亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2797.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
RFC 2797        Certificate Management Messages over CMS      April 2000   For the enrollment response the signedData wrapper allows the server   to sign the returning data, if any exists, and to carry the   certificates and CRLs for the enrollment request.  If no data is   being returned beyond the certificates, no signerInfo objects are   placed in the signedData object.3.6.2  Enveloped Data   EnvelopedData is the primary method of providing confidentiality for   sensitive information in this protocol.  The protocol currently uses   EnvelopedData to provide encryption of an entire request (see section   4.5).  The envelopedData object would also be used to wrap private   key material for key archival.   Servers MUST implement envelopedData according to [CMS].  There is an   ambiguity (about encrypting content types other than id-data) in the   PKCS7 specification that has lead to non-interoperability.3.7  Other Message Bodies   The other message body portion of the message allows for arbitrary   data objects to be carried as part of a message.  This is intended to   contain data that is not already wrapped in a CMS contentInfo object.   The data is ignored unless a control attribute references the data by   bodyPartId.     OtherMsg ::= SEQUENCE {         bodyPartID        BodyPartID,         otherMsgType      OBJECT IDENTIFIER,         otherMsgValue     ANY DEFINED BY otherMsgType }   -- bodyPartID contains the unique id of this object   -- otherMsgType contains the OID defining both the usage of this body   part and the syntax of the value associated with this body part   -- otherMsgValue contains the data associated with the message body   part.4.  PKI Messages   This section discusses the details of putting together the different   enrollment request and response messages.Myers, et al.               Standards Track                    [Page 12]RFC 2797        Certificate Management Messages over CMS      April 20004.1  Simple Enrollment Request   The simplest form of an enrollment request is a plain PKCS10 message.   If this form of enrollment request is used for a private key that is   capable of generating a signature, the PKCS10 MUST be signed with   that private key.  If this form of the enrollment request is used for   a D-H key, then the D-H POP mechanism described in [DH-POP] MUST be   used.   Servers MUST support the Simple Enrollment Request message. If the   Simple Enrollment Request message is used, servers MUST return the   Simple Enrollment Response message (see Section 4.3) if the   enrollment request is granted.  If the enrollment request fails, the   Full Enrollment Response MAY be returned or no response MAY be   returned.   Many advanced services specified in this memo are not supported by   the Simple Enrollment Request message.4.2  Full PKI Request   The Full Enrollment Request provides the most functionality and   flexibility.  Clients SHOULD use the Full Enrollment Request message   when enrolling.  Servers MUST support the Full Enrollment Request   message.  An enrollment response (full or simple as appropriate) MUST   be returned to all Full Enrollment Requests.   The Full Enrollment Request message consists of a PKIData object   wrapped in a signedData CMS object. The objects in the PKIData are   ordered as follows:   1. All Control Attributes,   2. All certification requests,   3. All CMS objects,   4. All other messages.   Each element in a Full Enrollment Request is identified by a Body   Part Identifier. If duplicate ids are found, the server MUST return   the error badRequest with a bodyPartID of 0.   The signedData object wrapping the PKIData may be signed either by   the private key material of the signature certification request, or   by a previously certified signature key. If the private key of a   signature certification request is being used, then:   a) the certification request containing the corresponding public key      MUST include a Subject Key Identifier extension request,   b) the subjectKeyIdentifier form of signerInfo MUST be used, andMyers, et al.               Standards Track                    [Page 13]RFC 2797        Certificate Management Messages over CMS      April 2000   c) the value of the subjectKeyIdentifier form of signerInfo MUST be      the Subject Key Identifier specified in the corresponding      certification request.   (The subjectKeyIdentifier form of signerInfo is used here because no   certificates have yet been issued for the signing key.) If the   request key is used for signing, there MUST be only one signerInfo   object in the signedData object.   When creating a message to renew a certificate, the following should   be taken into consideration:   1. The identification and identityProof control statements are not      required.  The same information is provided by the use of an      existing certificate from the CA when signing the enrollment      message.   2. CAs and LRAs may impose additional restrictions on the signing      certificate used.  They may require that the most recently issued      signing certificate for an entity be used.   3. A renewal message may occur either by creating a new set of keys,      or by re-using an existing set of keys.  Some CAs may prevent re-      use of keys by policy.  In this case the CA MUST return NOKEYREUSE      as the failure code.4.3  Simple Enrollment Response   Servers SHOULD use the simple enrollment response message whenever   possible.  Clients MUST be able to process the simple enrollment   response message.  The simple enrollment response message consists of   a signedData object with no signerInfo objects on it.  The   certificates requested are returned in the certificate bag of the   signedData object.   Clients MUST NOT assume the certificates are in any order. Servers   SHOULD include all intermediate certificates needed to form complete   chains to one or more self-signed certificates, not just the newly   issued certificate(s). The server MAY additionally return CRLs in the   CRL bag.  Servers MAY include the self-signed certificates. Clients   MUST NOT implicitly trust included self-signed certificate(s) merely   due to its presence in the certificate bag. In the event clients   receive a new self-signed certificate from the server, clients SHOULD   provide a mechanism to enable the user to explicitly trust the   certificate.Myers, et al.               Standards Track                    [Page 14]RFC 2797        Certificate Management Messages over CMS      April 20004.4  Full PKI Response   Servers MUST return full PKI response messages if a) a full PKI   request message failed or b) additional services other than returning   certificates are required.  Servers MAY return full PKI responses   with failure information for simple PKI requests. Following section   4.3 above, servers returning only certificates and a success status   to the client SHOULD use the simple PKI response message.   Clients MUST be able to process a full PKI response message.   The full enrollment response message consists of a signedData object   encapsulating a responseBody object.  In a responseBody object all   Control Attributes MUST precede all CMS objects.  The certificates   granted in an enrollment response are returned in the certificates   field of the immediately encapsulating signedData object.   Clients MUST NOT assume the certificates are in any order. Servers   SHOULD include all intermediate certificates needed to form complete   chains one ore more self-signed certificates, not just the newly   issued certificate(s). The server MAY additionally return CRLs in the   CRL bag.  Servers MAY include the self-signed certificates. Clients   MUST NOT implicitly trust included self-signed certificate(s) merely   due to its presence in the certificate bag. In the event clients   receive a new self-signed certificate from the server, clients SHOULD   provide a mechanism to enable the user to explicitly trust the   certificate.4.5  Application of Encryption to a PKI Message   There are occasions where a PKI request or response message must be   encrypted in order to prevent any information about the enrollment   from being accessible to unauthorized entities.  This section   describes the means used to encrypt a PKI message.  This section is   not applicable to a simple enrollment message.   Confidentiality is provided by wrapping the PKI message (a signedData   object) in a CMS EnvelopedData object.  The nested content type in   the EnvelopedData is id-signedData.  Note that this is different from   S/MIME where there is a MIME layer placed between the encrypted and   signed data objects.  It is recommended that if an enveloped data   layer is applied to a PKI message, a second signing layer be placed   outside of the enveloped data layer.  The following figure shows how   this nesting would be done:Myers, et al.               Standards Track                    [Page 15]RFC 2797        Certificate Management Messages over CMS      April 2000     Normal              Option 1                  Option 2     ------              --------                  --------     SignedData          EnvelopedData             SignedData      PKIData             SignedData                EnvelopedData                           PKIData                   SignedData                                                      PKIData   Options 1 and 2 provide the benefit of preventing leakage of   sensitive data by encrypting the information.  LRAs can remove the   enveloped data wrapping, and replace or forward without further   processing. Section 6 contains more information about LRA processing.   PKI Messages MAY be encrypted or transmitted in the clear.  Servers   MUST provided support for all three versions.   Alternatively, an authenticated, secure channel could exist between   the parties requiring encryption.  Clients and servers MAY use such   channels instead of the technique described above to provide secure,   private communication of PKI request and response messages.5.  Control Attributes   Control attributes are carried as part of both PKI requests and   responses. Each control attribute is encoded as a unique Object   Identifier followed by that data for the control attribute.  The   encoding of the data is based on the control attribute object   identifier.  Processing systems would first detect the OID and   process the corresponding attribute value prior to processing the   message body.   The following table lists the names, OID and syntactic structure for   each of the control attributes documented in this memo.Myers, et al.               Standards Track                    [Page 16]RFC 2797        Certificate Management Messages over CMS      April 2000   Control Attribute         OID            Syntax   -----------------       ----------     --------------   cMCStatusInfo           id-cmc 1       CMCStatusInfo   identification          id-cmc 2       UTF8String   identityProof           id-cmc 3       OCTET STRING   dataReturn              id-cmc 4       OCTET STRING   transactionId           id-cmc 5       INTEGER   senderNonce             id-cmc 6       OCTET STRING   recipientNonce          id-cmc 7       OCTET STRING   addExtensions           id-cmc 8       AddExtensions   encryptedPOP            id-cmc 9       EncryptedPOP   decryptedPOP            id-cmc 10      DecryptedPOP   lraPOPWitness           id-cmc 11      LraPOPWitness   getCert                 id-cmc 15      GetCert   getCRL                  id-cmc 16      GetCRL   revokeRequest           id-cmc 17      RevokeRequest   regInfo                 id-cmc 18      OCTET STRING   responseInfo            id-cmc 19      OCTET STRING   QueryPending            id-cmc 21      OCTET STRING   idPOPLinkRandom         id-cmc 22      OCTET STRING   idPOPLinkWitness        id-cmc 23      OCTET STRING   idConfirmCertAcceptance id-cmc 24      CMCCertId5.1  CMC Status Info Control Attribute

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
精品制服美女丁香| 91一区二区三区在线观看| 精品免费日韩av| 日韩毛片一二三区| 国产麻豆精品一区二区| 国产欧美日本一区视频| 99久久精品国产精品久久| 一区二区三区成人| 日本精品一区二区三区高清| 一区二区三区日韩| 欧美亚洲尤物久久| 国产精品亚洲人在线观看| 有坂深雪av一区二区精品| 精品国产欧美一区二区| 97国产精品videossex| 蜜桃视频在线观看一区| 亚洲免费在线播放| 国产午夜精品美女毛片视频| 色婷婷国产精品| 精品一区二区三区免费播放| 伊人一区二区三区| 国产精品免费视频观看| 欧美变态tickling挠脚心| 欧美日韩激情一区二区三区| 粉嫩绯色av一区二区在线观看| 亚洲一区电影777| 亚洲少妇屁股交4| 久久综合狠狠综合久久激情 | 亚洲一线二线三线视频| 久久先锋影音av鲁色资源| 日韩一区二区三区视频在线观看| 99久久er热在这里只有精品66| 成人午夜在线视频| 蜜桃视频在线观看一区| 午夜精品国产更新| 石原莉奈在线亚洲三区| 亚洲国产aⅴ天堂久久| 亚洲成人午夜电影| 亚洲国产wwwccc36天堂| 亚洲国产一区二区三区| 亚洲一区中文日韩| 日韩成人免费看| 国产精品一区在线观看乱码| 波多野结衣亚洲| 欧美体内she精视频| 日韩欧美一二三| 亚洲人妖av一区二区| 亚洲成人中文在线| 久久精品久久综合| 成人av网站在线观看免费| 色av成人天堂桃色av| 日韩精品一区二区三区四区视频| 中文子幕无线码一区tr| 日韩国产欧美一区二区三区| 激情综合五月天| 欧美午夜不卡在线观看免费| 精品区一区二区| 亚洲成人高清在线| 不卡的av在线| 亚洲精品在线观| 美女脱光内衣内裤视频久久网站| 成人丝袜高跟foot| 精品国产百合女同互慰| 午夜欧美一区二区三区在线播放| av在线不卡网| 日韩理论片一区二区| 国产综合久久久久久鬼色| 91精品国产91久久久久久一区二区 | 91热门视频在线观看| 精品毛片乱码1区2区3区| 一区二区三区日韩精品| 成人开心网精品视频| 日韩你懂的在线观看| 另类小说图片综合网| 欧美一区二区三区啪啪| 伊人夜夜躁av伊人久久| 成人黄色一级视频| 亚洲欧洲成人精品av97| 一本一本久久a久久精品综合麻豆 一本一道波多野结衣一区二区 | 国产91精品一区二区麻豆亚洲| 日韩女优制服丝袜电影| 日本中文在线一区| 欧美一区二区三区成人| 日本亚洲最大的色成网站www| 在线不卡的av| 免费观看91视频大全| 精品国产sm最大网站| 国产精品亚洲一区二区三区妖精 | 一区二区三区四区国产精品| 99精品国产99久久久久久白柏| 国产精品黄色在线观看| 欧美日韩精品欧美日韩精品| 日韩精品福利网| 国产精品三级在线观看| av色综合久久天堂av综合| 亚洲国产成人精品视频| 亚洲蜜臀av乱码久久精品| 一本久久综合亚洲鲁鲁五月天| 亚洲精品国久久99热| 欧美一区二区精品久久911| 九九视频精品免费| 亚洲一区二区三区四区在线观看 | 制服丝袜一区二区三区| 成人免费视频免费观看| 日韩高清在线一区| 17c精品麻豆一区二区免费| 日韩欧美在线观看一区二区三区| 国内外精品视频| 午夜久久久影院| 一区二区三区欧美久久| 久久精品视频在线免费观看| 欧美大片顶级少妇| 欧美一区三区四区| 欧美日韩成人在线| 欧美蜜桃一区二区三区 | 欧美在线免费观看亚洲| 成人精品高清在线| 波多野结衣在线一区| 成人开心网精品视频| 岛国精品一区二区| 粉嫩av一区二区三区在线播放 | 正在播放亚洲一区| 91精品国产综合久久精品图片| 欧洲一区二区三区在线| 色悠悠久久综合| 欧美日韩国产天堂| 成人免费毛片app| 91在线播放网址| 91精品国产综合久久精品图片| 日韩欧美国产三级| 久久久www免费人成精品| 国产农村妇女毛片精品久久麻豆 | 欧美一个色资源| 久久精品欧美一区二区三区不卡| 2017欧美狠狠色| 一区二区三区加勒比av| 麻豆一区二区三| 99国产欧美另类久久久精品| 欧美久久婷婷综合色| 久久久久国色av免费看影院| 亚洲黄色尤物视频| 国产成人午夜电影网| 欧美最猛黑人xxxxx猛交| 欧美不卡视频一区| 亚洲伊人伊色伊影伊综合网| 国产suv精品一区二区三区| 欧美日韩成人在线| 亚洲美女淫视频| k8久久久一区二区三区 | 欧美一区二区三区免费在线看| 国产精品污污网站在线观看| 免费观看日韩电影| 精品视频在线视频| 亚洲精品精品亚洲| 一本一道波多野结衣一区二区| 久久久久久久久久久99999| 日本vs亚洲vs韩国一区三区| 日本精品一区二区三区高清| 中文字幕一区二区三区乱码在线| 精品综合久久久久久8888| 国产日韩高清在线| 国产成人免费在线观看| 国产亚洲福利社区一区| 国产成人精品免费视频网站| 欧美一区二区三区在线| 青青草成人在线观看| 欧美成人性福生活免费看| 国产在线一区观看| 国产精品视频第一区| 91亚洲精华国产精华精华液| 亚洲女爱视频在线| 欧美日韩国产综合一区二区| 亚洲成人av一区二区| 精品久久久久香蕉网| 国产盗摄精品一区二区三区在线 | 五月婷婷激情综合| 久久色成人在线| 在线免费观看视频一区| 老司机精品视频一区二区三区| 久久尤物电影视频在线观看| 粉嫩久久99精品久久久久久夜| 亚洲最大成人综合| 久久久精品国产免大香伊| 欧美色网站导航| 国产99精品在线观看| 午夜精品久久久| 日韩美女久久久| 国产欧美一区二区精品性| 欧美午夜免费电影| 99热精品一区二区| 国产精一区二区三区| 秋霞成人午夜伦在线观看| 亚洲欧洲三级电影| 久久久精品日韩欧美| 欧美一区二区三区免费| 欧美片网站yy| 欧美日韩在线播| 欧美日韩aaaaaa| 亚洲精品大片www| 最新国产の精品合集bt伙计|