亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-scvp-11.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   The unsigned request consists of a certValRequest encapsulated in a   ContentInfo.  An overview of this structure is provided below.  Many   details are not shown, but the way that SCVP makes use of CMS is   clearly illustrated.      ContentInfo {        contentType        id-ct-scvp-certValRequest,                                    -- (1.2.840.113549.1.9.16.1.10)        content            CVRequest }   The signed request consists of a certValRequest encapsulated in a   SignedData which is in turn encapsulated in a ContentInfo.  An   overview of this structure is provided below. Again, many details are   not shown, but the way that SCVP makes use of CMS is clearly   illustrated.      ContentInfo {        contentType        id-signedData, -- (1.2.840.113549.1.7.2)        content            SignedData }      SignedData {        version            CMSVersion,        digestAlgorithms   DigestAlgorithmIdentifiers,        encapContentInfo   EncapsulatedContentInfo,        certificates       CertificateSet, -- (Optional)        crls               CertificateRevocationLists, -- (Optional)        signerInfos        SET OF SignerInfos } -- (only one in SCVP)      SignerInfo {        version            CMSVersion,        sid                SignerIdentifier,        digestAlgorithm    DigestAlgorithmIdentifier,        signedAttrs        SignedAttributes, -- (Required)        signatureAlgorithm SignatureAlgorithmIdentifier,        signature          SignatureValue,        unsignedAttrs      UnsignedAttributes } -- (not used in SCVP)      EncapsulatedContentInfo {        eContentType       id-ct-scvp-certValRequest,                                    -- (1.2.840.113549.1.9.16.1.10)        eContent           OCTET STRING } -- Contains CVRequest   The syntaxes for SignedData and ContentInfo are defined in [CMS]. The   syntax for CVRequest is defined below. The CVRequest item contains   the client request. The CVRequest item contains the scvpVersion and   query items; and the CVRequest item MAY also contain the requestor,   requestNonce, and reqExtensions items.Malpani, Housley, & Freeman                                     [Page 7]INTERNET DRAFT                    SCVP                     December 2002   The CVRequest MUST have the following syntax:      CVRequest ::= SEQUENCE {        scvpVersion           INTEGER,        query                 Query,        requestor         [0] OCTET STRING OPTIONAL,        requestNonce      [1] OCTET STRING OPTIONAL,        reqExtensions     [2] Extensions OPTIONAL }   Each of the items within the CVRequest are described in the following   sections.3.1 scvpVersion   The scvpVersion item tells the version of SCVP used in a request or a   response. The value of the scvpVersion item MUST be one (1). Future   updates to this specification ought to specify other integer values.3.2 query   The query specifies one or more certificates that are the object of   the request; the certificates can be either public key certificates   [PKIX-1] or attribute certificates [PKIX-AC]. A query MUST contain a   sequence of one or more certificate references, checks, and wantBack   items; and a query MAY also contain valPolicy, validityTime,   trustAnchors, intermediateCerts, revInfos, and queryExtensions items.   Query MUST have the following syntax:      Query ::= SEQUENCE {        queriedCerts          SEQUENCE SIZE (1..MAX) OF CertReference,        checks                CertChecks,        wantBack              WantBack,        serverContextInfo [0] OCTET STRING OPTIONAL,        valPolicy         [1] ValidationPolicy OPTIONAL,        validityTime      [2] GeneralizedTime OPTIONAL,        trustAnchors      [3] TrustAnchors OPTIONAL,        intermediateCerts [4] CertBundle OPTIONAL,        revInfos          [5] RevocationInfos OPTIONAL,        queryExtensions   [6] Extensions OPTIONAL }   The list of certificate references in the Query item tells the server   the certificate(s) for which the client wants information. The   OPTIONAL serverContextInfo item tells the server that additional   information from a previous request-response in desired. The OPTIONAL   validityTime item tells the date and time relative to which the   client wants the server to perform the checks. The OPTIONAL   valPolicy, trustAnchors, intermediateCerts, and revInfos itemsMalpani, Housley, & Freeman                                     [Page 8]INTERNET DRAFT                    SCVP                     December 2002   provide context for the client request. The OPTIONAL queryExtensions   item provides for future expansion of the query syntax.3.2.1 queriedCerts   The queriedCerts item, using the CertReference type, identifies the   certificate that is the object of the request. The certificate is   either a public key certificate or an attribute certificate. The   certificate is either directly included or it is referenced. When   referenced, a SHA-1 hash value of the referenced item is included to   ensure that the SCVP client and the SCVP server both obtain the same   certificate when the referenced certificate is fetched. Certificate   references use the ESSCertID type defined in [ESS]. CertReference has   the following syntax:      CertReference ::= CHOICE {        pkc                   PKCReference,        ac                    ACReference }      PKCReference ::= CHOICE {        cert              [1] Certificate,        pkcRef            [2] ESSCertID }      ACReference ::= CHOICE {        attrCert          [3] AttributeCertificate,        acRef             [4] ESSCertID }   The ASN.1 definition of Certificate is imported from [PKIX-1]; the   definition of AttributeCertificate is imported from [PKIX-AC]; and   the definition of ESSCertID is imported from [ESS].3.2.2 checks   The checks item describes the checking that the SCVP client wants the   SCVP server to perform on the certificate(s) in the queriedCerts   item. The checks item MUST contain a sequence of object identifiers.   Each object identifier tells the SCVP server what checking the client   expects the server to perform. For each check specified in the   request, the SCVP server MUST perform all of the requested checks, or   return an error.   Revocation status checking inherently includes path construction.   Also, building a validated certification path does not imply   revocation status checks (although a server may still choose to   perform revocation status checks).Malpani, Housley, & Freeman                                     [Page 9]INTERNET DRAFT                    SCVP                     December 2002   The checks item uses the CertChecks type, which has the following   syntax:      CertChecks ::= SEQUENCE SIZE (1..MAX) OF OBJECT IDENTIFIER   A list of object identifiers (OIDs) indicates the checking that the   client wants the SCVP server to perform on the certificate(s) in the   queriedCerts item.   For public key certificates, OIDs are defined for the following   checks:      - Build a certification path to a trusted root;      - Build a validated certification path to a trusted root; and      - Do revocation status checks on the certification path.   For attribute certificates, OIDs are defined for the following   checks:      - Build a certification path to a trusted root for the AC issuer;      - Build a validated certification path to a trusted root for the        AC issuer;      - Do revocation status checks on the certification path for the        AC issuer; and      - Do revocation status checks on the AC as well as the        certification path for the AC issuer.   For these purposes, the following OIDs are defined:      id-stc OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)               dod(6) internet(1) security(5) mechanisms(5) pkix(7) 17 }      id-stc-build-pkc-path        OBJECT IDENTIFIER ::= { id-stc 1 }      id-stc-build-valid-pkc-path  OBJECT IDENTIFIER ::= { id-stc 2 }      id-stc-build-status-checked-pkc-path                                   OBJECT IDENTIFIER ::= { id-stc 3 }      id-stc-build-aa-path         OBJECT IDENTIFIER ::= { id-stc 4 }      id-stc-build-valid-aa-path   OBJECT IDENTIFIER ::= { id-stc 5 }      id-stc-build-status-checked-aa-path                                   OBJECT IDENTIFIER ::= { id-stc 6 }      id-stc-status-check-ac-and-build-status-checked-aa-path                                   OBJECT IDENTIFIER ::= { id-stc 7 }Malpani, Housley, & Freeman                                    [Page 10]INTERNET DRAFT                    SCVP                     December 20023.2.3 wantBack   The wantBack item describes the kind of information the SCVP client   wants from the SCVP server for the certificate(s) in the queriedCerts   item. The wantBack item MUST contain a sequence of object   identifiers. Each object identifier tells the SCVP server what the   client wants to know about the queriedCerts item. For each type of   information specified in the request, the server MUST return   information regarding its finding (in a successful response).   For example, a request might include a checks item that only   specifies certification path building and include a wantBack item   that requests the return of the certification path built by the   server. In this case, the response would not include a status for the   validation of the certification path, but it would include a   certification path that the server considers to be valid. A client   that wants to perform its own certification path validation might use   a request of this form.   Alternatively, a request might include a checks item that requests   the server to build a certification path and validate it, including   revocation checking, and include a wantBack item that requests the   return of the status. In this case, the response would include only a   status for the validation of the certification path. A client that   completely delegates certification path validation might use a   request of this form.   The wantBack item uses the WantBack type, which has the following   syntax:      WantBack ::= SEQUENCE SIZE (1..MAX) OF OBJECT IDENTIFIER   For public key certificates, the types of information that can be   requested are:      - Certification path built for the certificate;      - Proof of revocation status for each certificate in the        certification path;      - Status indication; and      - Public key from the certificate.Malpani, Housley, & Freeman                                    [Page 11]INTERNET DRAFT                    SCVP                     December 2002   For attribute certificates, the types of information that can be   requested are:      - Certification path built for the AC issuer certificate;      - Proof of revocation status for each certificate in the AC issuer        certification path;      - Proof of revocation status for the attribute certificate; and      - Status indication.   For these purposes, the following OIDs are defined:      id-swb OBJECT IDENTIFIER ::= { id-pkix 18 }  -- SCVP want back      id-swb-pkc-cert-path         OBJECT IDENTIFIER ::= { id-swb 1 }      id-swb-pkc-revocation-info   OBJECT IDENTIFIER ::= { id-swb 2 }      id-swb-pkc-cert-status       OBJECT IDENTIFIER ::= { id-swb 3 }      id-swb-pkc-public-key-info   OBJECT IDENTIFIER ::= { id-swb 4 }      id-swb-aa-cert-path          OBJECT IDENTIFIER ::= { id-swb 5 }      id-swb-aa-revocation-info    OBJECT IDENTIFIER ::= { id-swb 6 }      id-swb-ac-revocation-info    OBJECT IDENTIFIER ::= { id-swb 7 }      id-swb-ac-cert-status        OBJECT IDENTIFIER ::= { id-swb 8 }3.2.4 serverContextInfo   The serverContextInfo item, if present, contains context from a   previous request-response transaction with the same SCVP server. It   allows the server to return more than one certification path for the   same certificate to the client. For example, if a server constructs a   particular certification path for a certificate, but the client finds   it unacceptable, the client can then send the same query back to the   server with the serverContextInfo from the first response, and the   server will be able to provide a different certification path (if   another one can be found).   Contents of the serverContextInfo are opaque to the SCVP client. That   is, the client only knows that it needs to return the value provided   by the server with the subsequent request to get a different   certification path. Note that the subsequent query needs be   essentially identical to the previous query. The client MUST NOTMalpani, Housley, & Freeman                                    [Page 12]INTERNET DRAFT                    SCVP                     December 2002

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本韩国欧美国产| 亚洲精品一区在线观看| 欧美日韩国产高清一区二区三区| 日韩区在线观看| 亚洲激情自拍视频| 国产99精品在线观看| 日韩欧美亚洲国产精品字幕久久久| 国产精品乱码久久久久久| 麻豆久久久久久| 在线观看网站黄不卡| 国产精品久久久久久妇女6080| 精品一区二区在线视频| 欧美体内she精视频| 中文字幕中文在线不卡住| 黄色成人免费在线| 91精品免费在线| 亚洲成a人片综合在线| 色呦呦日韩精品| 中文字幕av在线一区二区三区| 精品无人码麻豆乱码1区2区| 91精品国产91久久久久久一区二区| 亚洲免费av在线| 91在线观看美女| 专区另类欧美日韩| av一区二区三区在线| 国产精品午夜在线| 国产成人综合视频| 日本一区免费视频| 国产高清不卡二三区| 久久久久国产精品麻豆ai换脸| 美女诱惑一区二区| 日韩精品中文字幕一区二区三区| 日韩和欧美一区二区三区| 欧美男男青年gay1069videost | 日韩一级高清毛片| 日韩**一区毛片| 日韩一二三区不卡| 久久99精品国产麻豆婷婷洗澡| 精品裸体舞一区二区三区| 国产又黄又大久久| 国产日韩欧美不卡| 99re8在线精品视频免费播放| 亚洲色图欧洲色图| 欧美三级欧美一级| 麻豆精品久久精品色综合| 欧美r级电影在线观看| 国产一区二区成人久久免费影院| 国产喷白浆一区二区三区| 成人av网址在线| 夜色激情一区二区| 欧美一区二区观看视频| 国产一区二区视频在线| 国产精品入口麻豆原神| 色婷婷亚洲婷婷| 蜜桃传媒麻豆第一区在线观看| 精品国产91九色蝌蚪| 成人一区二区三区视频| 一区二区三区日韩欧美| 日韩一级视频免费观看在线| 国产成人小视频| 亚洲精品视频观看| 日韩美女一区二区三区| 成人av一区二区三区| 99re热视频这里只精品| 欧美国产成人在线| 99re热视频这里只精品| 五月天亚洲精品| 久久久蜜臀国产一区二区| 色综合天天视频在线观看 | 亚洲婷婷在线视频| 欧美日韩一区高清| 国产久卡久卡久卡久卡视频精品| 亚洲三级免费电影| 欧美mv和日韩mv的网站| 99精品国产热久久91蜜凸| 蜜臀av在线播放一区二区三区| 国产精品国产馆在线真实露脸| 欧美三级韩国三级日本一级| 国产成人av电影| 秋霞午夜av一区二区三区| 国产精品福利一区| 欧美草草影院在线视频| 欧美性猛片aaaaaaa做受| 国产精品一区二区在线观看网站| 亚洲国产美女搞黄色| 中文欧美字幕免费| 欧美成人bangbros| 欧美日韩亚洲丝袜制服| 成人免费视频一区| 精品一区二区三区香蕉蜜桃 | 欧美高清在线一区二区| 91精品在线麻豆| 91成人免费电影| 成人小视频在线观看| 久久疯狂做爰流白浆xx| 亚洲成人先锋电影| 亚洲激情av在线| 国产精品电影一区二区| 国产欧美日韩视频在线观看| 337p日本欧洲亚洲大胆色噜噜| 欧美日韩国产不卡| 欧美日本在线看| 欧美写真视频网站| 欧美伊人久久久久久午夜久久久久| 国产成人免费视频一区| 久久er精品视频| 免费一级欧美片在线观看| 无码av中文一区二区三区桃花岛| 日韩一区欧美小说| 亚洲欧美影音先锋| 亚洲视频中文字幕| 亚洲精品国产a| 亚洲视频狠狠干| 亚洲精品免费一二三区| 亚洲日韩欧美一区二区在线| ...xxx性欧美| 亚洲欧美日韩久久精品| 亚洲视频精选在线| 亚洲一区二区三区四区在线| 亚洲精品免费一二三区| 亚洲精品成人悠悠色影视| 国产精品一色哟哟哟| 狠狠色综合日日| 成人亚洲一区二区一| 不卡一区二区三区四区| 色悠悠久久综合| 欧美精品久久久久久久多人混战| 欧美性三三影院| 51精品秘密在线观看| 欧美α欧美αv大片| 久久精品日韩一区二区三区| 中文字幕国产精品一区二区| 亚洲日穴在线视频| 日日摸夜夜添夜夜添国产精品| 日本成人在线网站| 国产不卡在线一区| 色婷婷久久综合| 日韩美一区二区三区| 国产精品日日摸夜夜摸av| 亚洲影视资源网| 日本不卡一二三| www.在线成人| 欧美色综合天天久久综合精品| 日韩一卡二卡三卡国产欧美| 国产精品天美传媒沈樵| 一区二区三区精品在线观看| 蜜桃视频在线一区| 99re这里只有精品视频首页| 欧美日韩黄色影视| 国产农村妇女毛片精品久久麻豆| 亚洲美女偷拍久久| 久久国产婷婷国产香蕉| 91香蕉国产在线观看软件| 日韩欧美在线123| 国产精品久久久久精k8 | 一区二区国产视频| 蜜乳av一区二区| 91丨porny丨国产入口| 日韩视频不卡中文| 亚洲日本成人在线观看| 经典三级视频一区| 欧美日韩国产另类不卡| 亚洲国产经典视频| 久久精品国产精品亚洲红杏| 99re热这里只有精品免费视频| 精品少妇一区二区| 亚洲成av人片在线| 成人高清av在线| 欧美草草影院在线视频| 亚洲午夜精品在线| 成人app在线观看| 欧美变态tickling挠脚心| 亚洲国产精品麻豆| 99亚偷拍自图区亚洲| 久久久99免费| 日韩vs国产vs欧美| 欧美日韩精品一区二区| 自拍偷在线精品自拍偷无码专区| 国内久久精品视频| 91精品免费在线观看| 亚洲一级二级在线| 91丨porny丨国产入口| 国产精品久久午夜| 国产精品白丝av| 精品国产乱子伦一区| 石原莉奈在线亚洲二区| 色成年激情久久综合| 亚洲天堂成人在线观看| 99精品热视频| 国产精品情趣视频| 国产成人亚洲精品青草天美| 久久影院电视剧免费观看| 蜜臀久久99精品久久久久宅男 | 久久久99精品久久| 紧缚奴在线一区二区三区| 精品奇米国产一区二区三区| 日本aⅴ亚洲精品中文乱码| 制服丝袜中文字幕一区| 视频一区在线视频| 欧美一区二区三区免费在线看|