亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2797.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                            M. MyersRequest for Comments: 2797                                       VeriSignCategory: Standards Track                                          X. Liu                                                                    Cisco                                                                J. Schaad                                                                Microsoft                                                             J. Weinstein                                                               April 2000                Certificate Management Messages over CMSStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document defines a Certificate Management protocol using CMS   (CMC).  This protocol addresses two immediate needs within the   Internet PKI community:   1. The need for an interface to public key certification products and      services based on [CMS] and [PKCS10], and   2. The need in [SMIMEV3] for a certificate enrollment protocol for      DSA-signed certificates with Diffie-Hellman public keys.   A small number of additional services are defined to supplement the   core certificate request service.   Throughout this specification the term CMS is used to refer to both   [CMS] and [PKCS7].  For both signedData and envelopedData, CMS is a   superset of the PKCS7. In general, the use of PKCS7 in this document   is aligned to the Cryptographic Message Syntax [CMS] that provides a   superset of the PKCS7 syntax. The term CMC refers to this   specification.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [RFC 2119].Myers, et al.               Standards Track                     [Page 1]RFC 2797        Certificate Management Messages over CMS      April 20001.  Protocol Requirements   -  The protocol is to be based as much as possible on the existing      CMS, PKCS#10 and CRMF specifications.   -  The protocol must support the current industry practice of a      PKCS#10 request followed by a PKCS#7 response as a subset of the      protocol.   -  The protocol needs to easily support the multi-key enrollment      protocols required by S/MIME and other groups.   -  The protocol must supply a way of doing all operations in a      single-round trip.  When this is not possible the number of round      trips is to be minimized.   -  The protocol will be designed such that all key generation can      occur on the client.   -  The mandatory algorithms must superset the required algorithms for      S/MIME.   -  The protocol will contain POP methods. Optional provisions for      multiple-round trip POP will be made if necessary.   -  The protocol will support deferred and pending responses to      certificate request for cases where external procedures are      required to issue a certificate.   -  The protocol needs to support arbitrary chains of local      registration authorities as intermediaries between certificate      requesters and issuers.2.  Protocol Overview   An enrollment transaction in this specification is generally composed   of a single round trip of messages.  In the simplest case an   enrollment request is sent from the client to the server and an   enrollment response is then returned from the server to the client.   In some more complicated cases, such as delayed certificate issuance   and polling for responses, more than one round trip is required.   This specification supports two different request messages and two   different response messages.   Public key certification requests can be based on either the PKCS10   or CRMF object.  The two different request messages are (a) the bare   PKCS10 (in the event that no other services are needed), and (b) the   PKCS10 or CRMF message wrapped in a CMS encapsulation as part of a   PKIData object.   Public key certification responses are based on the CMS signedData   object.  The response may be either (a) a degenerate CMS signedData   object (in the event no other services are needed), or (b) a   ResponseBody object wrapped in a CMS signedData object.Myers, et al.               Standards Track                     [Page 2]RFC 2797        Certificate Management Messages over CMS      April 2000   No special services are provided for doing either renewal (new   certificates with the same key) or re-keying (new certificates on new   keys) of clients.  Instead a renewal/re-key message looks the same as   any enrollment message, with the identity proof being supplied by   existing certificates from the CA.   A provision exists for Local Registration Authorities (LRAs) to   participate in the protocol by taking client enrollment messages,   wrapping them in a second layer of enrollment message with additional   requirements or statements from the LRA and then passing this new   expanded request on to the Certification Authority.   This specification makes no assumptions about the underlying   transport mechanism.  The use of CMS is not meant to imply an email-   based transport.   Optional services available through this specification are   transaction management, replay detection (through nonces), deferred   certificate issuance, certificate revocation requests and   certificate/CRL retrieval.2.1  Terminology   There are several different terms, abbreviations and acronyms used in   this document that we define here for convenience and consistency of   usage:   "End-Entity" (EE) refers to the entity that owns a key pair and for      whom a certificate is issued.   "LRA" or "RA" refers to a (Local) Registration Authority.  A      registration authority acts as an intermediary between an End-      Entity and a Certification Authority.  Multiple RAs can exist      between the End-Entity and the Certification Authority.   "CA" refers to a Certification Authority.  A Certification Authority      is the entity that performs the actual issuance of a certificate.   "Client" refers to an entity that creates a PKI request.  In this      document both RAs and End-Entities can be clients.   "Server" refers to the entities that process PKI requests and create      PKI responses.  CAs and RAs can be servers in this document.   "PKCS#10" refers the Public Key Cryptography Standard #10.  This is      one of a set of standards defined by RSA Laboratories in the      1980s.  PKCS#10 defines a Certificate Request Message syntax.   "CRMF" refers to the Certificate Request Message Format RFC [CRMF].      We are using certificate request message format defined in this      document as part of our management protocol.   "CMS" refers to the Cryptographic Message Syntax RFC [CMS].  This      document provides for basic cryptographic services including      encryption and signing with and without key management.Myers, et al.               Standards Track                     [Page 3]RFC 2797        Certificate Management Messages over CMS      April 2000   "POP" is an acronym for "Proof of Possession".  POP refers to a value      that can be used to prove that the private key corresponding to a      public key is in the possession and can be used by an end-entity.   "Transport wrapper" refers to the outermost CMS wrapping layer.2.2  Protocol Flow Charts   Figure 1 shows the Simple Enrollment Request and Response messages.   The contents of these messages are detailed in Sections 4.1 and 4.3   below.    Simple PKI Request                      Simple PKI Response    -------------------------               --------------------------    +----------+                            +------------------+    | PKCS #10 |                            | CMS "certs-only" |    +----------+--------------+             |     message      |    |                         |             +------------------+------+    | Certificate Request     |             |                         |    |                         |             | CMS Signed Data,        |    | Subject Name            |             |   no signerInfo         |    | Subject Public Key Info |             |                         |    |   (K_PUB)               |             | signedData contains one |    | Attributes              |             | or more certificates in |    |                         |             | the "certificates"      |    +-----------+-------------+             | portion of the          |                | signed with |             | signedData.             |                | matching    |             |                         |                | K_PRIV      |             | encapsulatedContentInfo |                +-------------+             | is empty.               |                                            |                         |                                            +--------------+----------+                                                           | unsigned |                                                           +----------+               Figure 1: Simple PKI Request and Response MessagesMyers, et al.               Standards Track                     [Page 4]RFC 2797        Certificate Management Messages over CMS      April 2000    Full PKI Request                        Full PKI Response    -----------------------                 ------------------------    +----------------+                      +----------------+    | CMS signedData |                      | CMS signedData |    |     object     |                      |     object     |    +----------------+--------+             +----------------+--------+    |                         |             |                         |    | PKIData object          |             | ResponseBody object     |    |                         |             |                         |    | Sequence of:            |             | Sequence of:            |    | <enrollment attribute>* |             | <enrollment attribute>* |    | <certification request>*|             | <CMS object>*           |    | <CMS objects>*          |             | <other message>*        |    | <other message>*        |             |                         |    |                         |             | where * == zero or more |    | where * == zero or more |             |                         |    |                         |             | All certificates issued |    | Certificate requests    |             | as part of the response |    | are CRMF or PKCS#10     |             | are included in the     |    | objects. Attributes are |             | "certificates" portion  |    | (OID, ANY defined by    |             | of the signedData.      |    | OID) pairs.             |             | Relevant CA certs and   |    |                         |             | CRLs can be included as |    +-------+-----------------+             | well.                   |            | signed (keypair |             |                         |            | used may be pre-|             +---------+---------------+            | existing or     |                       | signed by the |            | identified in   |                       | CA or an LRA  |            | the request)    |                       +---------------+            +-----------------+               Figure 2: Full PKI Request and Response Messages   Figure 2 shows the Full Enrollment Request and Response messages.   The contents of these messages are detailed in Sections 4.2 and 4.4   below.3.  Protocol Elements   This section covers each of the different elements that may be used   to construct enrollment request and enrollment response messages.   Section 4 will cover how to build the enrollment request and response   messages.Myers, et al.               Standards Track                     [Page 5]RFC 2797        Certificate Management Messages over CMS      April 20003.1  PKIData Object   The new content object PKIData has been defined for this protocol.   This new object is used as the body of the full PKI request message.   The new body is identified by:     id-cct-PKIData  OBJECT IDENTIFIER ::= { id-cct 2 }   The ASN.1 structure corresponding to this new content type is:   PKIData ::= SEQUENCE {         controlSequence    SEQUENCE SIZE(0..MAX) OF TaggedAttribute,         reqSequence        SEQUENCE SIZE(0..MAX) OF TaggedRequest,         cmsSequence        SEQUENCE SIZE(0..MAX) OF TaggedContentInfo,         otherMsgSequence   SEQUENCE SIZE(0..MAX) OF OtherMsg   }   -- controlSequence consists of a sequence of control attributes.  The   control attributes defined in this document are found in section 5.   As control sequences are defined by OIDs, other parties can define   additional control attributes. Unrecognized OIDs MUST result in no   part of the request being successfully processed.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩一区二区三区视频在线观看| 欧美日韩三级一区二区| 在线亚洲高清视频| 国产精品另类一区| 亚洲小说春色综合另类电影| 成人高清免费观看| 久久久www成人免费无遮挡大片| 天天综合网 天天综合色| 欧美日韩一二区| av不卡在线观看| 一区二区三区**美女毛片| 91黄色免费网站| 日本欧美大码aⅴ在线播放| 91麻豆精品国产91久久久使用方法 | 奇米影视一区二区三区| 在线播放/欧美激情| 972aa.com艺术欧美| 亚洲一区欧美一区| 午夜精品免费在线观看| 国产午夜精品一区二区三区视频| 国产成人免费在线视频| 国产精品伦理在线| 国产性做久久久久久| 日韩一二三区视频| 91麻豆精品国产91久久久 | 亚洲美女电影在线| 在线观看日韩电影| 99精品黄色片免费大全| 丁香另类激情小说| 天天爽夜夜爽夜夜爽精品视频| 亚洲另类在线视频| 欧美mv日韩mv国产网站| 国产麻豆9l精品三级站| 中文幕一区二区三区久久蜜桃| 精品乱码亚洲一区二区不卡| 在线成人高清不卡| www.欧美日韩国产在线| 国产成人在线网站| 国产成人精品免费网站| 国产精品一区二区免费不卡| 亚洲一二三区视频在线观看| 亚洲精品视频在线观看免费| 亚洲丝袜自拍清纯另类| 日韩欧美在线观看一区二区三区| 91精品国产色综合久久不卡电影| 成人看片黄a免费看在线| www.日韩精品| 91福利视频网站| 欧美三级蜜桃2在线观看| 欧美精品久久99久久在免费线| 91精品久久久久久蜜臀| 久久在线观看免费| 正在播放一区二区| 日韩欧美亚洲国产精品字幕久久久| 一本一道久久a久久精品| 久久se精品一区精品二区| 亚洲精品视频在线观看网站| 亚洲一区二区三区中文字幕在线 | 国产精品18久久久久久久久久久久 | 久久免费电影网| 国产精品不卡在线| 亚洲宅男天堂在线观看无病毒| 五月天激情综合| 国产精品资源网| 91美女蜜桃在线| 国产在线看一区| 青青草97国产精品免费观看无弹窗版| 精品一区二区三区免费播放 | 免费精品视频最新在线| 国产99精品国产| 精品亚洲欧美一区| 成人性生交大片免费看中文网站| 95精品视频在线| 日韩欧美国产一二三区| 国产精品久久久久四虎| 夜夜亚洲天天久久| 久久99精品国产麻豆不卡| 成人小视频免费在线观看| 欧美日韩国产欧美日美国产精品| 色激情天天射综合网| 3atv一区二区三区| 国产精品久久三| 日韩精品五月天| 日韩电影在线看| 成人av资源网站| 91精品国产综合久久精品性色| 国产清纯白嫩初高生在线观看91| 久久这里只精品最新地址| 亚洲精品一二三| 国产麻豆91精品| 欧美精品精品一区| 亚洲人妖av一区二区| 美女一区二区三区| 国模一区二区三区白浆| 欧美系列在线观看| 日韩一级成人av| 夜色激情一区二区| 成人妖精视频yjsp地址| 日韩视频一区二区在线观看| 亚洲人午夜精品天堂一二香蕉| 国产综合色产在线精品| 欧美巨大另类极品videosbest| 国产精品久久久久天堂| 久久99国产精品久久| 欧美日韩亚洲综合在线| 国产精品激情偷乱一区二区∴| 免费观看一级欧美片| 欧美日韩一区中文字幕| 亚洲精品乱码久久久久久久久| 国产精品1024| 精品成人在线观看| 亚洲欧美激情一区二区| 国产精品123| 久久久夜色精品亚洲| 久久成人精品无人区| 欧美精品一级二级| 一片黄亚洲嫩模| 91免费观看在线| 国产精品白丝在线| 风间由美性色一区二区三区| 亚洲精品一区二区三区影院| 视频一区二区三区入口| 欧洲精品视频在线观看| 亚洲免费观看高清完整版在线观看| 国产69精品久久777的优势| 久久影院午夜论| 国内精品在线播放| 久久精品欧美日韩精品| 国产精品一卡二| 国产欧美一区二区精品性色超碰| 国产一区在线观看视频| 26uuu亚洲| 国产一区二区久久| 欧美激情一区三区| 日本午夜精品视频在线观看| 宅男噜噜噜66一区二区66| 亚洲高清久久久| 欧美一激情一区二区三区| 日本成人中文字幕| 日韩美女在线视频| 精品亚洲国内自在自线福利| 久久久久久免费网| 丰满亚洲少妇av| 亚洲色图欧美在线| 欧美在线啊v一区| 天天操天天干天天综合网| 欧美另类高清zo欧美| 免费观看日韩电影| 国产欧美一区二区三区网站| 成人福利视频网站| 亚洲精品亚洲人成人网在线播放| 欧美三级日本三级少妇99| 免费高清视频精品| 国产片一区二区三区| 色老头久久综合| 蜜桃av噜噜一区| 中文字幕精品综合| 欧美性色黄大片手机版| 免费在线观看不卡| 日本一区二区免费在线观看视频| 97se狠狠狠综合亚洲狠狠| 婷婷开心激情综合| 久久久精品国产免大香伊 | 欧美精品粉嫩高潮一区二区| 欧美性生交片4| 免费在线看成人av| 国产精品色一区二区三区| 日本丰满少妇一区二区三区| 日韩电影在线观看电影| 中文字幕精品三区| 欧美精品v国产精品v日韩精品 | 欧美丝袜自拍制服另类| 美女任你摸久久| 成人免费在线观看入口| www.在线欧美| 日韩电影在线一区二区三区| 久久精品视频免费| 欧美日本在线看| 国产成人精品免费看| 香蕉久久夜色精品国产使用方法| 色婷婷av一区二区三区gif | 欧美性色综合网| 国产激情91久久精品导航| 一区二区三区四区乱视频| 久久综合狠狠综合久久激情| a亚洲天堂av| 久久99国产精品久久99果冻传媒 | 久久99久国产精品黄毛片色诱| 欧美极品xxx| 91精品国产综合久久久久久漫画| 成人性色生活片| 美女在线观看视频一区二区| 亚洲色图在线播放| 久久久三级国产网站| 欧美裸体一区二区三区| 成人免费看黄yyy456| 青青草91视频| 亚洲一区二区三区国产| 国产精品久久久久久久浪潮网站 | 久久精品一区蜜桃臀影院|