亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2797.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                            M. MyersRequest for Comments: 2797                                       VeriSignCategory: Standards Track                                          X. Liu                                                                    Cisco                                                                J. Schaad                                                                Microsoft                                                             J. Weinstein                                                               April 2000                Certificate Management Messages over CMSStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2000).  All Rights Reserved.Abstract   This document defines a Certificate Management protocol using CMS   (CMC).  This protocol addresses two immediate needs within the   Internet PKI community:   1. The need for an interface to public key certification products and      services based on [CMS] and [PKCS10], and   2. The need in [SMIMEV3] for a certificate enrollment protocol for      DSA-signed certificates with Diffie-Hellman public keys.   A small number of additional services are defined to supplement the   core certificate request service.   Throughout this specification the term CMS is used to refer to both   [CMS] and [PKCS7].  For both signedData and envelopedData, CMS is a   superset of the PKCS7. In general, the use of PKCS7 in this document   is aligned to the Cryptographic Message Syntax [CMS] that provides a   superset of the PKCS7 syntax. The term CMC refers to this   specification.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this   document are to be interpreted as described in [RFC 2119].Myers, et al.               Standards Track                     [Page 1]RFC 2797        Certificate Management Messages over CMS      April 20001.  Protocol Requirements   -  The protocol is to be based as much as possible on the existing      CMS, PKCS#10 and CRMF specifications.   -  The protocol must support the current industry practice of a      PKCS#10 request followed by a PKCS#7 response as a subset of the      protocol.   -  The protocol needs to easily support the multi-key enrollment      protocols required by S/MIME and other groups.   -  The protocol must supply a way of doing all operations in a      single-round trip.  When this is not possible the number of round      trips is to be minimized.   -  The protocol will be designed such that all key generation can      occur on the client.   -  The mandatory algorithms must superset the required algorithms for      S/MIME.   -  The protocol will contain POP methods. Optional provisions for      multiple-round trip POP will be made if necessary.   -  The protocol will support deferred and pending responses to      certificate request for cases where external procedures are      required to issue a certificate.   -  The protocol needs to support arbitrary chains of local      registration authorities as intermediaries between certificate      requesters and issuers.2.  Protocol Overview   An enrollment transaction in this specification is generally composed   of a single round trip of messages.  In the simplest case an   enrollment request is sent from the client to the server and an   enrollment response is then returned from the server to the client.   In some more complicated cases, such as delayed certificate issuance   and polling for responses, more than one round trip is required.   This specification supports two different request messages and two   different response messages.   Public key certification requests can be based on either the PKCS10   or CRMF object.  The two different request messages are (a) the bare   PKCS10 (in the event that no other services are needed), and (b) the   PKCS10 or CRMF message wrapped in a CMS encapsulation as part of a   PKIData object.   Public key certification responses are based on the CMS signedData   object.  The response may be either (a) a degenerate CMS signedData   object (in the event no other services are needed), or (b) a   ResponseBody object wrapped in a CMS signedData object.Myers, et al.               Standards Track                     [Page 2]RFC 2797        Certificate Management Messages over CMS      April 2000   No special services are provided for doing either renewal (new   certificates with the same key) or re-keying (new certificates on new   keys) of clients.  Instead a renewal/re-key message looks the same as   any enrollment message, with the identity proof being supplied by   existing certificates from the CA.   A provision exists for Local Registration Authorities (LRAs) to   participate in the protocol by taking client enrollment messages,   wrapping them in a second layer of enrollment message with additional   requirements or statements from the LRA and then passing this new   expanded request on to the Certification Authority.   This specification makes no assumptions about the underlying   transport mechanism.  The use of CMS is not meant to imply an email-   based transport.   Optional services available through this specification are   transaction management, replay detection (through nonces), deferred   certificate issuance, certificate revocation requests and   certificate/CRL retrieval.2.1  Terminology   There are several different terms, abbreviations and acronyms used in   this document that we define here for convenience and consistency of   usage:   "End-Entity" (EE) refers to the entity that owns a key pair and for      whom a certificate is issued.   "LRA" or "RA" refers to a (Local) Registration Authority.  A      registration authority acts as an intermediary between an End-      Entity and a Certification Authority.  Multiple RAs can exist      between the End-Entity and the Certification Authority.   "CA" refers to a Certification Authority.  A Certification Authority      is the entity that performs the actual issuance of a certificate.   "Client" refers to an entity that creates a PKI request.  In this      document both RAs and End-Entities can be clients.   "Server" refers to the entities that process PKI requests and create      PKI responses.  CAs and RAs can be servers in this document.   "PKCS#10" refers the Public Key Cryptography Standard #10.  This is      one of a set of standards defined by RSA Laboratories in the      1980s.  PKCS#10 defines a Certificate Request Message syntax.   "CRMF" refers to the Certificate Request Message Format RFC [CRMF].      We are using certificate request message format defined in this      document as part of our management protocol.   "CMS" refers to the Cryptographic Message Syntax RFC [CMS].  This      document provides for basic cryptographic services including      encryption and signing with and without key management.Myers, et al.               Standards Track                     [Page 3]RFC 2797        Certificate Management Messages over CMS      April 2000   "POP" is an acronym for "Proof of Possession".  POP refers to a value      that can be used to prove that the private key corresponding to a      public key is in the possession and can be used by an end-entity.   "Transport wrapper" refers to the outermost CMS wrapping layer.2.2  Protocol Flow Charts   Figure 1 shows the Simple Enrollment Request and Response messages.   The contents of these messages are detailed in Sections 4.1 and 4.3   below.    Simple PKI Request                      Simple PKI Response    -------------------------               --------------------------    +----------+                            +------------------+    | PKCS #10 |                            | CMS "certs-only" |    +----------+--------------+             |     message      |    |                         |             +------------------+------+    | Certificate Request     |             |                         |    |                         |             | CMS Signed Data,        |    | Subject Name            |             |   no signerInfo         |    | Subject Public Key Info |             |                         |    |   (K_PUB)               |             | signedData contains one |    | Attributes              |             | or more certificates in |    |                         |             | the "certificates"      |    +-----------+-------------+             | portion of the          |                | signed with |             | signedData.             |                | matching    |             |                         |                | K_PRIV      |             | encapsulatedContentInfo |                +-------------+             | is empty.               |                                            |                         |                                            +--------------+----------+                                                           | unsigned |                                                           +----------+               Figure 1: Simple PKI Request and Response MessagesMyers, et al.               Standards Track                     [Page 4]RFC 2797        Certificate Management Messages over CMS      April 2000    Full PKI Request                        Full PKI Response    -----------------------                 ------------------------    +----------------+                      +----------------+    | CMS signedData |                      | CMS signedData |    |     object     |                      |     object     |    +----------------+--------+             +----------------+--------+    |                         |             |                         |    | PKIData object          |             | ResponseBody object     |    |                         |             |                         |    | Sequence of:            |             | Sequence of:            |    | <enrollment attribute>* |             | <enrollment attribute>* |    | <certification request>*|             | <CMS object>*           |    | <CMS objects>*          |             | <other message>*        |    | <other message>*        |             |                         |    |                         |             | where * == zero or more |    | where * == zero or more |             |                         |    |                         |             | All certificates issued |    | Certificate requests    |             | as part of the response |    | are CRMF or PKCS#10     |             | are included in the     |    | objects. Attributes are |             | "certificates" portion  |    | (OID, ANY defined by    |             | of the signedData.      |    | OID) pairs.             |             | Relevant CA certs and   |    |                         |             | CRLs can be included as |    +-------+-----------------+             | well.                   |            | signed (keypair |             |                         |            | used may be pre-|             +---------+---------------+            | existing or     |                       | signed by the |            | identified in   |                       | CA or an LRA  |            | the request)    |                       +---------------+            +-----------------+               Figure 2: Full PKI Request and Response Messages   Figure 2 shows the Full Enrollment Request and Response messages.   The contents of these messages are detailed in Sections 4.2 and 4.4   below.3.  Protocol Elements   This section covers each of the different elements that may be used   to construct enrollment request and enrollment response messages.   Section 4 will cover how to build the enrollment request and response   messages.Myers, et al.               Standards Track                     [Page 5]RFC 2797        Certificate Management Messages over CMS      April 20003.1  PKIData Object   The new content object PKIData has been defined for this protocol.   This new object is used as the body of the full PKI request message.   The new body is identified by:     id-cct-PKIData  OBJECT IDENTIFIER ::= { id-cct 2 }   The ASN.1 structure corresponding to this new content type is:   PKIData ::= SEQUENCE {         controlSequence    SEQUENCE SIZE(0..MAX) OF TaggedAttribute,         reqSequence        SEQUENCE SIZE(0..MAX) OF TaggedRequest,         cmsSequence        SEQUENCE SIZE(0..MAX) OF TaggedContentInfo,         otherMsgSequence   SEQUENCE SIZE(0..MAX) OF OtherMsg   }   -- controlSequence consists of a sequence of control attributes.  The   control attributes defined in this document are found in section 5.   As control sequences are defined by OIDs, other parties can define   additional control attributes. Unrecognized OIDs MUST result in no   part of the request being successfully processed.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人中文字幕合集| 日韩av电影免费观看高清完整版 | 91丨九色丨黑人外教| 九色|91porny| 九九**精品视频免费播放| 日韩和欧美一区二区三区| 日韩制服丝袜av| 蜜臀av一区二区| 久久99久久精品欧美| 国产伦精一区二区三区| 成人av免费网站| 在线国产亚洲欧美| 91精品国产综合久久久久| 日韩情涩欧美日韩视频| 久久精品免视看| 国产精品成人免费| 一区二区高清免费观看影视大全 | 欧美视频一区二区三区| 在线电影国产精品| 欧美成人精品福利| 中文字幕中文在线不卡住| 亚洲色图都市小说| 天堂精品中文字幕在线| 精品一区二区在线视频| 国产精品资源在线看| heyzo一本久久综合| 欧美午夜影院一区| 日韩欧美国产系列| 国产精品久久久久久久裸模| 一区二区三区中文字幕| 日本网站在线观看一区二区三区| 久久99精品久久久久久国产越南| 99久久久久久| 欧美一区三区四区| 国产精品福利一区二区三区| 亚洲国产美女搞黄色| 国产一区二区福利| 99精品黄色片免费大全| 91精品国产91久久久久久一区二区 | 国产精品久久久久久久久久久免费看 | 国产电影一区二区三区| 一本久道久久综合中文字幕 | 免费观看成人鲁鲁鲁鲁鲁视频| 国内一区二区视频| 欧美日韩视频不卡| 国产欧美日韩激情| 秋霞影院一区二区| 色94色欧美sute亚洲13| 久久久天堂av| 奇米888四色在线精品| 91麻豆国产香蕉久久精品| 精品国产网站在线观看| 亚洲国产日韩在线一区模特| 国产福利不卡视频| 欧美电视剧在线观看完整版| 亚洲精品中文在线| av一区二区三区黑人| 精品国产污网站| 日本午夜一区二区| 欧美在线|欧美| 亚洲视频1区2区| 国产传媒日韩欧美成人| 91麻豆精品国产无毒不卡在线观看| 亚洲男人的天堂一区二区| 国产精品一区二区在线观看不卡| 7777精品伊人久久久大香线蕉超级流畅 | 欧美高清一级片在线| 亚洲欧美另类久久久精品2019| 国产不卡高清在线观看视频| 欧美成人aa大片| 免费高清成人在线| 欧美日韩一区国产| 亚洲动漫第一页| 欧美日韩亚洲综合一区二区三区| 伊人性伊人情综合网| 91婷婷韩国欧美一区二区| 国产精品第13页| 色综合久久久久网| 亚洲蜜臀av乱码久久精品| 99视频一区二区| 亚洲蜜桃精久久久久久久| 91亚洲大成网污www| 一区二区三区四区亚洲| 色综合中文综合网| 成人18视频在线播放| 国产精品视频yy9299一区| 丰满白嫩尤物一区二区| 亚洲国产高清不卡| 91色九色蝌蚪| 亚洲综合图片区| 91.麻豆视频| 激情综合色综合久久综合| 久久久久久久久久久电影| 成人一区二区三区中文字幕| 国产精品久久夜| 91国偷自产一区二区三区成为亚洲经典 | 波多野结衣亚洲| 亚洲线精品一区二区三区| 欧美电影在线免费观看| 精品一区二区三区av| 国产欧美1区2区3区| 色综合中文字幕国产 | 中文字幕第一区综合| 97久久人人超碰| 亚洲国产一区二区三区| 日韩久久久久久| k8久久久一区二区三区 | 久久久久九九视频| bt7086福利一区国产| 午夜精品久久久久久久久久| 精品久久国产老人久久综合| www.欧美日韩| 免费看欧美女人艹b| 国产精品网曝门| 91精品国产手机| 国产高清一区日本| 日韩有码一区二区三区| 亚洲国产精品二十页| 6080午夜不卡| 色婷婷综合久久久| 精品一区二区成人精品| 亚洲精品成人天堂一二三| 精品国产乱码久久久久久闺蜜| 99国产一区二区三精品乱码| 免费观看在线综合色| 亚洲综合色区另类av| 日本一区二区三区四区在线视频| 在线观看亚洲一区| 成人在线一区二区三区| 秋霞午夜鲁丝一区二区老狼| 亚洲精品免费视频| 国产日产精品1区| 欧美变态tickle挠乳网站| 91年精品国产| 处破女av一区二区| 九九热在线视频观看这里只有精品| 亚洲国产一区二区视频| 亚洲天堂久久久久久久| 国产亚洲制服色| 日韩无一区二区| 欧美一区二区免费| 欧美日本在线看| 欧美图片一区二区三区| 色婷婷精品大在线视频 | 日韩精品久久久久久| 亚洲私人影院在线观看| 久久精品夜色噜噜亚洲aⅴ| 欧美一区二区三区在| 5月丁香婷婷综合| 欧美精品日韩综合在线| 欧美三级电影一区| 日本道在线观看一区二区| 91免费精品国自产拍在线不卡| 国产东北露脸精品视频| 国产91精品精华液一区二区三区| 美女在线观看视频一区二区| 奇米精品一区二区三区在线观看| 日本一不卡视频| 日本不卡在线视频| 狠狠色综合播放一区二区| 九色porny丨国产精品| 国产成人精品免费网站| 懂色av一区二区三区免费看| 国产xxx精品视频大全| 欧美性大战久久久| 欧美综合欧美视频| 欧美日韩和欧美的一区二区| 884aa四虎影成人精品一区| 4hu四虎永久在线影院成人| 日韩午夜在线观看| 久久先锋影音av鲁色资源| 26uuu久久天堂性欧美| 国产精品网站一区| 亚洲伊人色欲综合网| 亚洲www啪成人一区二区麻豆| 美女视频黄久久| 国产91清纯白嫩初高中在线观看| 99综合影院在线| 欧美日韩精品综合在线| 欧美电视剧在线看免费| 国产精品国产三级国产普通话99 | 2021国产精品久久精品| 国产调教视频一区| 亚洲一区国产视频| 首页亚洲欧美制服丝腿| 国产综合一区二区| 色国产精品一区在线观看| 日韩视频免费观看高清在线视频| 国产三级一区二区三区| 亚洲午夜成aⅴ人片| 国产综合色精品一区二区三区| eeuss影院一区二区三区| 欧美色图12p| 亚洲国产精品国自产拍av| 性欧美疯狂xxxxbbbb| 成人一区二区三区中文字幕| 6080亚洲精品一区二区| 中文字幕一区二区三区视频| 日本视频一区二区三区| 色综合中文字幕国产|