defines   and describes these types and lists their usages.7.1 Version:   The request and the response include an optional integer field   specifying the version of the data structure.  For both fields the   value is 1, or the field is not present at all in this version of the   protocol.Adams, et al.                 Experimental                      [Page 9]RFC 3029                     DVCS Protocols                February 20017.2 DigestInfo:   This element is defined in [RFC2315].  Since the status of that   document is informational, the definition is repeated here:   DigestInfo ::= SEQUENCE {       digestAlgorithm   DigestAlgorithmIdentifier,       digest            Digest }   Digest ::= OCTET STRING   The fields of type DigestInfo have the following meanings:   - The field 'digestAlgorithm' identifies the message-digest algorithm     (and any associated parameters) under which data are digested.   - The field 'digest' is the result of the message-digesting process.   A DigestInfo is used in two places:   - as a data portion for the ccpd service, and   - in all a data validation certificates to hold a digest of the data     portion of the corresponding request or a copy of the data field     for a ccpd service.7.3. Time Values   Indicators of time can be present in requests and responses.  In the   most simple form, the time is represented as GeneralizedTime where   fractions of seconds are allowed.   An alternate form is a timeStampToken from a TSA, or as a DVC (or   some other token) from another third party service.   It is a matter of policy whether a DVCS tries to interpret or   validate a Time Value in a request.   DVCSTime ::= CHOICE  {        genTime                      GeneralizedTime,        timeStampToken               ContentInfo }   Future versions of the protocol MAY include additional time formats.   Time values generated by the DVCS are increasing but not necessarily   unique, an order among DVCs is defined by serial numbers.Adams, et al.                 Experimental                     [Page 10]RFC 3029                     DVCS Protocols                February 20017.4. PKIStatusInfo   This structure is defined in [RFC2510].  It is used as component of   the 'chain' field of a TargetEtcChain structure, and as a global   status indicator in the DVCSResponse structure.  Every occurrence of   PKIStatusInfo is generated by the responding DVCS to reflect the   result of some local verification.7.5. TargetEtcChain   A TargetEtcChain structure contains certificates and other indicators   to describe either (in a request for a cpkc service) information to   be validated, or the result of the verifications.  The structure may   also contain information about policies and policy mappings.   The details about how to fill in and to interpret the structure are   defined later for each service.   The 'pathProcInput' field contains information about policies and   policy mapping to be used or used during a validation.   In a response, the 'pkistatus' and `certstatus' choices can only   occur in the 'chain' sequence.  If present, they contain the result   of a local verification of the immediately preceding element, or of   the target value, if it is the first element in the 'chain' sequence.   If no 'pkistatus' or 'certstatus' is present, the DVCS considers all   elements in the 'chain' as trustworthy.  Note, that there may be a   valid OCSP response or DVC indicating an invalid certificate.   TargetEtcChain ::= SEQUENCE {        target                       CertEtcToken,        chain                        SEQUENCE SIZE (1..MAX) OF                                        CertEtcToken OPTIONAL,        pathProcInput                [0] PathProcInput OPTIONAL }   PathProcInput ::= SEQUENCE {        acceptablePolicySet          SEQUENCE SIZE (1..MAX) OF                                        PolicyInformation,        inhibitPolicyMapping         BOOLEAN DEFAULT FALSE,        explicitPolicyReqd           BOOLEAN DEFAULT FALSE }   CertEtcToken ::= CHOICE {        certificate                  [0] IMPLICIT Certificate ,        esscertid                    [1] ESSCertId ,        pkistatus                    [2] IMPLICIT PKIStatusInfo ,        assertion                    [3] ContentInfo ,        crl                          [4] IMPLICIT CertificateList,Adams, et al.                 Experimental                     [Page 11]RFC 3029                     DVCS Protocols                February 2001        ocspcertstatus               [5] IMPLICIT CertStatus,        oscpcertid                   [6] IMPLICIT CertId ,        oscpresponse                 [7] IMPLICIT OCSPResponse,        capabilities                 [8] SMIMECapabilities,        extension                    Extension }   Certificate, PolicyInformation and CertificateList are defined in   [RFC2459].  ESSCertId is defined in [RFC2634].  CertId, OCSPResponse   and CertStatus are defined in [RFC2560].  PKIStatusField is defined   in [RFC2510].   The choice 'assertion' can contain a data validation certificate, or   a timeStamp, or other assertions.   The choices 'assertion', 'ocspresponse' and 'crl' are provided by   services external to the responding DVCS.  The choices 'certStatus'   and 'pkistatus' reflect decisions made directly by the responding   DVCS.   As a replacement for certificates, certification identifiers   (ESSCertId, CertId)  MAY be used in requests and responses, if this   is sufficient to perform the service, e.g., when the corresponding   certificates are provided elsewhere in a request or response (as part   of the SignedData type).   Certificate or certification identifiers of certification authorities   MAY occur in any order and MAY represent several certification   chains.   The choice 'capabilities' can be used to indicate SMIMECapabilities.   It applies to the certificate identified by the preceding element in   the sequence.7.6. DVCSRequestInformation   A DVCSRequestInformation data structure contains general information   about the Data Validation and Certification Request.  This structure   occurs in a request, and is also included in a corresponding Data   Validation Certificate.   DVCSRequestInformation ::= SEQUENCE  {           version                      INTEGER DEFAULT 1 ,           service                      ServiceType,           nonce                        INTEGER OPTIONAL,           requestTime                  DVCSTime OPTIONAL,           requester                    [0] GeneralNames OPTIONAL,           requestPolicy                [1] PolicyInformation OPTIONAL,Adams, et al.                 Experimental                     [Page 12]RFC 3029                     DVCS Protocols                February 2001           dvcs                         [2] GeneralNames OPTIONAL,           dataLocations                [3] GeneralNames OPTIONAL,           extensions                   [4] IMPLICIT Extensions OPTIONAL   }   The ServiceType type enumerates the DVCS service type of a request.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美韩日一区二区三区四区| 国产真实乱偷精品视频免| 老司机精品视频线观看86| av中文字幕一区| 欧美成人精品二区三区99精品| 亚洲欧洲日韩女同| 久久国产三级精品| 欧美日精品一区视频| 国产精品久久久久精k8| 韩日av一区二区| 欧美日韩中文精品| 亚洲精品综合在线| 成人免费高清在线| 久久综合久久鬼色| 麻豆国产欧美一区二区三区| 欧美美女网站色| 亚洲精品国产a| av网站一区二区三区| 国产欧美一区二区三区沐欲| 久久国产精品99久久人人澡| 欧美一区二区福利在线| 五月天亚洲精品| 欧美日韩视频专区在线播放| 亚洲综合丝袜美腿| 在线视频中文字幕一区二区| 成人免费视频在线观看| 播五月开心婷婷综合| 中文字幕+乱码+中文字幕一区| 黄网站免费久久| 精品国产99国产精品| 久久 天天综合| 日韩欧美国产一区二区三区| 日本最新不卡在线| 日韩精品一区二区在线| 麻豆精品视频在线观看免费| 精品国产乱码久久久久久牛牛 | 欧美日韩成人综合| 性久久久久久久久| 欧美日本国产视频| 日本va欧美va瓶| 亚洲精品一区二区三区福利 | 成人午夜av在线| 欧美国产激情一区二区三区蜜月| 国产成人亚洲综合a∨婷婷 | 亚洲小说春色综合另类电影| 欧美日韩中文一区| 日本免费在线视频不卡一不卡二| 日韩一区二区视频在线观看| 黑人巨大精品欧美黑白配亚洲| 精品88久久久久88久久久| 国产精品18久久久久久久久 | 日韩国产欧美在线观看| 日韩精品一区二区三区swag| 国产99久久精品| 夜夜爽夜夜爽精品视频| 欧美男男青年gay1069videost | 亚洲黄色尤物视频| 欧美高清视频一二三区| 国产精品主播直播| 一区二区免费在线播放| 日韩一区二区在线看| 成人av在线网站| 婷婷国产v国产偷v亚洲高清| 久久综合九色综合97婷婷女人| 99国内精品久久| 麻豆国产精品视频| 亚洲欧美激情视频在线观看一区二区三区| 欧美亚洲国产一区二区三区va| 精久久久久久久久久久| 亚洲欧美另类图片小说| 欧美精品一区二区三区很污很色的| 成人性生交大合| 日日夜夜免费精品| 国产精品久久网站| 欧美另类久久久品| av不卡免费在线观看| 裸体一区二区三区| 亚洲国产美国国产综合一区二区| 久久这里都是精品| 欧美精品电影在线播放| 91免费观看在线| 国产精品18久久久久久久久 | 国产成人亚洲精品青草天美| 亚洲国产精品麻豆| 国产精品久久二区二区| 日韩欧美不卡在线观看视频| 日本久久电影网| 成人精品鲁一区一区二区| 日本成人在线视频网站| 一区二区视频在线| 国产婷婷精品av在线| 欧美xingq一区二区| 3atv一区二区三区| 欧美影片第一页| 色综合天天视频在线观看| 成人免费视频一区| 国产乱码字幕精品高清av| 奇米影视一区二区三区| 亚洲v精品v日韩v欧美v专区| 自拍偷自拍亚洲精品播放| 久久精品欧美日韩精品| 久久亚洲精品小早川怜子| 中文字幕乱码久久午夜不卡| 91精品麻豆日日躁夜夜躁| 欧洲一区二区av| 91蜜桃免费观看视频| www.日本不卡| 99久久久精品| 99精品在线免费| 99热这里都是精品| 色综合久久88色综合天天免费| 成人一区在线看| 成人动漫一区二区在线| 99久久精品免费精品国产| www.久久精品| 91麻豆免费观看| 欧洲精品在线观看| 欧美日韩国产影片| 欧美一区二区三区免费观看视频 | 一区二区三区中文字幕精品精品| 最新中文字幕一区二区三区| 亚洲色图一区二区| 亚洲综合在线观看视频| 亚洲成va人在线观看| 日韩福利电影在线| 国产乱子轮精品视频| 国产91在线观看| 91视视频在线观看入口直接观看www| 91首页免费视频| 欧美三级午夜理伦三级中视频| 91精品蜜臀在线一区尤物| 精品88久久久久88久久久| 亚洲国产高清在线观看视频| 一区二区三区四区激情| 亚洲成人动漫av| 狠狠色综合日日| 99视频热这里只有精品免费| 欧美日韩一级黄| 精品久久久久久最新网址| 中文字幕免费不卡在线| 亚洲国产精品久久一线不卡| 蜜桃视频在线观看一区二区| 国产精品一二二区| 欧美三电影在线| 久久男人中文字幕资源站| 1024成人网| 蜜臀av在线播放一区二区三区| 懂色av一区二区三区蜜臀 | 亚洲欧美日韩在线| 五月天丁香久久| 国产成人精品免费一区二区| 91久久精品国产91性色tv| 日韩欧美国产wwwww| 国产精品久久三区| 毛片基地黄久久久久久天堂| 97精品国产97久久久久久久久久久久| 欧美日韩午夜影院| 中文字幕一区免费在线观看 | 成人美女视频在线观看18| 在线观看日韩毛片| 久久伊人中文字幕| 五月婷婷久久综合| 99国产精品一区| 26uuu国产在线精品一区二区| 亚洲一区在线看| 成人在线综合网| 精品国产免费人成电影在线观看四季 | 精品一区二区三区免费| 一本一道久久a久久精品| 日韩精品一区国产麻豆| 亚洲国产毛片aaaaa无费看| 成人毛片在线观看| 26uuu久久综合| 91日韩一区二区三区| 久久综合五月天婷婷伊人| 日本免费在线视频不卡一不卡二| 色综合中文字幕国产| 精品国产人成亚洲区| 视频一区在线视频| 欧美综合久久久| 中文字幕一区在线观看视频| 国产成人午夜电影网| 精品国产91洋老外米糕| 蜜桃av噜噜一区二区三区小说| 欧美在线免费视屏| 一区二区三区在线免费播放| 91视频91自| 亚洲天堂2014| 色综合久久久久久久| 亚洲日韩欧美一区二区在线| 成人激情动漫在线观看| 亚洲精品一区二区三区影院| 久久99精品久久久久久久久久久久| 欧美乱妇一区二区三区不卡视频| 亚洲午夜精品网| 7777女厕盗摄久久久| 日本欧美一区二区三区| 日韩免费视频一区| 国内精品免费**视频| 337p日本欧洲亚洲大胆精品|