亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2528.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Network Working Group                                        R. HousleyRequest for Comments: 2528                                       SPYRUSCategory: Informational                                         W. Polk                                                                   NIST                                                             March 1999                Internet X.509 Public Key Infrastructure         Representation of Key Exchange Algorithm (KEA) Keys in         Internet X.509 Public Key Infrastructure CertificatesStatus of this Memo   This memo provides information for the Internet community.  It does   not specify an Internet standard of any kind.  Distribution of this   memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Table of Contents   Abstract ........................................................ 2   1.  Executive Summary ........................................... 2   2.  Requirements and Assumptions ................................ 2   2.1.  Communication and Topology ................................ 2   2.2.  Acceptability Criteria .................................... 2   2.3.  User Expectations ......................................... 3   2.4.  Administrator Expectations ................................ 3   3.  KEA Algorithm Support ....................................... 3   3.1.  Subject Public Key Info ................................... 3   3.1.1.  Algorithm Identifier and Parameters ..................... 4   3.1.2.  Encoding of KEA Public Keys ............................. 5   3.2.  Key Usage Extension in KEA certificates ................... 5   4. ASN.1 Modules ................................................ 5   4.1 1988 Syntax ................................................. 5   4.2 1993 Syntax ................................................. 6   5. References ................................................... 6   6. Security Considerations ...................................... 7   7. Authors' Addresses ........................................... 8   8. Full Copyright Statement ..................................... 9Housley & Polk               Informational                      [Page 1]RFC 2528                        PKIX KEA                      March 1999Abstract   The Key Exchange Algorithm (KEA) is a classified algorithm for   exchanging keys.  This specification profiles the format and   semantics of fields in X.509 V3 certificates containing KEA keys. The   specification addresses the subjectPublicKeyInfo field and the   keyUsage extension.1.  Executive Summary   This specification contains guidance on the use of the Internet   Public Key Infrastructure certificates to convey Key Exchange   Algorithm (KEA) keys. This specification is an addendum to RFC 2459,   "Internet X.509 Public Key Infrastructure: Certificate and CRL   Profile".  Implementations of this specification must also conform to   RFC 2459.  Implementations of this specification are not required to   conform to other parts from that series.2.  Requirements and Assumptions   The goal is to augment the X.509 certificate profile presented in   Part 1 to facilitate the management of KEA keys for those communities   which use this algorithm.2.1.  Communication and Topology   This profile, as presented in [RFC 2459] and augmented by this   specification, supports users without high bandwidth, real-time IP   connectivity, or high connection availability.  In addition, the   profile allows for the presence of firewall or other filtered   communication.   This profile does not assume the deployment of an X.500 Directory   system.  The profile does not prohibit the use of an X.500 Directory,   but other means of distributing certificates and certificate   revocation lists (CRLs) are supported.2.2.  Acceptability Criteria   The goal of the Internet Public Key Infrastructure (PKI) is to meet   the needs of deterministic, automated identification, authentication,   access control, and authorization functions. Support for these   services determines the attributes contained in the certificate as   well as the ancillary control information in the certificate such as   policy data and certification path constraints.Housley & Polk               Informational                      [Page 2]RFC 2528                        PKIX KEA                      March 1999   The goal of this document is to profile KEA certificates, specifying   the contents and semantics of attributes which were not fully   specified by [RFC 2459].  If not specifically addressed by this   document, the contents and semantics of the fields and extensions   must be as described in [RFC 2459].2.3.  User Expectations   Users of the Internet PKI are people and processes who use client   software and are the subjects named in certificates.  These uses   include readers and writers of electronic mail, the clients for WWW   browsers, WWW servers, and the key manager for IPSEC within a router.   This profile recognizes the limitations of the platforms these users   employ and the sophistication/attentiveness of the users themselves.   This manifests itself in minimal user configuration responsibility   (e.g., root keys, rules), explicit platform usage constraints within   the certificate, certification path constraints which shield the user   from many malicious actions, and applications which sensibly automate   validation functions.2.4.  Administrator Expectations   As with users, the Internet PKI profile is structured to support the   individuals who generally operate Certification Authorities (CAs).   Providing administrators with unbounded choices increases the chances   that a subtle CA administrator mistake will result in broad   compromise or unnecessarily limit interoperability.  This profile   defines the object identifiers and data formats that must be   supported to interpret KEA public keys.3.  KEA Algorithm Support   This section describes object identifiers and data formats which may   be used with [RFC 2459] to describe X.509 certificates containing a   KEA public key.  Conforming CAs are required to use the object   identifiers and data formats when issuing KEA certificates.   Conforming applications shall recognize the object identifiers and   process the data formats when processing such certificates.3.1.  Subject Public Key Info   The certificate identifies the KEA algorithm, conveys optional   parameters, and specifies the KEA public key in the   subjectPublicKeyInfo field. The subjectPublicKeyInfo field is a   SEQUENCE of an algorithm identifier and the subjectPublicKey field.Housley & Polk               Informational                      [Page 3]RFC 2528                        PKIX KEA                      March 1999   The certificate indicates the algorithm through an algorithm   identifier.  This algorithm identifier consists of an object   identifier (OID) and optional associated parameters.  Section 3.1.1   identifies the preferred OID and parameters for the KEA algorithm.   Conforming CAs shall use the identified OID when issuing certificates   containing public keys for the KEA algorithm. Conforming applications   supporting the KEA algorithm shall, at a minimum, recognize the OID   identified in section 3.1.1.   The certificate conveys the KEA public key through the   subjectPublicKey field.  This subjectPublicKey field is a BIT STRING.   Section 3.1.2 specifies the method for encoding a KEA public key as a   BIT STRING.  Conforming CAs shall encode the KEA public key as   described in Section 3.1.2 when issuing certificates containing   public keys for the KEA algorithm. Conforming applications supporting   the KEA algorithm shall decode the subjectPublicKey as described in   section 3.1.2 when the algorithm identifier is the one presented in   3.1.1.3.1.1.  Algorithm Identifier and Parameters   The Key Exchange Algorithm (KEA) is an algorithm for exchanging keys.   A KEA "pairwise key" may be generated between two users if their KEA   public keys were generated with the same KEA parameters.  The KEA   parameters are not included in a certificate; instead a "domain   identifier" is supplied in the parameters field.   When the subjectPublicKeyInfo field contains a KEA key, the algorithm   identifier and parameters shall be as defined in [sdn.701r]:      id-keyExchangeAlgorithm  OBJECT IDENTIFIER   ::=             { 2 16 840 1 101 2 1 1 22 }      KEA-Parms-Id     ::= OCTET STRING   CAs shall populate the parameters field of the AlgorithmIdentifier   within the subjectPublicKeyInfo field of each certificate containing   a KEA public key with an 80-bit parameter identifier (OCTET STRING),   also known as the domain identifier. The domain identifier will be   computed in three steps: (1) the KEA parameters are DER encoded using   the Dss-Parms structure; (2) a 160-bit SHA-1 hash is generated from   the parameters; and (3) the 160-bit hash is reduced to 80-bits by   performing an "exclusive or" of the 80 high order bits with the 80   low order bits.  The resulting value is encoded such that the most   significant byte of the 80-bit value is the first octet in the octet   string.Housley & Polk               Informational                      [Page 4]RFC 2528                        PKIX KEA                      March 1999   The Dss-Parms is provided in [RFC 2459] and reproduced below for   completeness.        Dss-Parms  ::=  SEQUENCE  {            p             INTEGER,            q             INTEGER,            g             INTEGER  }3.1.2.  Encoding of KEA Public Keys   A KEA public key, y, is conveyed in the subjectPublicKey BIT STRING   such that the most significant bit (MSB) of y becomes the MSB of the   BIT STRING value field and the least significant bit (LSB) of y   becomes the LSB of the BIT STRING value field.  This results in the   following encoding: BIT STRING tag, BIT STRING length, 0 (indicating   that there are zero unused bits in the final octet of y), BIT STRING   value field including y.3.2.  Key Usage Extension in KEA certificates   The key usage extension may optionally appear in a KEA certificate.   If a KEA certificate includes the keyUsage extension, only the   following values may be asserted:

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久精品综合网| 精品国产欧美一区二区| 成人污污视频在线观看| 精品一区二区三区久久| 久久国产精品色| 精品午夜久久福利影院| 国产专区综合网| 国产成人在线影院| 粉嫩高潮美女一区二区三区| 国产精品123区| 99久久伊人久久99| 在线免费观看视频一区| 欧美日韩一级二级| 在线不卡中文字幕播放| 精品免费国产一区二区三区四区| 日韩三级中文字幕| 久久久九九九九| 亚洲欧美另类在线| 天天av天天翘天天综合网| 免费的国产精品| 国产91精品一区二区麻豆亚洲| 成人毛片视频在线观看| 欧美在线制服丝袜| 日韩欧美一区二区视频| 国产精品嫩草99a| 一区二区三区精品在线观看| 视频一区二区中文字幕| 国产馆精品极品| 91高清视频在线| 欧美刺激午夜性久久久久久久| 日本一区二区三区视频视频| 亚洲福利视频一区| 国产一区二区三区免费在线观看| 不卡的av中国片| 69久久99精品久久久久婷婷 | 成人h版在线观看| 精品视频一区 二区 三区| 26uuu国产在线精品一区二区| 国产精品久久久久久户外露出| 亚洲一区二区美女| 国产99精品在线观看| 欧美日韩免费一区二区三区 | 久久久久国产精品人| 亚洲一区二区三区精品在线| 国产高清不卡一区二区| 欧美高清你懂得| 18欧美乱大交hd1984| 精品一区二区三区蜜桃| 欧美三级在线播放| 成人免费小视频| 国产精品一区三区| 欧美电影精品一区二区| 亚洲一区二区三区影院| 成人高清在线视频| www一区二区| 奇米影视7777精品一区二区| 在线视频综合导航| 亚洲视频在线一区观看| 成人伦理片在线| 中文字幕久久午夜不卡| 国产美女娇喘av呻吟久久| 在线不卡a资源高清| 亚洲图片自拍偷拍| 欧美天天综合网| 亚洲精品免费一二三区| 91视频精品在这里| 亚洲免费三区一区二区| 99久久精品国产麻豆演员表| 中国av一区二区三区| 粉嫩av一区二区三区在线播放| 精品国产一区二区在线观看| 久久精品久久99精品久久| 欧美一区二区三区色| 日韩电影网1区2区| 日韩视频一区二区三区| 美女视频网站久久| 日韩视频在线观看一区二区| 另类成人小视频在线| 欧美精品一区二区三区很污很色的 | 亚洲激情图片一区| 在线观看视频一区二区欧美日韩| 综合电影一区二区三区| 色婷婷久久久久swag精品| 综合av第一页| 欧美在线观看视频一区二区三区 | 精品亚洲国产成人av制服丝袜| 日韩免费观看高清完整版在线观看| 日韩电影在线一区二区| 欧美刺激午夜性久久久久久久| 免费观看30秒视频久久| 国产婷婷色一区二区三区四区| 国产九色精品成人porny| 欧美极品少妇xxxxⅹ高跟鞋 | 色婷婷久久久久swag精品 | 国产精品妹子av| 91女厕偷拍女厕偷拍高清| 亚洲一区二区三区视频在线播放 | 国产精品久99| 欧美综合视频在线观看| 麻豆精品视频在线观看免费| 国产亚洲一本大道中文在线| 一本色道**综合亚洲精品蜜桃冫| 亚洲国产精品久久久久秋霞影院| 欧美一卡二卡三卡四卡| 成人精品视频网站| 天天综合色天天| 中文字幕不卡在线观看| 欧美丰满美乳xxx高潮www| 懂色av中文字幕一区二区三区| 一区二区三区高清在线| 精品国产1区二区| 色素色在线综合| 国产一二精品视频| 午夜私人影院久久久久| 国产亚洲自拍一区| 3atv一区二区三区| 成人动漫一区二区在线| 久久精品国产亚洲高清剧情介绍 | 蜜桃av一区二区在线观看| 国产精品传媒入口麻豆| 欧美一区二区私人影院日本| 91色porny蝌蚪| 国产精品一二三四| 午夜精品在线视频一区| 中文字幕一区二区视频| 精品国产一区久久| 制服丝袜国产精品| 欧美在线|欧美| av午夜精品一区二区三区| 韩国在线一区二区| 青青草国产精品97视觉盛宴| 亚洲欧美日韩在线不卡| 中文字幕久久午夜不卡| 久久欧美一区二区| 欧美sm美女调教| 91精品国产一区二区三区蜜臀| 91美女精品福利| 99视频在线观看一区三区| 国产精品一线二线三线精华| 免费在线观看成人| 日韩专区欧美专区| 五月激情综合色| 午夜成人在线视频| 亚洲成人精品影院| 亚洲最大色网站| 国产一区二区三区免费观看| 日本视频一区二区| 人人狠狠综合久久亚洲| 日精品一区二区三区| 天天av天天翘天天综合网色鬼国产 | 国产成a人无v码亚洲福利| 久99久精品视频免费观看| 免费成人小视频| 久久99精品久久久| 国产酒店精品激情| 成人午夜激情视频| 成人av在线看| 91视频国产资源| 欧美色图12p| 欧美美女bb生活片| 日韩欧美色电影| 国产网站一区二区三区| 日本一区二区三区四区| 成人免费一区二区三区视频 | 欧美久久久久中文字幕| 欧美日韩国产精品成人| 日韩视频免费观看高清完整版| 欧美白人最猛性xxxxx69交| 久久天天做天天爱综合色| 国产嫩草影院久久久久| 国产精品久久久久9999吃药| 樱花草国产18久久久久| 亚洲国产精品精华液网站| 美国十次综合导航| 成人免费毛片app| 91行情网站电视在线观看高清版| 欧美久久一二三四区| 国产日韩欧美精品综合| 一区二区三区精品在线观看| 人人爽香蕉精品| 成人性视频免费网站| 在线观看国产91| 欧美精品一区二区在线观看| 国产精品国模大尺度视频| 日韩精品国产精品| 丁香五精品蜜臀久久久久99网站| 91丨九色丨国产丨porny| 91精品国产手机| 国产精品乱人伦| 蜜桃视频第一区免费观看| 成人一区二区三区在线观看| 在线播放国产精品二区一二区四区 | 午夜电影网一区| 国产精品亚洲人在线观看| 色噜噜偷拍精品综合在线| 久久综合一区二区| 午夜国产精品一区| 99久久精品情趣| 26uuu国产一区二区三区| 亚洲大片免费看|