亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3029.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   See chapter 2 for the description of the services.   ServiceType ::= ENUMERATED { cpd(1), vsd(2), cpkc(3), ccpd(4) }7.7. GeneralName and GeneralNames   There are several occurrences of SEQUENCES of GeneralName and   GeneralNames.  These structures are imported from [RFC2459].8. Data Validation and Certification Requests   A Data Validation and Certification request is a ContentInfo defined   in [RFC2630].   It may consist of a [RFC2630] content with a contenttype id-ct-   DVCSRequestData signalling a DVCSRequestData,   id-ct-DVCSRequestData OBJECT IDENTIFIER ::= {iso(1) member-body(2)     us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 7}   These data are optionally encapsulated by contenttypes that provide   for authentication and/or confidentiality.   This document describes the usage of a SignedData construct of   [RFC2630] where the contenttype indicated in the eContentType of the   encapContentInfo is id-ct-DVCSRequestData and the eContent of the   encapContentInfo, carried as an octet string, contains a   DVCSRequestData structure.   When using a SignedData structure, a Data Validation and   Certification Request MAY contain several SignerInfo structures, and   countersignature attributes depending on operational environments.   When an end user client creates the request, there is one or zero   SignerInfo.  A relaying DVCS MAY add an additional signature or a   countersignature attribute, or MAY use another encapsulation from   [RFC2630] that provides for authentication and/or confidentiality.   The content of a request consists of a description of the desired   service and additional parameters, the data to be validated, and an   optional identifier of the request.Adams, et al.                 Experimental                     [Page 13]RFC 3029                     DVCS Protocols                February 2001   DVCSRequest ::= SEQUENCE  {       requestInformation         DVCSRequestInformation,       data                       Data,       transactionIdentifier      GeneralName OPTIONAL   }   The 'DVCSRequest.requestInformation' element contains general   information about the request.  It is filled in by the requester as   follows:   - The 'version' field is set to 1 or the field is absent in this     version of the protocol.     The field 'service' contains the requested service.   - The 'nonce' field MAY be used to provide additional protection     against replay or content guessing attacks.   - The 'requestTime' field MAY be used to indicate the time for which     the requested service should be performed.  For a vsd and cpkc     service, it specifies the time for which the validity of a signed     document or certicates is to be asserted.  For the other service,     the field is ignored by the DVCS.  If the field is absent, the     current time is assumed.   - The value of the 'requester' field indicates the requesting entity.     The interpretation and usage of this field MUST be defined by the     DVCS policy.     Some usage examples are:     If the field is present, and the request is signed, a DVCS MAY     require that the field MUST match the identity (subjectName or     subjectAltName extension) of the corresponding signature     certificate.     A request MAY be signed by a DVCS when relaying it to another DVCS.     When acting as a relay, a DVCS MAY add its own identity in the     request relayed to another service provider, and it MAY remove the     initial value.   - The 'requestPolicy' field SHOULD indicate the policy under which     the validation is requested.  This field MUST be checked by the     DVCS to verify agreement with its own policy.  The absence of this     field indicates that any policy is acceptable.Adams, et al.                 Experimental                     [Page 14]RFC 3029                     DVCS Protocols                February 2001   - The 'dvcs' field MAY be used to indicate a list of DVCS which can     be contacted to provide (additional) information or to perform     additional operations necessary to produce the response.     It is up to the DVCS policy whether to honor this field or not, and     to define which choice of a general name is acceptable (e.g., an     URL or a DN).   - The 'dataLocations' field MAY be used to indicate where a copy of     the 'data' field of the request or supplementary information can be     obtained.  The DVCS does not use this field for its own operation,     the exact interpretation of this field is defined by applications.   - The 'requestTime' field MAY be used to indicate the time for which     the requested service should be performed.  For a vsd and cpkc     service, it specifies the time for which the validity of a signed     document or certicates is to be asserted.  For the other service,     the field is ignored by the DVCS.  If the field is absent, the     current time is assumed.  The DVCS service may have a time limit or     a delta time limit regarding current time which are specified in     the local policy of the DVCS service.   - The 'extensions' field MAY be used to include additional     information.  Extensions may be marked critical or not in order to     indicate whether the DVCS is supposed to understand them.  This     document does not define extensions.   The DVCSRequest.data contains service-specific content, defined by   each particular service provided by the DVCS.   Depending on the requested service type, the field may contain a   signed document, a list of certificates, a message digest or   arbitrary data.   The following type is used:   Data ::= CHOICE {         message           OCTET STRING ,         messageImprint    DigestInfo,         certs             SEQUENCE SIZE (1..MAX) OF                               TargetEtcChain   }   The requester fills the 'data' element as follows:   - For a vsd service request, the requestor encapsulates a CMS     SignedData object in the value octets of the 'message' choice.Adams, et al.                 Experimental                     [Page 15]RFC 3029                     DVCS Protocols                February 2001     It is up to the requester to decide whether and how to provide any     certificate that may be needed to verify the signature(s) in the     signedData object.  A requester MAY add certificates to the     encapsulated signedData object or in the certificate list of the     request.   - For a cpkc service request the 'certs' choice is used.     Each certificate to be verified MUST be included in a separate     instance of TargetEtcChain.  The 'TargetEtcChain.chain' field, if     present, indicates one or more chains of trust that can be used to     validate the certificate.  The DVCS MAY choose to select a subset     of certificates as certification path, or to ignore this field.     The 'TargetEtcChain.pathProcInput' field, if present, indicates the     acceptable policy set and initial settings for explicit-policy-     indicator and inhibit-policy-mapping indicators to be used in X.509     public key certificate path validation (see [RFC2459]).     Only the Certificate, ESSCertId, CertId or Extension choices of the     TargetEtcChain can be used in the request.     The requester is responsible for providing sufficient information     to the DVCS to identify the corresponding certificates.   - For a ccpd service the 'messageImprint' choice is used.     The hash algorithm indicated in the hashAlgorithm field SHOULD be a     "strong" hash algorithm (that is, it SHOULD be one-way and     collision resistant).  It is up to the Data Certification Server to     decide whether or not the given hash algorithm is sufficiently     "strong" (based on the current state of knowledge in cryptanalysis     and the current state of the art in computational resources, for     example).   - For a cpd service the 'message' choice is used.     The field contains requester-specific data with any type of     content.  The DVCS does not inspect, modify, or take any particular     action based on the particular content of the 'message' field.   The field 'DVCSRequest.transactionIdentifier' MAY be used in order to   associate DVCS responses containing error messages, to requests.  For   example, in a mail based environment, the parameter could be a copy   of a messageid.  Note, that the transactionIdentifier is not   necessary for associating a request with a valid data validation   certificate.Adams, et al.                 Experimental                     [Page 16]RFC 3029                     DVCS Protocols                February 20019. DVCS Responses   This chapters describes the data structures that are created by a   DVCS to indicate the results of validation and certification   requests.   A DVCS Response structure is generated by the DVCS as a result of   processing of the data validation and certification request.   A Data Validation response contains an [RFC2630] ContentInfo with a   type of id-ct-DVCSResponseData signalling a DVCSResponse structure.   id-ct-DVCSResponseData OBJECT IDENTIFIER ::= { iso(1) member-body(2)       us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 8 }   The data MAY be encapsulated by constructs of [RFC2630] in order to   provide authentication of the DVCS, and or integrity and   confidentiality of the request.  This document specifies the usage of   a SignedData construct of [RFC2630].   The contenttype indicated in the eContentType of the encapContentInfo   is of type id-ct-DVCSResponseData, signalling a DVCSResponse as   eContent of the encapContentInfo (carried as an octet string).  The   DVCS SHOULD use a key for which a corresponding certificate indicates   in an extendedKeyUsage the purpose of DVCS signing.   In a critical situation when a DVCS cannot produce a valid signature   (if the DVCS's signing key is known to be compromised, for example),   the DVCSResponse, containing the error notification, MUST be   generated as a signedData with no signerInfo attached.  Receiving   unsigned DVCSResponse MUST be treated by the clients as a critical   and fatal error, and the content of the message should not be   implicitly trusted.   A valid response can contain one of the following:   1. A Data Validation Certificate (DVC), delivering the results of      data validation operations, performed by the DVCS.   2. An error notification.  This may happen when a request fails due      to a parsing error, requester authentication failure, or anything      else that prevented the DVCS from executing the request.Adams, et al.                 Experimental                     [Page 17]RFC 3029                     DVCS Protocols                February 2001   The following type is used:   DVCSResponse ::= CHOICE {       dvCertInfo         DVCSCertInfo ,       dvErrorNote        [0] DVCSErrorNotice }9.1. Data Validation Certificate   A Data Validation Certificate is a signedData object containing a   DVCSResponse with a 'dvCertInfo' choice.   DVCSCertInfo::= SEQUENCE  {            version             Integer DEFAULT 1 ,            dvReqInfo           DVCSRequestInformation,            messageImprint      DigestInfo,            serialNumber        Integer,            responseTime        DVCSTime,            dvStatus            [0] PKIStatusInfo OPTIONAL,            policy              [1] PolicyInformation OPTIONAL,            reqSignature        [2] SignerInfos  OPTIONAL,            certs               [3] SEQUENCE SIZE (1..MAX) OF                                    TargetEtcChain OPTIONAL,            extensions          Extensions OPTIONAL }   The DVCSCertInfo structure is returned as a result of successful   execution of data validation service.  It contains the results of the   data validation, a reference to the original request, and other   parameters.  Please note that 'successful execution' does not   necessarily mean that the validation itself was successful - a   DVCSCertInfo may contain both the 'valid' and 'invalid' results.   The DVCS creates a DVCSCertInfo as follows:   - The 'version' field is never present in this version of the     protocol.     The 'dvReqInfo' is essentially a copy of the 'requestInformation'     field of the corresponding request.  The DVCS MAY modify the fields     'dvcs', 'requester', 'dataLocations', and 'nonce' of the ReqInfo     structure, e.g., if the request was processed by a chain of DVCS,     if the request needs to indicate DVCS, or to indicate where to find     a copy of the data from a 'vpd' request.  The only modification     allowed to a 'nonce' is the inclusion of a new field if it was not     present, or to concatenate other data to the end (right) of an     existing value.Adams, et al.                 Experimental                     [Page 18]RFC 3029                     DVCS Protocols                February 2001   - The 'DVCSCertInfo.messageImprint' field is computed from the 'data'     field of the corresponding request as follows:     For the 'certs' choice (the 'vpkc' service), the digest is computed     over the DER encoded data value.  For a 'message' choice (the 'vsd'     and the 'vpd' services) the digest is computed over the value     octets (not including tag and length octets) of the OCTET STRING.     It is up to the DVCS to choose an appropriate digest algorithm.     For a 'messageImprint' choice (the 'vcpd' service), the     'messageImprint' of the DVCSRequest is copied as is.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲综合色成人| 秋霞av亚洲一区二区三| 欧美精品一区二区在线观看| 欧美mv日韩mv| 国产精品久久久久7777按摩| 亚洲一区免费视频| 久久国产生活片100| 99久久国产综合色|国产精品| 色婷婷激情综合| 久久久久久亚洲综合影院红桃| 亚洲丝袜精品丝袜在线| 久久精品999| 欧美性高清videossexo| 久久久电影一区二区三区| 亚洲最大的成人av| 国产美女在线观看一区| 色94色欧美sute亚洲线路二| 2024国产精品| 日韩综合在线视频| 91色九色蝌蚪| 久久久久久免费毛片精品| 日本一区二区久久| 日av在线不卡| 欧美综合一区二区三区| 日本一区二区不卡视频| 日本在线不卡一区| 欧美亚洲高清一区| 国产日韩精品一区二区浪潮av| 亚洲成在人线在线播放| 91麻豆国产福利精品| 欧美大片顶级少妇| 人人精品人人爱| 欧美三级在线看| 亚洲男同性恋视频| 国产99久久久国产精品免费看| 日韩免费高清视频| 青青草原综合久久大伊人精品| 欧美亚洲国产一卡| 亚洲一区二区三区国产| 91视频免费播放| 国产精品久久久久一区二区三区| 丝袜亚洲另类丝袜在线| 在线观看日韩一区| 亚洲一区二区三区免费视频| 99国产精品99久久久久久| 日本一区二区三区视频视频| 久草热8精品视频在线观看| 欧美一区二区三区在线电影| 亚洲成人av电影在线| 欧美日韩亚洲综合在线 欧美亚洲特黄一级| 中文字幕中文字幕在线一区 | 色www精品视频在线观看| 国产亚洲美州欧州综合国| 麻豆精品视频在线观看免费| 欧洲精品视频在线观看| 一区二区激情小说| 欧美午夜精品免费| 午夜精品久久久久久久久久久 | 久久国产成人午夜av影院| 欧美日韩一区二区三区在线看 | 日韩女同互慰一区二区| 精品在线一区二区| 久久久蜜桃精品| 国产91高潮流白浆在线麻豆| 亚洲欧美在线高清| 国产综合久久久久影院| 久久精品欧美一区二区三区不卡| 国产一区二区三区美女| 国产农村妇女精品| 色婷婷激情久久| 蜜臀精品久久久久久蜜臀 | 亚洲精品成人天堂一二三| 一本一道综合狠狠老| 亚洲一区精品在线| 色88888久久久久久影院野外| 亚洲国产精品综合小说图片区| 一本色道亚洲精品aⅴ| 亚洲免费观看高清完整版在线 | 欧美一区二区在线不卡| 久久国产精品99精品国产 | 日韩西西人体444www| 激情小说亚洲一区| 成人免费在线视频观看| 欧美色国产精品| 极品销魂美女一区二区三区| 亚洲欧美偷拍另类a∨色屁股| 欧美日韩免费高清一区色橹橹| 久草在线在线精品观看| 亚洲欧美日韩国产另类专区| 91精品国产综合久久福利| 国产精品羞羞答答xxdd| 亚洲国产精品欧美一二99| 精品第一国产综合精品aⅴ| 成人国产免费视频| 午夜婷婷国产麻豆精品| 欧美激情一区二区三区蜜桃视频 | 日韩欧美国产一区在线观看| 国产99久久久国产精品潘金| 午夜精品久久久久久久99水蜜桃 | 亚洲国产精品久久人人爱蜜臀 | 久久综合狠狠综合久久激情| 一本到三区不卡视频| 精品亚洲国内自在自线福利| 亚洲免费电影在线| 欧美激情一区二区三区不卡| 欧美日韩mp4| 波多野结衣一区二区三区 | 久久综合av免费| 欧美在线短视频| 成人性视频免费网站| 青青国产91久久久久久| 一区二区久久久久久| 国产精品国产三级国产aⅴ中文| 91精品午夜视频| 91美女福利视频| 国产**成人网毛片九色| 久久99国产精品尤物| 亚洲伊人色欲综合网| 综合av第一页| 国产福利不卡视频| 国产中文字幕一区| 国产一区91精品张津瑜| 成人福利视频网站| 91女厕偷拍女厕偷拍高清| 在线观看视频91| 欧美丰满少妇xxxbbb| 日韩欧美亚洲另类制服综合在线 | 日本不卡一区二区三区高清视频| 亚洲综合色在线| 日韩av在线发布| 国产在线一区二区综合免费视频| 国产成人啪午夜精品网站男同| 成人性生交大片免费看视频在线| eeuss鲁片一区二区三区在线观看| 成人免费电影视频| 色噜噜狠狠色综合欧洲selulu| 欧美日韩一区二区三区视频| 日韩视频免费观看高清完整版在线观看| 欧美成人aa大片| 国产精品视频一区二区三区不卡| 国产精品免费久久| 午夜电影网一区| 国产精品 欧美精品| 色婷婷综合久久久久中文| 日韩一区二区精品葵司在线| 久久久久久久久岛国免费| 亚洲欧美日韩国产综合| 欧美aⅴ一区二区三区视频| 成人综合激情网| 欧美日韩一区二区电影| 国产日产精品一区| 亚洲自拍另类综合| 国产精品综合网| 欧美三片在线视频观看| 久久久久99精品国产片| 亚洲自拍都市欧美小说| 国产高清精品久久久久| 精品视频在线看| 国产精品美女久久久久aⅴ| 三级亚洲高清视频| 成人av电影免费在线播放| 欧美一区二区在线播放| 亚洲人亚洲人成电影网站色| 久久99最新地址| 欧美日韩色一区| 成人欧美一区二区三区1314| 捆绑调教美女网站视频一区| 99r国产精品| 国产蜜臀97一区二区三区| 日日噜噜夜夜狠狠视频欧美人| av电影在线观看完整版一区二区| 日韩欧美一二三区| 亚洲123区在线观看| 色一区在线观看| 国产午夜精品一区二区三区四区| 亚洲成人av福利| 91福利在线导航| 国产精品乱码一区二三区小蝌蚪| 麻豆精品精品国产自在97香蕉| 欧洲一区在线电影| 亚洲区小说区图片区qvod| 高清在线不卡av| 久久久亚洲精品石原莉奈| 免费欧美在线视频| 欧美蜜桃一区二区三区| 亚洲一区二区三区四区的| 99久久精品情趣| 国产精品久久久久久久蜜臀 | 麻豆一区二区99久久久久| 精品视频免费在线| 亚洲国产wwwccc36天堂| 一本色道久久加勒比精品| 亚洲免费高清视频在线| 色综合久久久久久久久久久| 日韩码欧中文字| 一本久久综合亚洲鲁鲁五月天| 亚洲欧美日韩久久| 欧美视频中文一区二区三区在线观看 | 久久草av在线| 精品国产乱码久久久久久图片|