亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2510.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   protected  verifier     can directly  is the         has not   using OLD  must         verify the    situation of   updated the   public     access the   certificate   case 2 and     directory the   key        directory    without       will access    verifier can              in order     using the     the            verify the              to get the   directory     directory;     certificate              value of                   however, the   directly -              the OLD                    verification   this is thus              public key                 will FAIL      the same as                                                        case 4.Adams & Farrell             Standards Track                    [Page 17]RFC 2510          PKI Certificate Management Protocols        March 19992.4.2.1 Verification in cases 1, 4, 5 and 8.   In these cases the verifier has a local copy of the CA public key   which can be used to verify the certificate directly. This is the   same as the situation where no key change has occurred.   Note that case 8 may arise between the time when the CA operator has   generated the new key pair and the time when the CA operator stores   the updated attributes in the directory. Case 5 can only arise if the   CA operator has issued both the signer's and verifier's certificates   during this "gap" (the CA operator SHOULD avoid this as it leads to   the failure cases described below).2.4.2.2 Verification in case 2.   In case 2 the verifier must get access to the old public key of the   CA. The verifier does the following:      1. Look up the caCertificate attribute in the directory and pick         the OldWithNew certificate (determined based on validity         periods);      2. Verify that this is correct using the new CA key (which the         verifier has locally);      3. If correct, check the signer's certificate using the old CA         key.   Case 2 will arise when the CA operator has issued the signer's   certificate, then changed key and then issued the verifier's   certificate, so it is quite a typical case.2.4.2.3 Verification in case 3.   In case 3 the verifier must get access to the new public key of the   CA. The verifier does the following:      1. Look up the CACertificate attribute in the directory and pick         the NewWithOld certificate (determined based on validity         periods);      2. Verify that this is correct using the old CA key (which the         verifier has stored locally);      3. If correct, check the signer's certificate using the new CA         key.   Case 3 will arise when the CA operator has issued the verifier's   certificate, then changed key and then issued the signer's   certificate, so it is also quite a typical case.Adams & Farrell             Standards Track                    [Page 18]RFC 2510          PKI Certificate Management Protocols        March 19992.4.2.4 Failure of verification in case 6.   In this case the CA has issued the verifier's PSE containing the new   key without updating the directory attributes. This means that the   verifier has no means to get a trustworthy version of the CA's old   key and so verification fails.   Note that the failure is the CA operator's fault.2.4.2.5 Failure of verification in case 7.   In this case the CA has issued the signer's certificate protected   with the new key without updating the directory attributes. This   means that the verifier has no means to get a trustworthy version of   the CA's new key and so verification fails.   Note that the failure is again the CA operator's fault.2.4.3 Revocation - Change of CA key   As we saw above the verification of a certificate becomes more   complex once the CA is allowed to change its key. This is also true   for revocation checks as the CA may have signed the CRL using a newer   private key than the one that is within the user's PSE.   The analysis of the alternatives is as for certificate verification.3. Data Structures   This section contains descriptions of the data structures required   for PKI management messages. Section 4 describes constraints on their   values and the sequence of events for each of the various PKI   management operations. Section 5 describes how these may be   encapsulated in various transport mechanisms.3.1 Overall PKI Message   All of the messages used in this specification for the purposes of   PKI management use the following structure:     PKIMessage ::= SEQUENCE {         header           PKIHeader,         body             PKIBody,         protection   [0] PKIProtection OPTIONAL,         extraCerts   [1] SEQUENCE SIZE (1..MAX) OF Certificate OPTIONAL     }Adams & Farrell             Standards Track                    [Page 19]RFC 2510          PKI Certificate Management Protocols        March 1999   The PKIHeader contains information which is common to many PKI   messages.   The PKIBody contains message-specific information.   The PKIProtection, when used, contains bits that protect the PKI   message.   The extraCerts field can contain certificates that may be useful to   the recipient. For example, this can be used by a CA or RA to present   an end entity with certificates that it needs to verify its own new   certificate (if, for example, the CA that issued the end entity's   certificate is not a root CA for the end entity).  Note that this   field does not necessarily contain a certification path - the   recipient may have to sort, select from, or otherwise process the   extra certificates in order to use them.3.1.1 PKI Message Header   All PKI messages require some header information for addressing and   transaction identification. Some of this information will also be   present in a transport-specific envelope; however, if the PKI message   is protected then this information is also protected (i.e., we make   no assumption about secure transport).   The following data structure is used to contain this information:     PKIHeader ::= SEQUENCE {         pvno                INTEGER     { ietf-version2 (1) },         sender              GeneralName,         -- identifies the sender         recipient           GeneralName,         -- identifies the intended recipient         messageTime     [0] GeneralizedTime         OPTIONAL,         -- time of production of this message (used when sender         -- believes that the transport will be "suitable"; i.e.,         -- that the time will still be meaningful upon receipt)         protectionAlg   [1] AlgorithmIdentifier     OPTIONAL,         -- algorithm used for calculation of protection bits         senderKID       [2] KeyIdentifier           OPTIONAL,         recipKID        [3] KeyIdentifier           OPTIONAL,         -- to identify specific keys used for protection         transactionID   [4] OCTET STRING            OPTIONAL,         -- identifies the transaction; i.e., this will be the same in         -- corresponding request, response and confirmation messages         senderNonce     [5] OCTET STRING            OPTIONAL,         recipNonce      [6] OCTET STRING            OPTIONAL,         -- nonces used to provide replay protection, senderNonceAdams & Farrell             Standards Track                    [Page 20]RFC 2510          PKI Certificate Management Protocols        March 1999         -- is inserted by the creator of this message; recipNonce         -- is a nonce previously inserted in a related message by         -- the intended recipient of this message         freeText        [7] PKIFreeText             OPTIONAL,         -- this may be used to indicate context-specific instructions         -- (this field is intended for human consumption)         generalInfo     [8] SEQUENCE SIZE (1..MAX) OF                                InfoTypeAndValue     OPTIONAL         -- this may be used to convey context-specific information         -- (this field not primarily intended for human consumption)     }     PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String         -- text encoded as UTF-8 String (note:  each UTF8String SHOULD         -- include an RFC 1766 language tag to indicate the language         -- of the contained text)   The pvno field is fixed (at one) for this version of this   specification.   The sender field contains the name of the sender of the PKIMessage.   This name (in conjunction with senderKID, if supplied) should be   usable to verify the protection on the message.  If nothing about the   sender is known to the sending entity (e.g., in the init. req.   message, where the end entity may not know its own Distinguished Name   (DN), e-mail name, IP address, etc.), then the "sender" field MUST   contain a "NULL" value; that is, the SEQUENCE OF relative   distinguished names is of zero length. In such a case the senderKID   field MUST hold an identifier (i.e., a reference number) which   indicates to the receiver the appropriate shared secret information   to use to verify the message.   The recipient field contains the name of the recipient of the   PKIMessage. This name (in conjunction with recipKID, if supplied)   should be usable to verify the protection on the message.   The protectionAlg field specifies the algorithm used to protect the   message. If no protection bits are supplied (note that PKIProtection   is OPTIONAL) then this field MUST be omitted; if protection bits are   supplied then this field MUST be supplied.   senderKID and recipKID are usable to indicate which keys have been   used to protect the message (recipKID will normally only be required   where protection of the message uses Diffie-Hellman (DH) keys).Adams & Farrell             Standards Track                    [Page 21]RFC 2510          PKI Certificate Management Protocols        March 1999   The transactionID field within the message header MAY be used to   allow the recipient of a response message to correlate this with a   previously issued request. For example, in the case of an RA there   may be many requests "outstanding" at a given moment.   The senderNonce and recipNonce fields protect the PKIMessage against   replay attacks.   The messageTime field contains the time at which the sender created   the message. This may be useful to allow end entities to correct   their local time to be consistent with the time on a central system.   The freeText field may be used to send a human-readable message to   the recipient (in any number of languages).  The first language used   in this sequence indicates the desired language for replies.   The generalInfo field may be used to send machine-processable   additional data to the recipient.3.1.2 PKI Message Body     PKIBody ::= CHOICE {       -- message-specific body elements         ir      [0]  CertReqMessages,        --Initialization Request         ip      [1]  CertRepMessage,         --Initialization Response         cr      [2]  CertReqMessages,        --Certification Request         cp      [3]  CertRepMessage,         --Certification Response         p10cr   [4]  CertificationRequest,   --PKCS #10 Cert. Req.           -- the PKCS #10 certification request (see [PKCS10])         popdecc [5]  POPODecKeyChallContent, --pop Challenge         popdecr [6]  POPODecKeyRespContent,  --pop Response         kur     [7]  CertReqMessages,        --Key Update Request         kup     [8]  CertRepMessage,         --Key Update Response         krr     [9]  CertReqMessages,        --Key Recovery Request         krp     [10] KeyRecRepContent,       --Key Recovery Response         rr      [11] RevReqContent,          --Revocation Request         rp      [12] RevRepContent,          --Revocation Response         ccr     [13] CertReqMessages,        --Cross-Cert. Request         ccp     [14] CertRepMessage,         --Cross-Cert. Response         ckuann  [15] CAKeyUpdAnnContent,     --CA Key Update Ann.         cann    [16] CertAnnContent,         --Certificate Ann.         rann    [17] RevAnnContent,          --Revocation Ann.         crlann  [18] CRLAnnContent,          --CRL Announcement         conf    [19] PKIConfirmContent,      --Confirmation         nested  [20] NestedMessageContent,   --Nested Message         genm    [21] GenMsgContent,          --General Message         genp    [22] GenRepContent,          --General Response         error   [23] ErrorMsgContent         --Error Message     }Adams & Farrell             Standards Track                    [Page 22]RFC 2510          PKI Certificate Management Protocols        March 1999   The specific types are described in Section 3.3 below.3.1.3 PKI Message Protection   Some PKI messages will be protected for integrity. (Note that if an   asymmetric algorithm is used to protect a message and the relevant   public component has been certified already, then the origin of   message can also be authenticated.  On the other hand, if the public   component is uncertified then the message origin cannot be   automatically authenticated, but may be authenticated via out-of-band

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产成人精品亚洲日本在线桃色| 色综合久久66| 日韩欧美中文字幕公布| 麻豆中文一区二区| 一区二区三区四区高清精品免费观看 | 欧美午夜影院一区| 国产mv日韩mv欧美| 免播放器亚洲一区| 久久精品国产亚洲aⅴ| 一区二区三区在线影院| 日韩毛片高清在线播放| 中文字幕中文字幕一区| 亚洲人成亚洲人成在线观看图片| 亚洲精品一区二区三区影院| 欧美电影免费观看高清完整版| 欧美日韩一区二区三区高清| 在线视频一区二区免费| 欧美日韩高清一区二区不卡| 日韩欧美亚洲另类制服综合在线| 91精品国产黑色紧身裤美女| 久久久久久久久久久黄色| 久久综合久久99| 成人欧美一区二区三区视频网页 | 日韩一区二区在线观看视频播放| 欧美日韩一区二区三区四区| 日韩精品一区二区三区在线播放 | 日韩中文字幕区一区有砖一区 | 日韩电影网1区2区| 亚洲国产欧美一区二区三区丁香婷| 偷拍一区二区三区| 韩国成人福利片在线播放| 国产呦精品一区二区三区网站| 国产精品一区二区在线看| 91在线视频免费91| 日韩亚洲欧美综合| 国产精品国产三级国产普通话蜜臀 | 午夜视黄欧洲亚洲| 久久国产成人午夜av影院| 不卡的av电影在线观看| 欧洲精品一区二区三区在线观看| 欧美va亚洲va在线观看蝴蝶网| 欧美激情在线一区二区三区| 日韩有码一区二区三区| 99久久99久久久精品齐齐| 欧美一级高清片| 国产精品美女久久久久久2018| 天天综合网天天综合色| 国产精品综合av一区二区国产馆| 欧美性色黄大片手机版| 中文字幕精品三区| 青草av.久久免费一区| 91婷婷韩国欧美一区二区| 日韩欧美精品在线| 国模少妇一区二区三区| 欧美日韩一本到| 亚洲欧洲另类国产综合| 国产一区二区在线视频| 在线视频国内自拍亚洲视频| 国产精品久久午夜| 国产在线不卡视频| 日韩一区和二区| 日本va欧美va瓶| 欧美日韩国产一二三| 中文字幕中文乱码欧美一区二区| 国产美女在线观看一区| 日韩一区二区三区免费看| 亚洲国产精品天堂| 色94色欧美sute亚洲线路一ni| 国产视频一区不卡| 麻豆成人免费电影| 日韩欧美一级在线播放| 奇米在线7777在线精品| 精品污污网站免费看| 一区二区三区四区在线| 99久久精品国产一区二区三区 | 亚洲女性喷水在线观看一区| 成人app在线观看| 欧美韩日一区二区三区四区| 粉嫩绯色av一区二区在线观看 | 午夜精品影院在线观看| 欧美色视频一区| 丝袜脚交一区二区| 欧美美女激情18p| 男女男精品视频网| 欧美成人女星排行榜| 久久99国产精品久久| 日韩欧美在线综合网| 精品一区二区在线免费观看| 久久久综合网站| 不卡一区在线观看| 亚洲免费av高清| 欧美区视频在线观看| 六月丁香婷婷久久| 久久综合色婷婷| 97精品久久久午夜一区二区三区 | 6080国产精品一区二区| 美女网站一区二区| 久久久精品综合| 91在线精品一区二区| 亚洲精品福利视频网站| 欧美精三区欧美精三区| 亚洲一区欧美一区| 欧美日韩第一区日日骚| 久久精品久久精品| 国产精品欧美综合在线| 在线视频你懂得一区二区三区| 日本大胆欧美人术艺术动态| 国产日韩av一区| 欧美日韩激情一区二区| 麻豆一区二区99久久久久| 国产精品无圣光一区二区| 精品视频123区在线观看| 国内精品国产三级国产a久久| 欧美激情综合在线| 欧美精品一级二级| 国产精品88av| 午夜成人免费视频| 中文字幕电影一区| 欧美精品日韩精品| 成人午夜在线免费| 日本欧美一区二区| 成人免费一区二区三区视频| 精品日产卡一卡二卡麻豆| 色av一区二区| 成人av在线观| 极品少妇一区二区| 水野朝阳av一区二区三区| 日本一区二区高清| 日韩欧美一级二级三级久久久| 91国偷自产一区二区三区成为亚洲经典 | 免费观看成人鲁鲁鲁鲁鲁视频| 国产精品国产三级国产普通话99| 日韩一区二区三区精品视频| 欧美在线视频日韩| 成人免费黄色在线| 国产一区二区91| 免播放器亚洲一区| 亚洲国产欧美一区二区三区丁香婷| 国产精品国产成人国产三级| 精品av综合导航| 3atv一区二区三区| 欧美日韩久久久一区| 色婷婷亚洲婷婷| 91毛片在线观看| 成人免费毛片aaaaa**| 国产一区二区久久| 国产自产v一区二区三区c| 热久久免费视频| 日日欢夜夜爽一区| 亚洲aaa精品| 石原莉奈在线亚洲二区| 亚洲电影你懂得| 天使萌一区二区三区免费观看| 一级中文字幕一区二区| 亚洲最色的网站| 性感美女极品91精品| 亚洲国产一区在线观看| 亚洲第一主播视频| 日韩精品一二三| 免费观看在线色综合| 九九**精品视频免费播放| 狠狠v欧美v日韩v亚洲ⅴ| 精品一区在线看| 成人夜色视频网站在线观看| 成人app在线| 欧美亚洲国产一区二区三区va| 欧美色视频在线观看| 91麻豆精品国产91久久久| 日韩欧美国产综合在线一区二区三区| 欧美变态凌虐bdsm| 国产三级一区二区| 中文字幕在线播放不卡一区| 亚洲午夜一区二区三区| 男女男精品视频网| 国产福利视频一区二区三区| 97se亚洲国产综合在线| 欧美日韩亚洲综合在线| 日韩免费观看高清完整版| 国产亚洲一区二区三区四区 | 色综合久久天天综合网| 欧美中文字幕亚洲一区二区va在线 | 91精品午夜视频| 久久综合久久综合久久综合| 亚洲三级在线免费观看| 婷婷一区二区三区| 国产乱理伦片在线观看夜一区| 91片黄在线观看| 日韩欧美中文一区| 中文字幕在线不卡视频| 日本怡春院一区二区| 成人丝袜高跟foot| 欧美色综合网站| 国产日韩欧美在线一区| 亚洲一区二区三区视频在线播放| 国产制服丝袜一区| 色琪琪一区二区三区亚洲区| 久久久蜜桃精品| 日韩av一区二区在线影视| 国产 日韩 欧美大片| 欧美男女性生活在线直播观看|