亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2510.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   lines.Adams & Farrell             Standards Track                     [Page 6]RFC 2510          PKI Certificate Management Protocols        March 1999      +---+     cert. publish        +------------+      j      |   |  <---------------------  | End Entity | <-------      | C |             g            +------------+      "out-of-band"      |   |                            | ^                loading      | e |                            | |      initial      | r |                          a | | b     registration/      | t |                            | |       certification      |   |                            | |      key pair recovery      | / |                            | |      key pair update      |   |                            | |      certificate update      | C |  PKI "USERS"               V |      revocation request      | R | -------------------+-+-----+-+------+-+-------------------      | L |  PKI MANAGEMENT    | ^              | ^      |   |    ENTITIES      a | | b          a | | b      |   |                    V |              | |      | R |             g   +------+    d       | |      | e |   <------------ | RA   | <-----+    | |      | p |      cert.      |      | ----+ |    | |      | o |       publish   +------+   c | |    | |      | s |                              | |    | |      | i |                              V |    V |      | t |          g                 +------------+   i      | o |   <------------------------|     CA     |------->      | r |          h                 +------------+  "out-of-band"      | y |      cert. publish              | ^         publication      |   |      CRL publish                | |      +---+                                 | |    cross-certification                                          e | | f  cross-certificate                                            | |       update                                            | |                                            V |                                          +------+                                          | CA-2 |                                          +------+                           Figure 1 - PKI Entities   At a high level the set of operations for which management messages   are defined can be grouped as follows.      1 CA establishment: When establishing a new CA, certain steps are        required (e.g., production of initial CRLs, export of CA public        key).      2 End entity initialization: this includes importing a root CA        public key and requesting information about the options        supported by a PKI management entity.Adams & Farrell             Standards Track                     [Page 7]RFC 2510          PKI Certificate Management Protocols        March 1999      3 Certification: various operations result in the creation of new        certificates:        3.1 initial registration/certification: This is the process            whereby  an end entity first makes itself known to a CA or            RA, prior to the CA issuing a certificate or certificates            for that end entity. The end result of this process (when it            is successful) is that a CA issues a certificate for an end            entity's public key, and returns that certificate to the end            entity and/or posts that certificate in a public repository.            This process may, and typically will, involve multiple            "steps", possibly including an initialization of the end            entity's equipment. For example, the end entity's equipment            must be securely initialized with the public key of a CA, to            be used in validating certificate paths.  Furthermore, an            end entity typically needs to be initialized with its own            key pair(s).        3.2 key pair update:  Every key pair needs to be updated            regularly (i.e., replaced with a new key pair), and a new            certificate needs to be issued.        3.3 certificate update: As certificates expire they may be            "refreshed" if nothing relevant in the environment has            changed.        3.4 CA key pair update: As with end entities, CA key pairs need            to be updated regularly; however, different mechanisms are            required.        3.5 cross-certification request:  One CA requests issuance of a            cross-certificate from another CA.  For the purposes of this            standard, the following terms are defined.  A "cross-            certificate" is a certificate in which the subject CA and            the issuer CA are distinct and SubjectPublicKeyInfo contains            a verification key (i.e., the certificate has been issued            for the subject CA's signing key pair).  When it is            necessary to distinguish more finely, the following terms            may be used: a cross-certificate is called an "inter-domain            cross-certificate" if the subject and issuer CAs belong to            different administrative domains; it is called an "intra-            domain cross-certificate" otherwise.Adams & Farrell             Standards Track                     [Page 8]RFC 2510          PKI Certificate Management Protocols        March 1999   Notes:   Note 1. The above definition of "cross-certificate" aligns with the   defined term "CA-certificate" in X.509.  Note that this term is not   to be confused with the X.500 "cACertificate" attribute type, which   is unrelated.   Note 2. In many environments the term "cross-certificate", unless   further qualified, will be understood to be synonymous with "inter-   domain cross-certificate" as defined above.   Note 3. Issuance of cross-certificates may be, but is not   necessarily, mutual; that is, two CAs may issue cross-certificates   for each other.        3.6 cross-certificate update: Similar to a normal certificate            update but involving a cross-certificate.      4 Certificate/CRL discovery operations: some PKI management        operations result in the publication of certificates or CRLs:        4.1 certificate publication: Having gone to the trouble of            producing a certificate, some means for publishing it is            needed.  The "means" defined in PKIX MAY involve the            messages specified in Sections 3.3.13 - 3.3.16, or MAY            involve other methods (LDAP, for example) as described in            the "Operational Protocols" documents of the PKIX series of            specifications.        4.2 CRL publication: As for certificate publication.      5 Recovery operations: some PKI management operations are used        when an end entity has "lost" its PSE:        5.1 key pair recovery:  As an option, user client key materials            (e.g., a user's private key used for decryption purposes)            MAY be backed up by a CA, an RA, or a key backup system            associated with a CA or RA. If an entity needs to recover            these backed up key materials (e.g., as a result of a            forgotten password or a lost key chain file), a  protocol            exchange may be needed to support such recovery.      6 Revocation operations: some PKI operations result in the        creation of new CRL entries and/or new CRLs:        6.1 revocation request:  An authorized person advises a CA of an            abnormal situation requiring certificate revocation.Adams & Farrell             Standards Track                     [Page 9]RFC 2510          PKI Certificate Management Protocols        March 1999      7 PSE operations: whilst the definition of PSE operations (e.g.,        moving a PSE, changing a PIN, etc.) are beyond the scope of this        specification, we do define a PKIMessage (CertRepMessage) which        can form the basis of such operations.   Note that on-line protocols are not the only way of implementing the   above operations.  For all operations there are off-line methods of   achieving the same result, and this specification does not mandate   use of on-line protocols.  For example, when hardware tokens are   used, many of the operations MAY be achieved as part of the physical   token delivery.   Later sections define a set of standard messages supporting the above   operations.  The protocols for conveying these exchanges in different   environments (file based, on-line, E-mail, and WWW) is also   specified.2. Assumptions and restrictions2.1 End entity initialization   The first step for an end entity in dealing with PKI management   entities is to request information about the PKI functions supported   and to securely acquire a copy of the relevant root CA public key(s).2.2 Initial registration/certification   There are many schemes that can be used to achieve initial   registration and certification of end entities. No one method is   suitable for all situations due to the range of policies which a CA   may implement and the variation in the types of end entity which can   occur.   We can however, classify the initial registration / certification   schemes that are supported by this specification. Note that the word   "initial", above, is crucial - we are dealing with the situation   where the end entity in question has had no previous contact with the   PKI. Where the end entity already possesses certified keys then some   simplifications/alternatives are possible.   Having classified the schemes that are supported by this   specification we can then specify some as mandatory and some as   optional. The goal is that the mandatory schemes cover a sufficient   number of the cases which will arise in real use, whilst the optional   schemes are available for special cases which arise less frequently.   In this way we achieve a balance between flexibility and ease of   implementation.Adams & Farrell             Standards Track                    [Page 10]RFC 2510          PKI Certificate Management Protocols        March 1999   We will now describe the classification of initial registration /   certification schemes.2.2.1 Criteria used2.2.1.1 Initiation of registration / certification   In terms of the PKI messages which are produced we can regard the   initiation of the initial registration / certification exchanges as   occurring wherever the first PKI message relating to the end entity   is produced. Note that the real-world initiation of the registration   / certification procedure may occur elsewhere (e.g., a personnel   department may telephone an RA operator).   The possible locations are at the end entity, an RA, or a CA.2.2.1.2 End entity message origin authentication   The on-line messages produced by the end entity that requires a   certificate may be authenticated or not. The requirement here is to   authenticate the origin of any messages from the end entity to the   PKI (CA/RA).   In this specification, such authentication is achieved by the PKI   (CA/RA) issuing the end entity with a secret value (initial   authentication key) and reference value (used to identify the   transaction) via some out-of-band means. The initial authentication   key can then be used to protect relevant PKI messages.   We can thus classify the initial registration/certification scheme   according to whether or not the on-line end entity -> PKI messages   are authenticated or not.   Note 1: We do not discuss the authentication of the PKI -> end entity   messages here as this is always REQUIRED. In any case, it can be   achieved simply once the root-CA public key has been installed at the   end entity's equipment or it can be based on the initial   authentication key.   Note 2: An initial registration / certification procedure can be   secure where the messages from the end entity are authenticated via   some out- of-band means (e.g., a subsequent visit).2.2.1.3 Location of key generation   In this specification, "key generation" is regarded as occurring   wherever either the public or private component of a key pair first   occurs in a PKIMessage. Note that this does not preclude aAdams & Farrell             Standards Track                    [Page 11]RFC 2510          PKI Certificate Management Protocols        March 1999   centralized key generation service - the actual key pair MAY have   been generated elsewhere and transported to the end entity, RA, or CA

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一级午夜免费电影| av亚洲产国偷v产偷v自拍| 韩国成人精品a∨在线观看| 国产99一区视频免费| 在线观看免费亚洲| 久久男人中文字幕资源站| 亚洲激情欧美激情| 丁香亚洲综合激情啪啪综合| 在线成人小视频| 国产精品免费丝袜| 久草精品在线观看| 欧美亚洲动漫制服丝袜| 国产精品国产馆在线真实露脸| 天堂精品中文字幕在线| 91色视频在线| 国产日韩v精品一区二区| 蜜臀av一区二区在线免费观看 | 在线播放中文字幕一区| 国产精品毛片高清在线完整版| 免费观看91视频大全| 欧美伊人久久大香线蕉综合69 | 日韩成人一级片| 色8久久人人97超碰香蕉987| 久久精品男人的天堂| 久久se这里有精品| 欧美高清激情brazzers| 亚洲午夜视频在线观看| 91美女福利视频| 国产精品久久久久久一区二区三区| 69久久夜色精品国产69蝌蚪网| 亚洲精品久久7777| 色婷婷一区二区| 综合av第一页| 色婷婷狠狠综合| 亚洲综合久久久久| 欧美日韩国产色站一区二区三区| 亚洲妇女屁股眼交7| 欧美美女黄视频| 久久精品国内一区二区三区| 欧美va亚洲va香蕉在线| 激情五月婷婷综合网| 久久五月婷婷丁香社区| 国产超碰在线一区| 尤物在线观看一区| 欧美三级日韩在线| 日韩黄色免费网站| 欧美日韩国产一区| 国产精品久线观看视频| 丁香五精品蜜臀久久久久99网站| 久久久午夜电影| 成人久久18免费网站麻豆| 国产欧美一区二区精品性| 日日夜夜一区二区| 2023国产精品| 国产二区国产一区在线观看| 国产日韩欧美制服另类| 国产精品一区在线| 日本一区二区高清| 91偷拍与自偷拍精品| 亚洲欧美日韩精品久久久久| 色婷婷精品久久二区二区蜜臀av| 1区2区3区精品视频| 波多野结衣91| 国产精品久久久久毛片软件| 欧美色偷偷大香| 久久超碰97人人做人人爱| 精品国产第一区二区三区观看体验| 精品一区二区在线视频| 中文字幕精品一区二区精品绿巨人| 成人午夜av电影| 亚洲视频在线观看一区| 欧美日韩国产首页| 激情综合网天天干| 国产精品视频在线看| 日本乱人伦一区| 亚洲尤物在线视频观看| 91麻豆国产香蕉久久精品| 欧美日韩亚洲综合| 精品久久免费看| 国产精品资源网站| 在线免费不卡电影| 精品成人a区在线观看| 成人免费视频在线观看| 免播放器亚洲一区| 欧美日韩国产一级片| 欧美成人伊人久久综合网| 日本一区二区视频在线| 男女男精品网站| 国产在线不卡一区| 欧美精品一区二区三区蜜桃视频 | 国产v日产∨综合v精品视频| 亚洲日本电影在线| 欧美一区二区三区成人| 成人黄页在线观看| 日本中文字幕一区二区有限公司| 中文字幕欧美日韩一区| 欧美日韩中文一区| 成人精品一区二区三区中文字幕| 三级亚洲高清视频| 亚洲麻豆国产自偷在线| 久久一夜天堂av一区二区三区| 91国内精品野花午夜精品| 国产一区啦啦啦在线观看| 五月激情综合色| 亚洲品质自拍视频网站| 久久久99久久| 欧美xxxx在线观看| 欧美精品一二三| 国产精品影音先锋| 亚洲电影你懂得| 国产精品无码永久免费888| 欧美一级理论性理论a| 色综合激情五月| 成人免费毛片高清视频| 国内外成人在线| 奇米色一区二区| 日本免费在线视频不卡一不卡二 | 中文字幕在线免费不卡| 精品国产1区二区| 制服丝袜成人动漫| 91麻豆精品在线观看| 国产高清视频一区| 加勒比av一区二区| 久久疯狂做爰流白浆xx| 午夜精品免费在线观看| 亚洲一区在线观看视频| 一区二区三区中文在线观看| 国产精品全国免费观看高清| 国产欧美精品区一区二区三区| 亚洲精品一区二区三区香蕉| 亚洲精品一线二线三线| 欧美r级在线观看| 欧美变态口味重另类| 欧美日韩1区2区| 欧美自拍偷拍一区| 欧美中文字幕一区二区三区| 欧美视频中文一区二区三区在线观看| 成人免费毛片aaaaa**| 成人国产精品免费| 色偷偷一区二区三区| 欧美性色黄大片| 欧美精品亚洲一区二区在线播放| 在线观看91精品国产麻豆| 欧美电视剧在线看免费| 国产女主播视频一区二区| 国产精品丝袜在线| 国产精品久久久久久久久免费樱桃| 亚洲蜜桃精久久久久久久| 亚洲第一在线综合网站| 日韩精品每日更新| 激情欧美日韩一区二区| 国产91在线观看| 色综合久久久网| 欧美一区二区黄| 久久久国产精华| 一区二区三区日韩欧美精品| 亚洲成人一二三| 久久国产精品99久久人人澡| 国产.欧美.日韩| 欧美日韩综合色| 国产性做久久久久久| 一区在线中文字幕| 五月开心婷婷久久| 国产91综合一区在线观看| 91福利社在线观看| 日韩欧美在线不卡| 亚洲色图清纯唯美| 蜜臀99久久精品久久久久久软件| 精品亚洲国产成人av制服丝袜| 成人福利视频在线看| 欧美日韩国产片| 国产欧美日韩在线看| 亚洲成人激情综合网| 日本中文字幕一区二区有限公司| 日韩成人av影视| 成人av网站在线| 91精品国产高清一区二区三区 | 蜜桃视频第一区免费观看| 国产91在线观看| 日韩一区二区麻豆国产| 亚洲日本免费电影| 国产一区二区三区免费| 欧美日韩午夜精品| 成人免费小视频| 日本不卡一区二区三区高清视频| 国产成人亚洲精品狼色在线| 欧美日韩一区小说| 亚洲精品久久久蜜桃| 国产91色综合久久免费分享| 欧美男女性生活在线直播观看| 中文字幕 久热精品 视频在线 | 国产91丝袜在线观看| 欧美日韩色综合| 中文字幕在线不卡国产视频| 久久99国产精品成人| 欧美综合一区二区三区| 亚洲一区二区在线视频| 成人国产精品免费观看动漫| 久久新电视剧免费观看| 久久疯狂做爰流白浆xx|