亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2797.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   accordance with CA policy; a null subject DN cannot be used.  A   common practice could be to place the identification value as part of   the subject DN.)  When the client generates the Full PKI Request   message, it MUST use these two pieces of information as follows:   1. The client MUST include the specific subject DN that it received      along with the shared secret as the subject name in every      certificate request (PKCS#10 and/or CRMF) in the Full PKI Request.      The subject names in the requests MUST NOT be null.   2. The client MUST include the identityProof control attribute      (Section 5.2), derived from the shared secret, in the Full PKI      Request.   The server receiving this message MUST (a) validate the identityProof   control attribute and then, (b) check that the subject DN included in   each certificate request matches that associated with the shared   secret.  If either of these checks fails the certificate request MUST   be rejected.5.3.3  Renewal and Re-Key Messages   In a renewal or re-key message, the subject DN in (a) the certificate   referenced by the CMS SignerInfo object, and (b) all certificate   requests within the request message MUST match according to the   standard name match rules described in [PKIXCERT].5.4  Data Return Control Attribute   The data return control attribute allows clients to send arbitrary   data (usually some type of internal state information) to the server   and to have the data returned as part of the enrollment response   message.  Data placed in a data return statement is considered to be   opaque to the server.  The same control is used for both requests and   responses.  If the data return statement appears in an enrollment   message, the server MUST return it as part of the enrollment response   message.   In the event that the information in the data return statement needs   to be confidential, it is expected that the client would apply some   type of encryption to the contained data, but the details of this are   outside the scope of this specification.   An example of using this feature is for a client to place an   identifier marking the exact source of the private key material.   This might be the identifier of a hardware device containing the   private key.Myers, et al.               Standards Track                    [Page 23]RFC 2797        Certificate Management Messages over CMS      April 20005.5  Add Extensions Control Attribute   The Add Extensions control attribute is used by LRAs in order to   specify additional extensions that are to be placed on certificates.   This attribute uses the following ASN.1 definition:     AddExtensions ::= SEQUENCE {         pkiDataReference             BodyPartID         certReferences               SEQUENCE OF BodyPartID,         extensions                   SEQUENCE OF Extension     }      -- pkiDataReference field contains the body part id of the      embedded request message.      -- certReferences field is a list of references to one or more of      the payloads contained within a PKIData.  Each element of the      certReferences sequence MUST be equal to either the bodyPartID of      a TaggedCertificationRequest or the certReqId of the CertRequest      within a CertReqMsg.   By definition, the listed extensions are to      be applied to every element referenced in the certReferences      sequence.  If a request corresponding to bodyPartID cannot be      found, the error badRequest is returned referencing this control      attribute.      -- extensions field contains the sequence of extensions to be      applied to the referenced certificate requests.   Servers MUST be able to process all extensions defined in [PKIXCERT].   Servers are not required to be able to process every V3 X.509   extension transmitted using this protocol, nor are they required to   be able to process other, private extensions.  Servers are not   required to put all LRA-requested extensions into a certificate.   Servers are permitted to modify LRA-requested extensions.  Servers   MUST NOT alter an extension so as to reverse the meaning of a   client-requested extension If a certification request is denied due   to the inability to handle a requested extension and a response is   returned, the server MUST return a failInfo attribute with the value   of unsupportedExt.   If multiple Add Extensions statements exist in an enrollment message,   the exact behavior is left up to the certificate issuer policy.   However it is recommended that the following policy be used.  These   rules would be applied to individual extensions within an Add   Extensions control attribute (as opposed to an "all or nothing"   approach).Myers, et al.               Standards Track                    [Page 24]RFC 2797        Certificate Management Messages over CMS      April 2000   1. If the conflict is within a single PKIData object, the certificate      request would be rejected with an error of badRequest.   2. If the conflict is between different PKIData objects, the      outermost version of the extension would be used (allowing an LRA      to override the extension requested by the end-entyt).5.6  Transaction Management Control Attributes   Transactions are identified and tracked using a transaction   identifier.  If used, clients generate transaction identifiers and   retain their value until the server responds with a message that   completes the transaction.  Servers correspondingly include received   transaction identifiers in the response.   The transactionId attribute identifies a given transaction.  It is   used between client and server to manage the state of an operation.   Clients MAY include a transactionID attribute in request messages.   If the original request contains a transactionID attribute, all   subsequent request and response messages MUST include the same   transactionID attribute.  A server MUST use only transactionIds in   the outermost PKIdata object. TransactionIds on inner PKIdata objects   are for intermediate entities.   Replay protection can be supported through the use of sender and   recipient nonces. If nonces are used, in the first message of a   transaction, no recipientNonce is transmitted; a senderNonce is   instantiated by the message originator and retained for later   reference.  The recipient of a sender nonce reflects this value back   to the originator as a recipientNonce and includes it's own   senderNonce.  Upon receipt by the transaction originator of this   message, the originator compares the value of recipientNonce to its   retained value.  If the values match, the message can be accepted for   further security processing.  The received value for senderNonce is   also retained for inclusion in the next message associated with the   same transaction.   The senderNonce and recipientNonce attribute can be used to provide   application-level replay prevention. Clients MAY include a   senderNonce in the initial request message.  Originating messages   include only a value for senderNonce. If a message includes a   senderNonce, the response MUST include the transmitted value of the   previously received senderNonce as recipientNonce and include new   value for senderNonce. A server MUST use only nonces in the outermost   PKIdata object. Nonces on inner PKIdata objects are for intermediate   entities.Myers, et al.               Standards Track                    [Page 25]RFC 2797        Certificate Management Messages over CMS      April 20005.7  Proof-of-possession (POP) for encryption-only keys   Everything described in this section is optional to implement, for   both servers and clients. Servers MAY require this POP method be used   only if another POP method is unavailable. Servers SHOULD reject all   requests contained within a PKIData if any required POP is missing   for any element within the PKIData.   Many servers require proof that an entity requesting a certificate   for a public key actually possesses the corresponding private   component of the key pair.  For keys that can be used as signature   keys, signing the certification request with the private key serves   as a POP on that key pair.  With keys that can only be used for   encryption operations, POP MUST be performed by forcing the client to   decrypt a value.  See Section 5 of [CRMF] for a detailed discussion   of POP.   By necessity, POP for encryption-only keys cannot be done in one   round-trip, since there are four distinct phases:   1. Client tells the server about the public component of a new      encryption key pair.   2. Server sends the client a POP challenge, encrypted with the      presented public encryption key, which the client must decrypt.   3. Client decrypts the POP challenge and sends it back to the server.   4. Server validates the decrypted POP challenge and continues      processing the certificate request.   CMC defines two different attributes.  The first deals with the   encrypted challenge sent from the server to the user in step 2.  The   second deals with the decrypted challenge sent from the client to the   server in step 3.   The encryptedPOP attribute is used to send the encrypted challenge   from the server to the client.  As such, it is encoded as a tagged   attribute within the controlSequence of a ResponseBody.  (Note that   we assume that the message sent in Step 1 above is an enrollment   request and that the response in step 2 is a Full Enrollment Response   including a failureInfo specifying that a POP is explicitly required,   and providing the POP challenge in the encryptedPOP attribute.)      EncryptedPOP ::= SEQUENCE {           request        TaggedRequest,           cms            contentInfo,           thePOPAlgID    AlgorithmIdentifier,           witnessAlgID   AlgorithmIdentifier,           witness        OCTET STRINGMyers, et al.               Standards Track                    [Page 26]RFC 2797        Certificate Management Messages over CMS      April 2000      }      DecryptedPOP ::= SEQUENCE {           bodyPartID     BodyPartID,           thePOPAlgID    AlgorithmIdentifier,           thePOP         OCTET STRING      }   The encrypted POP algorithm works as follows:   1. The server generates a random value y and associates it with the      request.   2. The server returns the encrypted pop with the following fields      set:      a. request is the certificate request in the original request         message (it is included here so the client need not key a copy         of the request),      b. cms is an EnvelopedData object, the content type being id-data         and the content being the value y.  If the certificate request         contains a subject key identifier (SKI) extension, then the         recipient identifier SHOULD be the SKI.  If the         issuerAndSerialNumber form is used, the IsserName MUST be         encoded as NULL and the SerialNumber as the bodyPartId of the         certificate request,      c. thePOPAlgID contains the algorithm to be used in computing the         return POP value,      d. witnessAlgID contains the hash algorithm used on y to create         the field witness,      e. witness contains the hashed value of y.   3. The client decrypts the cms field to obtain the value y.  The      client computes H(y) using the witnessAlgID and compares to the      value of witness.  If the values do not compare or the decryption      is not successful, the client MUST abort the enrollment process.      The client aborts the process by sending a request message      containing a CMCStatusInfo control attribute with failInfo value      of popFailed.   4. The client creates the decryptedPOP as part of a new PKIData      message.  The fields in the decryptedPOP are:      a. bodyPartID refers to the certificate request in the new         enrollment message,      b. thePOPAlgID is copied from the encryptedPOP,      c. thePOP contains the possession proof.  This value is computed         by thePOPAlgID using the value y and request referenced in         (4a).   5. The server then re-computes the value of thePOP from its cached      value of y and the request and compares to the value of thePOP.      If the values do not match, the server MUST NOT issue the      certificate.  The server MAY re-issue a new challenge or MAY failMyers, et al.               Standards Track                    [Page 27]RFC 2797        Certificate Management Messages over CMS      April 2000      the request altogether.   When defining the algorithms for thePOPAlgID and witnessAlgID care   must be taken to ensure that the result of witnessAlgID is not a   useful value to shortcut the computation with thePOPAlgID.  Clients   MUST implement SHA-1 for witnessAlgID.  Clients MUST implement HMAC-   SHA1 for thePOPAlgID.  The value of y is used as the secret value in   the HMAC algorithm and the request referenced in (4a) is used as the   data.  If y is greater than 64 bytes, only the first 64 bytes of y   are used as the secret.   One potential problem with the algorithm above is the amount of state   that a CA needs to keep in order to verify the returned POP value.   This describes one of many possible ways of addressing the problem by   reducing the amount of state kept on the CA to a single (or small   set) of values.   1. Server generates random seed x, constant across all requests. (The      value of x would normally be altered on a regular basis and kept      for a short time afterwards.)   2. For certificate request R, server computes y = F(x,R).  F can be,      for example, HMAC-SHA1(x,R).  All that's important for      statelessness is that y be consistently computable with only known      state constant x and function F, other inputs coming from the cert      request structure.  y should not be predictable based on knowled

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色婷婷精品大视频在线蜜桃视频| 日韩理论片网站| 韩国av一区二区三区四区| 精品国精品国产| 国产福利91精品| 亚洲欧美自拍偷拍| 欧美性三三影院| 久久成人免费网| 国产日本亚洲高清| 在线亚洲精品福利网址导航| 性久久久久久久| 久久久.com| 91久久一区二区| 久久国产夜色精品鲁鲁99| 国产日韩精品久久久| 欧美自拍丝袜亚洲| 久久99热狠狠色一区二区| 亚洲国产精品成人综合色在线婷婷| 色婷婷久久综合| 精品一区二区国语对白| 亚洲精品视频在线看| 欧美videossexotv100| 91一区二区在线观看| 麻豆精品在线看| 亚洲日本成人在线观看| 4438成人网| 成人app软件下载大全免费| 亚洲高清久久久| 久久日韩粉嫩一区二区三区| 日本乱码高清不卡字幕| 国产在线视频精品一区| 亚洲国产综合在线| 国产日韩精品一区二区三区在线| 欧美日韩激情一区| jvid福利写真一区二区三区| 美女被吸乳得到大胸91| 一区二区三区精品在线观看| 久久女同互慰一区二区三区| 欧美乱熟臀69xxxxxx| av在线播放成人| 韩国女主播成人在线观看| 五月婷婷另类国产| 中文字幕一区二区视频| 日韩欧美国产1| 精品国产欧美一区二区| 色婷婷亚洲综合| 丁香婷婷深情五月亚洲| 成人福利视频在线看| 国产不卡视频在线播放| 香蕉影视欧美成人| 日韩理论片中文av| 久久众筹精品私拍模特| 欧美精品久久久久久久多人混战| a级精品国产片在线观看| 国产剧情一区在线| 日韩电影在线一区二区三区| 一区二区三区在线观看视频| 国产精品盗摄一区二区三区| 中文字幕一区二区三区色视频| 欧美性受xxxx黑人xyx| 精品影院一区二区久久久| 一区二区三区在线视频免费| 亚洲国产高清aⅴ视频| 欧美大片日本大片免费观看| 欧美日韩国产a| 欧美日韩国产小视频在线观看| 本田岬高潮一区二区三区| 国产一本一道久久香蕉| 极品少妇一区二区三区精品视频 | 国产成人在线电影| 精品中文av资源站在线观看| 日本成人在线一区| 男男gaygay亚洲| 日本麻豆一区二区三区视频| 午夜精品久久久久久久久久| 首页综合国产亚洲丝袜| 五月天久久比比资源色| 日韩中文字幕91| 蜜臀av性久久久久av蜜臀妖精| 日本一道高清亚洲日美韩| 国产色爱av资源综合区| 欧美精品第1页| 欧美中文字幕一区| 在线免费观看一区| 欧美亚洲图片小说| 欧美日韩国产综合草草| 欧美一级一区二区| 2021久久国产精品不只是精品 | 欧美高清激情brazzers| 911精品国产一区二区在线| 日韩午夜电影在线观看| 精品成人一区二区三区| 中日韩av电影| 亚洲欧美日韩国产综合| 天天av天天翘天天综合网色鬼国产 | 美女性感视频久久| 国内一区二区视频| 91同城在线观看| 欧美日韩在线观看一区二区 | 在线成人av影院| 欧美一区二区三区视频| 精品成人私密视频| 国产精品伦理在线| 亚洲午夜三级在线| 久久精工是国产品牌吗| 国产福利不卡视频| 欧美日韩另类国产亚洲欧美一级| 91精品国产色综合久久久蜜香臀| 久久亚洲精华国产精华液| 最新不卡av在线| 亚洲高清免费视频| 国产精品综合一区二区三区| 91看片淫黄大片一级在线观看| 精品污污网站免费看| 欧美变态tickle挠乳网站| 亚洲少妇最新在线视频| 捆绑变态av一区二区三区| 99久久99久久久精品齐齐| 555www色欧美视频| 日韩美女视频一区| 国产在线视频不卡二| 欧美手机在线视频| 国产色综合一区| 日本午夜精品一区二区三区电影| 国产成人免费视频网站| 欧美一区二区三区在线观看| 中文字幕巨乱亚洲| 久久精品国产亚洲高清剧情介绍| 99精品视频在线播放观看| 精品国产精品网麻豆系列| 亚洲最新在线观看| 国产精品亚洲专一区二区三区| 欧美日韩一卡二卡三卡| 中文字幕一区二区不卡| 韩国在线一区二区| 欧美一区二区三区色| 一区二区三区毛片| 丁香激情综合国产| 精品国产乱码久久久久久久久| 亚洲一线二线三线久久久| 成人一级片在线观看| 精品少妇一区二区三区在线播放 | 免费精品99久久国产综合精品| 92国产精品观看| 国产女同互慰高潮91漫画| 日韩黄色小视频| 欧洲精品一区二区三区在线观看| 中文一区二区完整视频在线观看 | 成人一区二区视频| 久久综合精品国产一区二区三区| 日本伊人午夜精品| 欧美日韩国产a| 亚洲网友自拍偷拍| 日本高清无吗v一区| 中文字幕中文字幕一区| 国产主播一区二区三区| 日韩三级高清在线| 日韩av网站在线观看| 欧美乱妇23p| 天天色综合成人网| 欧美日韩在线播放一区| 亚洲va欧美va天堂v国产综合| 欧美性一级生活| 亚洲综合激情小说| 欧美天堂一区二区三区| 亚洲成人1区2区| 欧美三级韩国三级日本一级| 亚洲图片自拍偷拍| 欧美精品一卡两卡| 久久精品国产成人一区二区三区| 日韩欧美中文字幕一区| 国内外精品视频| 亚洲国产成人午夜在线一区 | 色综合天天视频在线观看| 亚洲欧美福利一区二区| 一本一本久久a久久精品综合麻豆| 亚洲欧美视频在线观看视频| 欧美在线短视频| 视频一区视频二区中文字幕| 日韩美女天天操| 国产99久久久国产精品潘金| 亚洲欧美在线高清| 欧美日韩国产综合久久| 免费观看久久久4p| 国产精品无码永久免费888| 色哟哟一区二区在线观看 | 蜜桃视频免费观看一区| 久久久久国产精品人| 97久久超碰国产精品| 中文字幕制服丝袜一区二区三区 | 中文字幕一区二区三区在线观看| 国产福利一区在线观看| 日韩久久一区二区| 在线成人小视频| 国产美女娇喘av呻吟久久| 中文字幕中文字幕中文字幕亚洲无线 | 久久久精品影视| 91丨porny丨户外露出| 五月激情综合婷婷| 国产亚洲人成网站|