亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-scvp-11.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   change any items other than:      - requestNonce;      - serverContextInfo; and      - the client's signature on the request3.2.5 valPolicy   The valPolicy item, when present, defines the validation policy to be   used by the SCVP server during certificate validation. The client can   use this option instead of specifying other SCVP configuration items   such as trustAnchors. The value of this item is determined by private   agreement between the client and the server, but it MUST be   represented as an object identifier. The server might want to assign   identifiers that indicate that some settings are used in addition to   others given in the request. In this way, the validation policy   object identifier can be a shorthand for some SCVP options, but not   others.   The valPolicy item uses the ValidationPolicy type, which has the   following syntax:      ValidationPolicy ::= SEQUENCE {        valPolicyId           OBJECT IDENTIFIER,        parameters            ANY DEFINED BY valPolicyId OPTIONAL }   If no validation policy is specified in the request, then the SCVP   server's default validation policy is used. The default validation   policy may also be explicitly specified. The object identifier to   identify the default validation policy is:      id-svp OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)                  dod(6) internet(1) security(5) mechanisms(5) pkix(7)                  19 }      id-svp-defaultValPolicy OBJECT IDENTIFIER ::= { id-svp 1 }Malpani, Housley, & Freeman                                    [Page 13]INTERNET DRAFT                    SCVP                     December 2002   The meaning of the default validation policy is:      - Trust anchors will come from the trustAnchors item. If no        certificates are specified in the trustAnchors item, then        the SCVP server will use trust anchors of its own choosing.      - The acceptable policy set will come from the certPolicies        item associated with the selected trust anchor. If no        certificate policies are specified in the certPolicies item,        then the SCVP server will use any-policy.      - The SCVP server will check for certificate revocation using        CRLs, delta CRLs, OCSP responses, or any other source of        revocation information that is available.3.2.6 validityTime   The OPTIONAL validityTime item tells the date and time relative to   which the SCVP client wants the server to perform the checks. If the   validityTime is present, it MUST be encoded as GeneralizedTime. If   the validityTime is not present, the server MUST respond as if the   client provided the date and time at which the server processes the   request.   GeneralizedTime values MUST be expressed Greenwich Mean Time (Zulu)   and MUST include seconds (i.e., times are YYYYMMDDHHMMSSZ), even when   the number of seconds is zero. GeneralizedTime values MUST NOT   include fractional seconds.   The information in the corresponding CertReply item in the response   MUST be formatted as if the server created the response at the time   indicated in the validityTime. However, if the server does not have   appropriate historical information, the server MUST return an error.3.2.7 trustAnchors   The OPTIONAL trustAnchors item specifies the trust anchors to be used   by the SCVP server. One or more certificate policy MAY be associated   with each trust anchor. If a trustAnchors item is present, the server   MUST NOT use any certification path trust anchors other than those   provided.   The TrustAnchors type contains one or more trust anchor   specification. A certificate reference can be used to identify the   trust anchor distinguished name, public key algorithm, associated   public key parameters, if needed, and the trusted public key.   Alternatively, these items can be provided directly. The order of   trust anchor specifications within the sequence is not important.Malpani, Housley, & Freeman                                    [Page 14]INTERNET DRAFT                    SCVP                     December 2002   The OPTIONAL certPolicies item specifies a list of policy identifiers   that the SCVP server MUST use when forming and validating a   certification path that terminates at the associated trust anchor. If   certPolicies is not specified, then any-policy MUST be used.   The trust anchor itself, regardless of its form, MUST NOT be included   in any certification path constructed by the SCVP server.   TrustAnchors has the following syntax:      TrustAnchors ::= SEQUENCE SIZE (1..MAX) OF TrustAnchor      TrustAnchor ::= SEQUENCE {        anchor                  TrustAnchorInfo,        certPolicies        [1] SEQUENCE SIZE (1..MAX) OF                                OBJECT IDENTIFIER OPTIONAL }                                -- if absent, use any-policy      TrustAnchorInfo ::= CHOICE {        certRef                 PKCReference,        rawInfo             [3] RawTrustAnchorInfo }      RawTrustAnchorInfo ::= SEQUENCE {        name                    Name,        algorithm               AlgorithmIdentifier,        pubKey                  BIT STRING }3.2.8 intermediateCerts   The OPTIONAL intermediateCerts item helps the SCVP server create   valid certification paths. The intermediateCerts item, when present,   provides certificates that the server MAY use when forming a   certification path. The certificates in the intermediateCerts item   MAY be used by the server in addition to any other certificates that   the server can access when building certification paths. The   intermediateCerts item, when present, MUST contain at least one   certificate. The intermediateCerts item MUST be structured as a   CertBundle. The certificates in the intermediateCerts MUST NOT be   trusted by the server just because they are present in this item.   The CertBundle type contains one or more certificate references. The   order of the entries in the bundle is not important. CertBundle has   the following syntax:      CertBundle ::= SEQUENCE SIZE (1..MAX) OF PKCReferenceMalpani, Housley, & Freeman                                    [Page 15]INTERNET DRAFT                    SCVP                     December 20023.2.9 revInfos   The OPTIONAL revInfo item specifies revocation information such as   CRLs, delta CRLs [PKIX-1], and OCSP responses [OCSP] that the SCVP   server MAY use when validating certification paths. The purpose of   the revInfos item is to provide revocation information to which the   server might not otherwise have access (for example, an OCSP response   that the client received along with the certificate). Note that the   information in the revInfos item might not be used by the server. For   example, the revocation information might be associated with   certificates that the server does not use in certification path   building.   It is courteous to the SCVP server to separate CRLs and delta CRLs.   However, since the two share a common syntax, SCVP servers SHOULD   accept delta CRLs even if they are identified as regular CRLs by the   SCVP client.   CRLs, delta CRLs, and OCSP responses can be provided as revocation   information. If needed, additional object identifiers can be assigned   for additional revocation information types in the future.   The revInfos item uses the RevocationInfos type, which has the   following syntax:      RevocationInfos ::= SEQUENCE SIZE (1..MAX) OF RevocationInfo      RevocationInfo ::= SEQUENCE {        riType                OBJECT IDENTIFIER,        riValue               ANY DEFINED BY riType }   The riType object identifiers are as follows:      id-ri OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)            dod(6) internet(1) security(5) mechanisms(5) pkix(7) 16 }      id-ri-crl                    OBJECT IDENTIFIER ::= { id-ri 1 }      id-ri-ocsp-response          OBJECT IDENTIFIER ::= { id-ri 2 }      id-ri-delta-crl              OBJECT IDENTIFIER ::= { id-ri 3 }3.2.10 queryExtensions   The OPTIONAL queryExtensions item contains Extensions. If present,   each extension in the sequence extends the query. This specification   does not define any extensions, the facility is provided to allow   future specifications to extend SCVP. The syntax for extensions is   imported from [PKIX-1]. The queryExtensions item, when present, MUST   contain a sequence of extension items, and each of extension MUSTMalpani, Housley, & Freeman                                    [Page 16]INTERNET DRAFT                    SCVP                     December 2002   contain extnID, critical, and extnValue items.   The extnID item is an identifier for the extension. It contains the   object identifier that names the extension.   The critical item is a BOOLEAN. Each extension is designated as   either critical (with a value of TRUE) or non-critical (with a value   of FALSE). An SCVP server MUST reject the query if it encounters a   critical extension it does not recognize; however, a non-critical   extension MAY be ignored if it is not recognized.   The extnValue item contains an octet string. Within the octet string   is the extension value. An ASN.1 type is specified for each   extension, identified by the associated extnID object identifier.3.3 requestor   The OPTIONAL requestor item is used to identify the requestor. The   value is only of local significance to the requestor. If the SCVP   client includes a requestor value in the request, then the SCVP   server MUST return the same value in the response.   The requestor item MUST be an octet string. No provisions are made to   ensure uniqueness of the requestor octet string; however, all of the   octets MUST have values other than zero.3.4 requestNonce   The OPTIONAL requestNonce item contains an identifier generated by   the SCVP client for the request. If the client includes a   requestNonce value in the request, then the server MUST return the   same value in the response. The client SHOULD include a requestNonce   item in every request to prevent an attacker from acting as a man-in-   the-middle by replaying old responses from the server. The   requestNonce value SHOULD change with every request sent by the   client.   The requestNonce item MUST be an octet string.3.5 reqExtensions   The OPTIONAL reqExtensions item contains Extensions. If present, each   Extension in the sequence extends the request. This specification   does not define any extensions, the facility is provided to allow   future specifications to extend the SCVP. The syntax for Extensions   is imported from [PKIX-1]. The reqExtensions item, when present, MUST   contain a sequence of extension items, and each of extension MUST   contain extnID, critical, and extnValue items.Malpani, Housley, & Freeman                                    [Page 17]INTERNET DRAFT                    SCVP                     December 2002   The extnID item is an identifier for the extension. It contains the   object identifier that names the extension.   The critical item is a BOOLEAN. Each extension is designated as   either critical (with a value of TRUE) or non-critical (with a value   of FALSE). An SCVP server MUST reject the query if it encounters a   critical extension it does not recognize; however, a non-critical   extension MAY be ignored if it is not recognized.   The extnValue item contains an octet string. Within the octet string   is the extension value. An ASN.1 type is specified for each   extension, identified by the associated extnID object identifier.4 Validation Response   A SCVP server response to the client MUST be a single SCVPResponse   item. A SCVPRequest item is carried in an application/scvp-response   MIME body part.   There are two forms of an SCVP response: unsigned and signed. An   unsigned response MUST only be generated for an error status. An   overview of the structure used for an unsigned response is provided   below. Many details are not shown, but the way that SCVP makes use of   CMS is clearly illustrated.      ContentInfo {        contentType        id-ct-scvp-certValResponse,                                    -- (1.2.840.113549.1.9.16.1.11)        content            CVResponse }   The signed response consists of a CVResponse encapsulated in a   SignedData which is in turn encapsulated in a ContentInfo. An   overview of the structure used for a signed response is provided   below. Again, many details are not shown, but the way that SCVP makes   use of CMS is clearly illustrated.      ContentInfo {        contentType        id-signedData, -- (1.2.840.113549.1.7.2)        content            SignedData }      SignedData {        version            CMSVersion,        digestAlgorithms   DigestAlgorithmIdentifiers,        encapContentInfo   EncapsulatedContentInfo,        certificates       CertificateSet, -- (MUST include server cert)        crls               CertificateRevocationLists, -- (Optional)        signerInfos        SET OF SignerInfos } -- Only 1 in SCVPMalpani, Housley, & Freeman                                    [Page 18]INTERNET DRAFT                    SCVP                     December 2002      SignerInfo {        version            CMSVersion,

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产曰批免费观看久久久| 免费看日韩精品| 日韩免费一区二区| 99v久久综合狠狠综合久久| 日韩电影在线观看一区| 国产精品盗摄一区二区三区| 日韩一区二区三区电影在线观看| www.亚洲免费av| 精品一区二区三区影院在线午夜| 亚洲伦在线观看| 久久久久国产精品厨房| 欧美一区二区福利在线| 欧美视频中文字幕| 91亚洲精华国产精华精华液| 激情综合色播五月| 天涯成人国产亚洲精品一区av| 欧美成人女星排名| 欧美一二区视频| 欧美色爱综合网| 欧美天堂亚洲电影院在线播放| 精品国产乱码久久久久久久久| 午夜精品一区二区三区免费视频 | 2020国产成人综合网| 一本久久综合亚洲鲁鲁五月天| 国产激情视频一区二区三区欧美 | 国产精品久久久久久久岛一牛影视 | 国产欧美一区二区精品性| 欧美一区二区三区精品| 91小视频免费看| 成人免费视频app| 国产传媒欧美日韩成人| 麻豆精品精品国产自在97香蕉| 午夜电影久久久| 亚洲国产美国国产综合一区二区| 黑人精品欧美一区二区蜜桃| 亚洲欧洲国产专区| 日韩精品亚洲一区| 亚洲色图20p| 国产精品国产三级国产三级人妇| 久久久影视传媒| 国产亚洲美州欧州综合国| 精品欧美一区二区三区精品久久| 91精品国产一区二区三区蜜臀| 精品视频999| 欧美日韩高清在线| 欧美精品一二三| 日韩一卡二卡三卡四卡| 欧美一区二区国产| 欧美r级在线观看| 精品国产一区二区三区四区四| 日韩手机在线导航| 欧美成va人片在线观看| 精品奇米国产一区二区三区| 久久午夜色播影院免费高清| 国产无人区一区二区三区| 欧美激情一区二区在线| 国产精品每日更新在线播放网址 | 91一区二区在线| 欧美在线观看一区二区| 69堂国产成人免费视频| 日韩欧美国产综合一区| 国产丝袜欧美中文另类| 自拍视频在线观看一区二区| 亚洲自拍偷拍九九九| 免费久久精品视频| 国产成人精品免费在线| 91一区在线观看| 在线播放91灌醉迷j高跟美女 | 亚洲欧洲一区二区在线播放| 亚洲国产精品嫩草影院| 久久精品国产亚洲a| 国产福利不卡视频| 在线观看91视频| 欧美tickle裸体挠脚心vk| 国产精品久久久久久久午夜片| 一区二区三区中文免费| 久久精工是国产品牌吗| 成人网在线免费视频| 欧美视频日韩视频| 国产调教视频一区| 偷拍与自拍一区| 国产福利一区二区三区在线视频| 色丁香久综合在线久综合在线观看| 91麻豆精品国产综合久久久久久| 久久亚洲精华国产精华液 | 久久精品国产99| 不卡高清视频专区| 欧美一区二区三区在线视频| 国产精品视频线看| 免费观看30秒视频久久| 成人av网站免费观看| 777欧美精品| 亚洲欧洲精品一区二区三区不卡| 三级亚洲高清视频| 99久久综合精品| 精品欧美黑人一区二区三区| 一区二区三区中文字幕| 国产91丝袜在线播放0| 欧美久久一区二区| 亚洲日本va午夜在线电影| 韩国理伦片一区二区三区在线播放| 一本一道波多野结衣一区二区| 精品久久久久香蕉网| 午夜精品影院在线观看| 91在线观看地址| 国产丝袜美腿一区二区三区| 日本欧洲一区二区| 欧美午夜在线一二页| 欧美国产日韩在线观看| 精品一区二区三区欧美| 欧美亚洲综合在线| 国产精品高潮呻吟| 韩国欧美国产1区| 91麻豆精品国产91久久久资源速度 | 欧美日韩三级一区二区| 欧美国产精品劲爆| 经典一区二区三区| 3d成人动漫网站| 一二三区精品福利视频| 99久久精品免费看国产免费软件| 久久久久久**毛片大全| 麻豆精品在线观看| 538prom精品视频线放| 亚洲精品高清在线| 97久久久精品综合88久久| 国产无一区二区| 国产成人啪免费观看软件| 久久午夜国产精品| 国产米奇在线777精品观看| 欧美一区二区在线观看| 丝袜国产日韩另类美女| 欧美日韩成人综合在线一区二区| 亚洲女厕所小便bbb| 91小视频在线| 一区二区三区四区视频精品免费| 91影院在线免费观看| 亚洲日本va在线观看| 色综合久久88色综合天天免费| 亚洲视频狠狠干| 欧美影视一区在线| 亚洲成人精品影院| 7777精品伊人久久久大香线蕉的| 天天综合网 天天综合色| 在线播放中文字幕一区| 蜜臀av一级做a爰片久久| www一区二区| 国产a级毛片一区| 国产精品久久久久久久裸模| 色呦呦网站一区| 亚洲小说欧美激情另类| 91精品免费在线观看| 老汉av免费一区二区三区| 精品国产99国产精品| 国产乱国产乱300精品| 国产精品色哟哟网站| 一本大道av伊人久久综合| 一区二区三区毛片| 91精品婷婷国产综合久久竹菊| 九一久久久久久| 国产精品久久久久aaaa| 在线观看亚洲a| 日本在线播放一区二区三区| 精品国产污污免费网站入口 | 视频在线在亚洲| 久久综合给合久久狠狠狠97色69| 大胆亚洲人体视频| 亚洲综合在线视频| 日韩一级完整毛片| 成人性生交大片免费看中文| 亚洲自拍都市欧美小说| 日韩亚洲欧美成人一区| 国产一区二区三区电影在线观看| 国产精品美女久久久久久久久| 欧美亚洲动漫精品| 国产美女娇喘av呻吟久久| 中文字幕一区二区三区不卡| 欧美日韩视频不卡| 国产精品一区一区| 亚洲a一区二区| 久久精品水蜜桃av综合天堂| 在线日韩一区二区| 狠狠色综合播放一区二区| 亚洲制服丝袜av| 国产亚洲午夜高清国产拍精品| 在线观看视频91| 国产精品自在欧美一区| 亚洲国产精品一区二区尤物区| 久久精品夜色噜噜亚洲aⅴ| 欧美在线免费视屏| 成人免费毛片嘿嘿连载视频| 日韩精品三区四区| 国产精品久久久久久福利一牛影视 | 日韩免费电影一区| 91久久国产最好的精华液| 精品中文字幕一区二区| 亚洲一区二区在线免费观看视频| 久久久国产精品麻豆| 欧美高清你懂得| 色婷婷综合中文久久一本| 日韩久久精品一区|