亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2459.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                         R. HousleyRequest for Comments: 2459                                        SPYRUSCategory: Standards Track                                        W. Ford                                                                VeriSign                                                                 W. Polk                                                                    NIST                                                                 D. Solo                                                                Citicorp                                                            January 1999                Internet X.509 Public Key Infrastructure                      Certificate and CRL ProfileStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This memo profiles the X.509 v3 certificate and X.509 v2 CRL for use   in the Internet.  An overview of the approach and model are provided   as an introduction.  The X.509 v3 certificate format is described in   detail, with additional information regarding the format and   semantics of Internet name forms (e.g., IP addresses).  Standard   certificate extensions are described and one new Internet-specific   extension is defined.  A required set of certificate extensions is   specified.  The X.509 v2 CRL format is described and a required   extension set is defined as well.  An algorithm for X.509 certificate   path validation is described. Supplemental information is provided   describing the format of public keys and digital signatures in X.509   certificates for common Internet public key encryption algorithms   (i.e., RSA, DSA, and Diffie-Hellman).  ASN.1 modules and examples are   provided in the appendices.   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119.Housley, et. al.            Standards Track                     [Page 1]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   Please send comments on this document to the ietf-pkix@imc.org mail   list.                           TTTTaaaabbbblllleeee ooooffff CCCCoooonnnntttteeeennnnttttssss   1  Introduction ................................................    5   2  Requirements and Assumptions ................................    6   2.1  Communication and Topology ................................    6   2.2  Acceptability Criteria ....................................    7   2.3  User Expectations .........................................    7   2.4  Administrator Expectations ................................    7   3  Overview of Approach ........................................    7   3.1  X.509 Version 3 Certificate ...............................    9   3.2  Certification Paths and Trust .............................   10   3.3  Revocation ................................................   12   3.4  Operational Protocols .....................................   13   3.5  Management Protocols ......................................   13   4  Certificate and Certificate Extensions Profile ..............   15   4.1  Basic Certificate Fields ..................................   15   4.1.1  Certificate Fields ......................................   16   4.1.1.1  tbsCertificate ........................................   16   4.1.1.2  signatureAlgorithm ....................................   16   4.1.1.3  signatureValue ........................................   17   4.1.2  TBSCertificate ..........................................   17   4.1.2.1  Version ...............................................   17   4.1.2.2  Serial number .........................................   18   4.1.2.3  Signature .............................................   18   4.1.2.4  Issuer ................................................   18   4.1.2.5  Validity ..............................................   21   4.1.2.5.1  UTCTime .............................................   22   4.1.2.5.2  GeneralizedTime .....................................   22   4.1.2.6  Subject ...............................................   22   4.1.2.7  Subject Public Key Info ...............................   23   4.1.2.8  Unique Identifiers ....................................   24   4.1.2.9 Extensions .............................................   24   4.2  Certificate Extensions ....................................   24   4.2.1  Standard Extensions .....................................   25   4.2.1.1  Authority Key Identifier ..............................   25   4.2.1.2  Subject Key Identifier ................................   26   4.2.1.3  Key Usage .............................................   27   4.2.1.4  Private Key Usage Period ..............................   29   4.2.1.5  Certificate Policies ..................................   29   4.2.1.6  Policy Mappings .......................................   31   4.2.1.7  Subject Alternative Name ..............................   32Housley, et. al.            Standards Track                     [Page 2]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   4.2.1.8  Issuer Alternative Name ...............................   34   4.2.1.9  Subject Directory Attributes ..........................   34   4.2.1.10  Basic Constraints ....................................   35   4.2.1.11  Name Constraints .....................................   35   4.2.1.12  Policy Constraints ...................................   37   4.2.1.13  Extended key usage field .............................   38   4.2.1.14  CRL Distribution Points ..............................   39   4.2.2  Private Internet Extensions .............................   40   4.2.2.1  Authority Information Access ..........................   41   5  CRL and CRL Extensions Profile ..............................   42   5.1  CRL Fields ................................................   43   5.1.1  CertificateList Fields ..................................   43   5.1.1.1  tbsCertList ...........................................   44   5.1.1.2  signatureAlgorithm ....................................   44   5.1.1.3  signatureValue ........................................   44   5.1.2  Certificate List "To Be Signed" .........................   44   5.1.2.1  Version ...............................................   45   5.1.2.2  Signature .............................................   45   5.1.2.3  Issuer Name ...........................................   45   5.1.2.4  This Update ...........................................   45   5.1.2.5  Next Update ...........................................   45   5.1.2.6  Revoked Certificates ..................................   46   5.1.2.7  Extensions ............................................   46   5.2  CRL Extensions ............................................   46   5.2.1  Authority Key Identifier ................................   47   5.2.2  Issuer Alternative Name .................................   47   5.2.3  CRL Number ..............................................   47   5.2.4  Delta CRL Indicator .....................................   48   5.2.5  Issuing Distribution Point ..............................   48   5.3  CRL Entry Extensions ......................................   49   5.3.1  Reason Code .............................................   50   5.3.2  Hold Instruction Code ...................................   50   5.3.3  Invalidity Date .........................................   51   5.3.4  Certificate Issuer ......................................   51   6  Certificate Path Validation .................................   52   6.1  Basic Path Validation .....................................   52   6.2  Extending Path Validation .................................   56   7  Algorithm Support ...........................................   57   7.1  One-way Hash Functions ....................................   57   7.1.1  MD2 One-way Hash Function ...............................   57   7.1.2  MD5 One-way Hash Function ...............................   58   7.1.3  SHA-1 One-way Hash Function .............................   58   7.2  Signature Algorithms ......................................   58   7.2.1  RSA Signature Algorithm .................................   59   7.2.2  DSA Signature Algorithm .................................   60   7.3  Subject Public Key Algorithms .............................   60   7.3.1  RSA Keys ................................................   61   7.3.2  Diffie-Hellman Key Exchange Key .........................   61Housley, et. al.            Standards Track                     [Page 3]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   7.3.3  DSA Signature Keys ......................................   63   8  References ..................................................   64   9  Intellectual Property Rights ................................   66   10  Security Considerations ....................................   67   Appendix A.  ASN.1 Structures and OIDs .........................   70   A.1 Explicitly Tagged Module, 1988 Syntax ......................   70   A.2 Implicitly Tagged Module, 1988 Syntax ......................   84   Appendix B.  1993 ASN.1 Structures and OIDs ....................   91   B.1 Explicitly Tagged Module, 1993 Syntax ......................   91   B.2 Implicitly Tagged Module, 1993 Syntax ......................  108   Appendix C.  ASN.1 Notes .......................................  116   Appendix D.  Examples ..........................................  117   D.1  Certificate ...............................................  117   D.2  Certificate ...............................................  120   D.3  End-Entity Certificate Using RSA ..........................  123   D.4  Certificate Revocation List ...............................  126   Appendix E.  Authors' Addresses ................................  128   Appendix F.  Full Copyright Statement ..........................  129Housley, et. al.            Standards Track                     [Page 4]RFC 2459        Internet X.509 Public Key Infrastructure    January 19991  Introduction   This specification is one part of a family of standards for the X.509   Public Key Infrastructure (PKI) for the Internet.  This specification   is a standalone document; implementations of this standard may   proceed independent from the other parts.   This specification profiles the format and semantics of certificates   and certificate revocation lists for the Internet PKI.  Procedures   are described for processing of certification paths in the Internet   environment.  Encoding rules are provided for popular cryptographic   algorithms.  Finally, ASN.1 modules are provided in the appendices   for all data structures defined or referenced.   The specification describes the requirements which inspire the   creation of this document and the assumptions which affect its scope   in Section 2.  Section 3 presents an architectural model and   describes its relationship to previous IETF and ISO/IEC/ITU   standards.  In particular, this document's relationship with the IETF   PEM specifications and the ISO/IEC/ITU X.509 documents are described.   The specification profiles the X.509 version 3 certificate in Section   4, and the X.509 version 2 certificate revocation list (CRL) in   Section 5. The profiles include the identification of ISO/IEC/ITU and   ANSI extensions which may be useful in the Internet PKI. The profiles   are presented in the 1988 Abstract Syntax Notation One (ASN.1) rather   than the 1994 syntax used in the ISO/IEC/ITU standards.   This specification also includes path validation procedures in   Section 6.  These procedures are based upon the ISO/IEC/ITU   definition, but the presentation assumes one or more self-signed   trusted CA certificates.  Implementations are required to derive the   same results but are not required to use the specified procedures.   Section 7 of the specification describes procedures for   identification and encoding of public key materials and digital   signatures.  Implementations are not required to use any particular   cryptographic algorithms.  However, conforming implementations which   use the identified algorithms are required to identify and encode the   public key materials and digital signatures as described.   Finally, four appendices are provided to aid implementers.  Appendix   A contains all ASN.1 structures defined or referenced within this   specification.  As above, the material is presented in the 1988   Abstract Syntax Notation One (ASN.1) rather than the 1994 syntax.   Appendix B contains the same information in the 1994 ASN.1 notation   as a service to implementers using updated toolsets.  However,   Appendix A takes precedence in case of conflict.  Appendix C containsHousley, et. al.            Standards Track                     [Page 5]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   notes on less familiar features of the ASN.1 notation used within   this specification.  Appendix D contains examples of a conforming   certificate and a conforming CRL.

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
免费亚洲电影在线| 一个色综合网站| 国模一区二区三区白浆 | 91视视频在线观看入口直接观看www | 色猫猫国产区一区二在线视频| 日韩伦理av电影| 色欧美88888久久久久久影院| 亚洲综合免费观看高清完整版| 在线观看成人小视频| 日韩黄色一级片| 久久色成人在线| 白白色亚洲国产精品| 一区二区日韩电影| 欧美日韩小视频| 精品亚洲成a人在线观看 | 国产日韩在线不卡| 99麻豆久久久国产精品免费| 夜夜嗨av一区二区三区中文字幕 | 欧美一级爆毛片| 国产一区二区久久| 亚洲综合偷拍欧美一区色| 日韩三级在线免费观看| 成人免费看视频| 一本色道久久加勒比精品 | 美女视频免费一区| 国产精品私房写真福利视频| 欧美在线看片a免费观看| 久久99在线观看| 亚洲乱码日产精品bd| 日韩一区二区三区四区五区六区| 国产精品1区2区| 亚洲国产aⅴ天堂久久| 国产日韩欧美麻豆| 欧美日本一道本| 豆国产96在线|亚洲| 五月天久久比比资源色| 国产精品电影一区二区| 日韩一区二区三区在线观看| 99精品一区二区三区| 蜜臀91精品一区二区三区| 国产精品国产精品国产专区不蜜| 日韩欧美视频在线| 色一区在线观看| 国产精品自产自拍| 性久久久久久久| 亚洲色图.com| 国产欧美一区二区精品性色| 欧美久久高跟鞋激| 色婷婷国产精品综合在线观看| 国模冰冰炮一区二区| 午夜精品视频在线观看| 亚洲欧美综合另类在线卡通| 久久午夜电影网| 日韩欧美亚洲一区二区| 欧美男女性生活在线直播观看| 99国产精品一区| 国产91丝袜在线18| 精品一区二区在线视频| 日本亚洲天堂网| 首页欧美精品中文字幕| 夜夜嗨av一区二区三区中文字幕 | 日本一区二区免费在线观看视频| 欧美一区二区大片| 这里是久久伊人| 在线观看91视频| 在线影院国内精品| 91麻豆精品秘密| 99re热这里只有精品免费视频| 国产精选一区二区三区| 韩国女主播成人在线| 美美哒免费高清在线观看视频一区二区 | 国产美女娇喘av呻吟久久| 国产精品久久久久精k8| 国产精品综合一区二区三区| 国产美女主播视频一区| 91在线观看成人| 1000精品久久久久久久久| 国产精品传媒视频| 国产精品乱码妇女bbbb| 中文字幕精品三区| 中文字幕亚洲欧美在线不卡| 国产精品色婷婷| 亚洲婷婷综合色高清在线| 亚洲欧洲精品天堂一级| 亚洲欧美成aⅴ人在线观看| 一区二区不卡在线播放| 一区二区三区视频在线观看| 亚洲一区二区美女| 日韩高清不卡一区| 韩国理伦片一区二区三区在线播放| 国产一区二区剧情av在线| 国产成人免费在线视频| 99在线视频精品| 欧美午夜在线一二页| 91精品在线麻豆| 欧美精品一区二区久久婷婷| 国产精品水嫩水嫩| 亚洲免费在线播放| 奇米色一区二区| 国产精品一区三区| 99久久精品情趣| 欧美精品久久久久久久多人混战 | 日韩丝袜美女视频| 精品国产电影一区二区| 中文字幕一区av| 日韩精品久久理论片| 国产福利电影一区二区三区| 欧美自拍丝袜亚洲| 日韩欧美一级精品久久| 国产精品久久看| 五月天国产精品| 播五月开心婷婷综合| 欧美日韩国产经典色站一区二区三区| 欧美不卡一区二区| 亚洲三级免费电影| 麻豆国产欧美日韩综合精品二区 | 欧美精品少妇一区二区三区| 久久婷婷色综合| 一区二区三区日韩精品| 久久69国产一区二区蜜臀| 成人av电影在线观看| 7777精品伊人久久久大香线蕉 | 在线看国产日韩| 久久精品亚洲精品国产欧美kt∨| 亚洲视频免费在线| 久久精品国产亚洲aⅴ| 一本色道a无线码一区v| 精品国产91乱码一区二区三区| 亚洲精品免费在线| 国产一区二区三区四| 精品视频一区三区九区| 国产日本欧美一区二区| 秋霞午夜av一区二区三区 | 欧美亚洲高清一区| 国产婷婷色一区二区三区在线| 香蕉影视欧美成人| 91免费观看在线| 国产视频一区二区三区在线观看| 亚洲国产精品久久艾草纯爱| 成人精品小蝌蚪| 久久女同精品一区二区| 美女网站色91| 欧美日产国产精品| 亚洲乱码中文字幕| caoporm超碰国产精品| 久久久亚洲综合| 久久精品噜噜噜成人av农村| 欧美视频在线播放| 亚洲精品视频在线观看网站| 成人午夜视频福利| 国产婷婷色一区二区三区在线| 久久99精品视频| 欧美一区二区三区在线视频| 亚洲va欧美va人人爽午夜| 色欧美88888久久久久久影院| 亚洲欧洲日韩女同| 成人的网站免费观看| 国产三级欧美三级日产三级99 | 大胆亚洲人体视频| 精品欧美久久久| 久久99热国产| 欧美va天堂va视频va在线| 青娱乐精品视频在线| 欧美精品电影在线播放| 爽爽淫人综合网网站| 欧美一区二区三区免费大片| 视频一区二区国产| 欧美片网站yy| 免费欧美高清视频| 日韩女优视频免费观看| 久久福利视频一区二区| 精品动漫一区二区三区在线观看| 蜜芽一区二区三区| 精品成a人在线观看| 国产二区国产一区在线观看| 亚洲国产高清不卡| 99久久精品免费精品国产| 亚洲男人天堂一区| 在线亚洲免费视频| 午夜激情综合网| 日韩一区二区电影在线| 精品无人码麻豆乱码1区2区| 国产亚洲一本大道中文在线| 成人国产精品免费观看动漫| 中文字幕精品一区二区三区精品| 91首页免费视频| 水野朝阳av一区二区三区| 精品国一区二区三区| 国产99久久久久久免费看农村| 亚洲男同1069视频| 91精品国产91久久久久久一区二区 | 中文字幕一区二区三区四区| 91麻豆swag| 秋霞电影网一区二区| 国产视频一区二区在线观看| 一本大道av一区二区在线播放| 日韩电影在线观看一区| 国产日产精品一区| 欧美三级蜜桃2在线观看| 国产伦精品一区二区三区视频青涩|