亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2797.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   The CMC status info control is used in full PKI Response messages to   return information on a client request.  Servers MAY emit multiple   CMC status info controls referring to a single body part. Clients   MUST be able to deal with multiple CMC status info controls in a   response message. This statement uses the following ASN.1 definition:      CMCStatusInfo ::= SEQUENCE {           cMCStatus           CMCStatus,           bodyList            SEQUENCE SIZE (1..MAX) OF BodyPartID,           statusString        UTF8String OPTIONAL,           otherInfo           CHOICE {             failInfo            CMCFailInfo,             pendInfo            PendInfo } OPTIONAL      }      PendInfo ::= SEQUENCE {           pendToken           OCTET STRING,           pendTime            GeneralizedTime      }Myers, et al.               Standards Track                    [Page 17]RFC 2797        Certificate Management Messages over CMS      April 2000      -- cMCStatus is described in section 5.1.1      -- bodyList contains the list of body parts in the request message      to which this status information applies.  If an error is being      returned for a simple enrollment message, body list will contain a      single integer of value '1'.      -- statusString contains a string with additional description      information.  This string is human readable.      -- failInfo is described in section 5.1.2. It provides a detailed      error on what the failure was.  This choice is present only if      cMCStatus is failed.      -- pendToken is the token to be used in the queryPending control      attribute.      -- pendTime contains the suggested time the server wants to be      queried about the status of the request.   If the cMCStatus field is success, the CMC Status Info Control MAY be   omitted unless it is only item in the response message.  If no status   exists for a certificate request or other item requiring processing,   then the value of success is to be assumed.5.1.1   CMCStatus values   CMCStatus is a field in the CMCStatusInfo structure.  This field   contains a code representing the success or failure of a specific   operation.  CMCStatus has the ASN.1 structure of:      CMCStatus ::= INTEGER {           success                (0),           -- request was granted           -- reserved            (1),           -- not used, defined where the original structure was defined           failed                 (2),           -- you don't get what you want, more information elsewhere in      the message           pending                (3),           -- the request body part has not yet been processed,           -- requester is responsible to poll back on this           -- pending may only be return for certificate request      operations.           noSupport              (4),           -- the requested operation is not supported           confirmRequired        (5)Myers, et al.               Standards Track                    [Page 18]RFC 2797        Certificate Management Messages over CMS      April 2000           -- conformation using the idConfirmCertAcceptance control is      required           -- before use of certificate      }5.1.2   CMCFailInfo   CMCFailInfo conveys information relevant to the interpretation of a   failure condition. The CMCFailInfo has the following ASN.1 structure:      CMCFailInfo ::= INTEGER {           badAlg            (0)           -- Unrecognized or unsupported algorithm           badMessageCheck   (1)           -- integrity check failed           badRequest        (2)           -- transaction not permitted or supported           badTime           (3)           -- Message time field was not sufficiently close to the system      time           badCertId         (4)           -- No certificate could be identified matching the provided      criteria           unsuportedExt     (5)           -- A requested X.509 extension is not supported by the      recipient CA.           mustArchiveKeys   (6)           -- Private key material must be supplied           badIdentity       (7)           -- Identification Attribute failed to verify           popRequired       (8)           -- Server requires a POP proof before issuing certificate           popFailed         (9)           -- POP processing failed           noKeyReuse        (10)           -- Server policy does not allow key re-use           internalCAError   (11)           tryLater          (12)      }   Additional failure reasons MAY be defined for closed environments   with a need.Myers, et al.               Standards Track                    [Page 19]RFC 2797        Certificate Management Messages over CMS      April 20005.2  Identification and IdentityProof Control Attributes   Some CAs and LRAs require that a proof of identity be included in a   certification request.  Many different ways of doing this exist with   different degrees of security and reliability.  Most people are   familiar with the request of a bank to provide your mother's maiden   name as a form of identity proof.   CMC provides one method of proving the client's identity based on a   shared secret between the certificate requestor and the verifying   authority.  If clients support full request messages, clients MUST   implement this method of identity proof.  Servers MUST provide this   method and MAY also have a bilateral method of similar strength   available.   The CMC method starts with an out-of-band transfer of a token (the   shared secret).  The distribution of this token is beyond the scope   of this document.  The client then uses this token for an identity   proof as follows:   1. The reqSequence field of the PKIData object (encoded exactly as it      appears in the request message including the sequence type and      length) is the value to be validated.   2. A SHA1 hash of the token is computed.   3. An HMAC-SHA1 value is then computed over the value produced in      Step 1, as described in [HMAC], using the hash of the token from      Step 2 as the shared secret value.   4. The 160-bit HMAC-SHA1 result from Step 3 is then encoded as the      value of the identityProof attribute.   When the server verifies the identityProof attribute, it computes the   HMAC-SHA1 value in the same way and compares it to the identityProof   attribute contained in the enrollment request.   If a server fails the verification of an identityProof attribute and   the server returns a response message, the failInfo attribute MUST be   present in the response and MUST have a value of badIdentity.   Optionally, servers MAY require the inclusion of the unprotected   identification attribute with an identification attribute.  The   identification attribute is intended to contain either a text string   or a numeric quantity, such as a random number, which assists the   server in locating the shared secret needed to validate the contents   of the identityProof attribute.  Numeric values MUST be converted to   text string representations prior to encoding as UTF8-STRINGs in this   attribute.  If the identification control attribute is included inMyers, et al.               Standards Track                    [Page 20]RFC 2797        Certificate Management Messages over CMS      April 2000   the message, the derivation of the shared secret in step 2 is altered   so that the hash of the concatenation of the token and the identity   value are hashed rather than just the token.5.2.1  Hardware Shared Secret Token Generation   The shared secret between the end-entity and the identity verify is   sometimes transferred using a hardware device that generates a series   of tokens based on some shared secret value.  The user can therefore   prove their identity by transferring this token in plain text along   with a name string.  The above protocol can be used with a hardware   shared-secret token generation device by the following modifications:   1. The identification attribute MUST be included and MUST contain the      hardware-generated token.   2. The shared secret value used above is the same hardware-generated      token.   3. All certification requests MUST have a subject name and the      subject name MUST contain the fields required to identify the      holder of the hardware token device.5.3  Linking Identity and POP Information   In a PKI Full Request message identity information about the   creator/author of the message is carried in the signature of the CMS   SignedData object containing all of the certificate requests.   Proof-of-possession information for key pairs requesting   certification, however, is carried separately for each PKCS#10 or   CRMF message.  (For keys capable of generating a digital signature,   the POP is provided by the signature on the PKCS#10 or CRMF request.   For encryption-only keys the controls described in Section 5.7 below   are used.)  In order to prevent substitution-style attacks we must   guarantee that the same entity generated both the POP and proof-of-   identity information.   This section describes two mechanisms for linking identity and POP   information: witness values cryptographically derived from the   shared-secret (Section 5.3.1) and shared-secret/subject DN matching   (Section 5.3.2).  Clients and servers MUST support the witness value   technique.  Clients and servers MAY support shared-secret/subject DN   matching or other bilateral techniques of similar strength.  The idea   behind both mechanisms is to force the client to sign some data into   each certificate request that can be directly associated with the   shared-secret; this will defeat attempts to include certificate   requests from different entities in a single Full PKI Request   message.Myers, et al.               Standards Track                    [Page 21]RFC 2797        Certificate Management Messages over CMS      April 20005.3.1  Witness values derived from the shared-secret   The first technique for doing identity-POP linking works by forcing   the client to include a piece of information cryptographically-   derived from the shared-secret token as a signed extension within   each certificate request (PKCS#10 or CRMF) message.  This technique   is useful if null subject DNs are used (because, for example, the   server can generate the subject DN for the certificate based only on   the shared secret).  Processing begins when the client receives the   shared-secret token out-of-band from the server.  The client then   computes the following values:   1. The client generates a random byte-string, R, which SHOULD be at      least 512 bits in length.   2. A SHA1 hash of the token is computed.   3. An HMAC-SHA1 value is then computed over the random value produced      in Step 1, as described in [HMAC], using the hash of the token      from Step 2 as the shared secret.   4. The random value produced in Step 1 is encoded as the value of an      idPOPLinkRandom control attribute.  This control attribute MUST be      included in the Full PKI Request message.   5. The 160-bit HMAC-SHA1 result from Step 3 is encoded as the value      of an idPOPLinkWitness extension to the certificate request.      a. For CRMF, idPOPLinkWitness is included in the controls section         of the CertRequest structure.      b. For PKCS#10, idPOPLinkWitness is included in the attributes         section of the CertificationRequest structure.   Upon receipt, servers MUST verify that each certificate request   contains a copy of the idPOPLinkWitness and that its value was   derived in the specified manner from the shared secret and the random   string included in the idPOPLinkRandom control attribute.5.3.2  Shared-secret/subject DN matching   The second technique for doing identity-POP linking is to link a   particular subject distinguished name (subject DN) to the shared-   secrets that are distributed out-of-band and to require that clients   using the shared-secret to prove identity include that exact subject   DN in every certificate request.  It is expected that many client-   server connections using shared-secret based proof-of-identity will   use this mechanism. (It is common not to omit the subject DN   information from the certificate request messages.)   When the shared secret is generated and transferred out-of-band to   initiate the registration process (Section 5.2), a particular subject   DN is also associated with the shared secret and communicated to the   client.  (The subject DN generated MUST be unique per entity inMyers, et al.               Standards Track                    [Page 22]RFC 2797        Certificate Management Messages over CMS      April 2000

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩女优电影在线观看| 国产美女主播视频一区| 精品一区二区在线视频| 国产精品99久| 一本大道久久a久久综合婷婷 | 欧美激情在线一区二区三区| 国产精品久久久久久亚洲伦| 亚洲一区自拍偷拍| 久久精品国产77777蜜臀| 成人妖精视频yjsp地址| 色婷婷久久一区二区三区麻豆| 91精品久久久久久久99蜜桃| 久久精品无码一区二区三区| 伊人性伊人情综合网| 久久精品国产澳门| 一本色道久久综合亚洲91| 欧美大胆一级视频| 自拍视频在线观看一区二区| 免费不卡在线视频| 99这里只有精品| 日韩欧美国产一二三区| 一区视频在线播放| 蜜芽一区二区三区| 91视频在线观看| 日韩精品一区二区在线观看| 亚洲欧洲一区二区在线播放| 麻豆freexxxx性91精品| 色综合咪咪久久| 国产三级一区二区| 日韩二区三区在线观看| 99在线热播精品免费| 精品日韩欧美在线| 亚洲一区二区美女| 97久久久精品综合88久久| 精品国产乱码久久久久久久久 | 欧美日韩亚洲另类| 欧美激情一区在线| 热久久一区二区| 欧美亚洲丝袜传媒另类| 国产精品不卡在线| 国产麻豆精品在线观看| 欧美精品在线视频| 一区二区三区中文字幕在线观看| 国产999精品久久久久久绿帽| 91精品国产91久久久久久最新毛片 | 丝袜诱惑制服诱惑色一区在线观看| 成人av电影在线| www久久精品| 奇米色一区二区| 欧美日韩国产区一| 亚洲黄色免费网站| aaa国产一区| 国产精品久久久久久福利一牛影视 | 色综合中文字幕| 国产精品国产三级国产有无不卡| 国产一区二区三区在线观看免费 | 日韩av成人高清| 欧美日韩激情一区二区三区| 亚洲三级小视频| av中文字幕不卡| 成人免费在线播放视频| 成人免费黄色大片| 国产精品天干天干在线综合| 国产一区二区三区免费在线观看| 日韩精品资源二区在线| 美女www一区二区| 日韩一区二区三区视频在线观看| 日韩—二三区免费观看av| 91精品国产色综合久久ai换脸| 日韩精品一二三| 日韩一区二区免费在线观看| 蜜芽一区二区三区| 精品国产三级a在线观看| 久久国产欧美日韩精品| 久久嫩草精品久久久久| 国产精品69毛片高清亚洲| 国产欧美日韩另类一区| 成人av综合一区| 亚洲欧美视频在线观看视频| 色婷婷av久久久久久久| 亚洲一区二区三区视频在线 | 日韩精品视频网站| 日韩一区二区三区高清免费看看| 日韩av一级片| 精品久久久久久久久久久院品网| 国产乱码精品一区二区三区av| 久久精品这里都是精品| 成人午夜看片网址| 亚洲人精品午夜| 在线免费观看日韩欧美| 日本美女视频一区二区| 欧美videos大乳护士334| 国产成人av在线影院| 亚洲图片你懂的| 欧美日韩性生活| 精品一区二区免费| 国产精品素人视频| 91久久免费观看| 亚洲大片一区二区三区| 日韩精品一区二区三区在线观看| 国产精品自在在线| 国产精品卡一卡二| 欧美日韩国产一区| 国内外成人在线视频| 中文字幕人成不卡一区| 欧美色网站导航| 狠狠色综合日日| 国产精品欧美一级免费| 欧美午夜电影在线播放| 九九精品一区二区| 中文字幕中文字幕在线一区| 欧美撒尿777hd撒尿| 精品一区中文字幕| 日韩美女视频一区二区| 日韩一区二区三区在线| 成人a区在线观看| 日韩精品成人一区二区三区 | 成人丝袜18视频在线观看| 亚洲综合男人的天堂| 337p日本欧洲亚洲大胆精品| 91亚洲精品乱码久久久久久蜜桃| 日韩1区2区3区| 国产精品二三区| 欧美一区二区三级| 成人av在线一区二区三区| 日韩av一二三| 国产精品理伦片| 欧美成人女星排名| 色综合久久久久久久久| 久久激五月天综合精品| 亚洲综合一区在线| 久久久久久夜精品精品免费| 欧美综合在线视频| 国产不卡在线视频| 日韩国产高清在线| 最新成人av在线| 久久久久久久综合狠狠综合| 欧美日韩国产综合一区二区| jizz一区二区| 国精品**一区二区三区在线蜜桃| 一区二区成人在线观看| 中文字幕av一区二区三区免费看| 欧美色爱综合网| 99热在这里有精品免费| 激情综合色综合久久综合| 亚洲一区二区欧美激情| 国产精品传媒入口麻豆| 国产天堂亚洲国产碰碰| 日韩视频国产视频| 欧美日韩精品欧美日韩精品一 | 日韩毛片视频在线看| 久久日韩精品一区二区五区| 欧美精品国产精品| 色欧美日韩亚洲| 成人黄页毛片网站| 激情五月婷婷综合| 日韩黄色免费电影| 亚洲午夜在线观看视频在线| 日韩一区欧美小说| 国产精品―色哟哟| 国产欧美一区在线| 精品国产成人在线影院 | 国产伦精品一区二区三区视频青涩| 亚洲bt欧美bt精品| 亚洲制服丝袜av| 亚洲乱码日产精品bd| 国产精品欧美一级免费| 久久精品人人做人人爽人人| 日韩精品中文字幕在线不卡尤物| 欧美美女一区二区三区| 欧美无砖专区一中文字| 色偷偷成人一区二区三区91| 99riav久久精品riav| 99视频一区二区| voyeur盗摄精品| 99免费精品在线观看| 不卡的av在线播放| 成人av网站在线| 成人午夜激情片| aa级大片欧美| 色狠狠色狠狠综合| 在线看一区二区| 欧美午夜精品一区二区蜜桃 | 日本aⅴ免费视频一区二区三区| 偷拍自拍另类欧美| 日本在线不卡视频| 麻豆国产91在线播放| 久久国产视频网| 国产尤物一区二区在线| 国产精一品亚洲二区在线视频| 国产成人在线视频免费播放| 成人中文字幕合集| 91丨porny丨在线| 欧洲国内综合视频| 欧美日韩成人一区二区| 91精品国产免费久久综合| 亚洲精品一区二区三区四区高清 | eeuss鲁一区二区三区| 99re成人在线| 欧美日韩mp4|