亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2459.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
   can certify (e.g., a CA for an organization can only certify entities   in that organization's name tree). Certificate user systems are able   to mechanically check that the name subordination rule has been   followed.   The RFC 1422 uses the X.509 v1 certificate formats. The limitations   of X.509 v1 required imposition of several structural restrictions to   clearly associate policy information or restrict the utility of   certificates.  These restrictions included:      (a) a pure top-down hierarchy, with all certification paths      starting from IPRA;      (b) a naming subordination rule restricting the names of a CA's      subjects; and      (c) use of the PCA concept, which requires knowledge of individual      PCAs to be built into certificate chain verification logic.      Knowledge of individual PCAs was required to determine if a chain      could be accepted.   With X.509 v3, most of the requirements addressed by RFC 1422 can be   addressed using certificate extensions, without a need to restrict   the CA structures used.  In particular, the certificate extensions   relating to certificate policies obviate the need for PCAs and the   constraint extensions obviate the need for the name subordination   rule.  As a result, this document supports a more flexible   architecture, including:      (a) Certification paths may start with a public key of a CA in a      user's own domain, or with the public key of the top of a      hierarchy.  Starting with the public key of a CA in a user's own      domain has certain advantages.  In some environments, the local      domain is the most trusted.Housley, et. al.            Standards Track                    [Page 11]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999      (b)  Name constraints may be imposed through explicit inclusion of      a name constraints extension in a certificate, but are not      required.      (c)  Policy extensions and policy mappings replace the PCA      concept, which permits a greater degree of automation.  The      application can determine if the certification path is acceptable      based on the contents of the certificates instead of a priori      knowledge of PCAs. This permits automation of certificate chain      processing.3.3  Revocation   When a certificate is issued, it is expected to be in use for its   entire validity period.  However, various circumstances may cause a   certificate to become invalid prior to the expiration of the validity   period. Such circumstances include change of name, change of   association between subject and CA (e.g., an employee terminates   employment with an organization), and compromise or suspected   compromise of the corresponding private key.  Under such   circumstances, the CA needs to revoke the certificate.   X.509 defines one method of certificate revocation.  This method   involves each CA periodically issuing a signed data structure called   a certificate revocation list (CRL).  A CRL is a time stamped list   identifying revoked certificates which is signed by a CA and made   freely available in a public repository.  Each revoked certificate is   identified in a CRL by its certificate serial number. When a   certificate-using system uses a certificate (e.g., for verifying a   remote user's digital signature), that system not only checks the   certificate signature and validity but also acquires a suitably-   recent CRL and checks that the certificate serial number is not on   that CRL.  The meaning of "suitably-recent" may vary with local   policy, but it usually means the most recently-issued CRL.  A CA   issues a new CRL on a regular periodic basis (e.g., hourly, daily, or   weekly).  An entry is added to the CRL as part of the next update   following notification of revocation. An entry may be removed from   the CRL after appearing on one regularly scheduled CRL issued beyond   the revoked certificate's validity period.   An advantage of this revocation method is that CRLs may be   distributed by exactly the same means as certificates themselves,   namely, via untrusted communications and server systems.   One limitation of the CRL revocation method, using untrusted   communications and servers, is that the time granularity of   revocation is limited to the CRL issue period.  For example, if a   revocation is reported now, that revocation will not be reliablyHousley, et. al.            Standards Track                    [Page 12]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   notified to certificate-using systems until the next periodic CRL is   issued -- this may be up to one hour, one day, or one week depending   on the frequency that the CA issues CRLs.   As with the X.509 v3 certificate format, in order to facilitate   interoperable implementations from multiple vendors, the X.509 v2 CRL   format needs to be profiled for Internet use.  It is one goal of this   document to specify that profile.  However, this profile does not   require CAs to issue CRLs. Message formats and protocols supporting   on-line revocation notification may be defined in other PKIX   specifications.  On-line methods of revocation notification may be   applicable in some environments as an alternative to the X.509 CRL.   On-line revocation checking may significantly reduce the latency   between a revocation report and the distribution of the information   to relying parties.  Once the CA accepts the report as authentic and   valid, any query to the on-line service will correctly reflect the   certificate validation impacts of the revocation.  However, these   methods impose new security requirements; the certificate validator   shall trust the on-line validation service while the repository does   not need to be trusted.3.4  Operational Protocols   Operational protocols are required to deliver certificates and CRLs   (or status information) to certificate using client systems.   Provision is needed for a variety of different means of certificate   and CRL delivery, including distribution procedures based on LDAP,   HTTP, FTP, and X.500.  Operational protocols supporting these   functions are defined in other PKIX specifications.  These   specifications may include definitions of message formats and   procedures for supporting all of the above operational environments,   including definitions of or references to appropriate MIME content   types.3.5  Management Protocols   Management protocols are required to support on-line interactions   between PKI user and management entities.  For example, a management   protocol might be used between a CA and a client system with which a   key pair is associated, or between two CAs which cross-certify each   other.  The set of functions which potentially need to be supported   by management protocols include:      (a)  registration:  This is the process whereby a user first makes      itself known to a CA (directly, or through an RA), prior to that      CA issuing  a certificate or certificates for that user.Housley, et. al.            Standards Track                    [Page 13]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999      (b)  initialization:  Before a client system can operate securely      it is necessary to install key materials which have the      appropriate relationship with keys stored elsewhere in the      infrastructure.  For example, the client needs to be securely      initialized with the public key and other assured information of      the trusted CA(s), to be used in validating certificate paths.      Furthermore, a client typically needs to be initialized with its      own key pair(s).      (c)  certification:  This  is the process in which a CA issues a      certificate for a user's public key, and returns that certificate      to the user's client system and/or posts that certificate in a      repository.      (d)  key pair recovery:  As an option, user client key materials      (e.g., a user's private key used for encryption purposes) may be      backed up by a CA or a key backup system.  If a user needs to      recover these backed up key materials (e.g., as a result of a      forgotten password or a lost key chain file), an on-line protocol      exchange may be needed to support such recovery.      (e)  key pair update:  All key pairs need to be updated regularly,      i.e., replaced with a new key pair, and new certificates issued.      (f)  revocation request:  An authorized person advises a CA of an      abnormal situation requiring certificate revocation.      (g)  cross-certification:  Two CAs exchange information used in      establishing a cross-certificate. A cross-certificate is a      certificate issued by one CA to another CA which contains a CA      signature key used for issuing certificates.   Note that on-line protocols are not the only way of implementing the   above functions.  For all functions there are off-line methods of   achieving the same result, and this specification does not mandate   use of on-line protocols.  For example, when hardware tokens are   used, many of the functions may be achieved as part of the physical   token delivery.  Furthermore, some of the above functions may be   combined into one protocol exchange.  In particular, two or more of   the registration, initialization, and certification functions can be   combined into one protocol exchange.   The PKIX series of specifications may define a set of standard   message formats supporting the above functions in future   specifications.  In that case, the protocols for conveying these   messages in different environments (e.g., on-line, file transfer, e-   mail, and WWW) will also be described in those specifications.Housley, et. al.            Standards Track                    [Page 14]RFC 2459        Internet X.509 Public Key Infrastructure    January 19994  Certificate and Certificate Extensions Profile   This section presents a profile for public key certificates that will   foster interoperability and a reusable PKI.  This section is based   upon the X.509 v3 certificate format and the standard certificate   extensions defined in [X.509].  The ISO/IEC/ITU documents use the   1993 version of ASN.1; while this document uses the 1988 ASN.1   syntax, the encoded certificate and standard extensions are   equivalent.  This section also defines private extensions required to   support a PKI for the Internet community.   Certificates may be used in a wide range of applications and   environments covering a broad spectrum of interoperability goals and   a broader spectrum of operational and assurance requirements.  The   goal of this document is to establish a common baseline for generic   applications requiring broad interoperability and limited special   purpose requirements.  In particular, the emphasis will be on   supporting the use of X.509 v3 certificates for informal Internet   electronic mail, IPsec, and WWW applications.4.1  Basic Certificate Fields   The X.509 v3 certificate basic syntax is as follows.  For signature   calculation, the certificate is encoded using the ASN.1 distinguished   encoding rules (DER) [X.208].  ASN.1 DER encoding is a tag, length,   value encoding system for each element.   Certificate  ::=  SEQUENCE  {        tbsCertificate       TBSCertificate,        signatureAlgorithm   AlgorithmIdentifier,        signatureValue       BIT STRING  }   TBSCertificate  ::=  SEQUENCE  {        version         [0]  EXPLICIT Version DEFAULT v1,        serialNumber         CertificateSerialNumber,        signature            AlgorithmIdentifier,        issuer               Name,        validity             Validity,        subject              Name,        subjectPublicKeyInfo SubjectPublicKeyInfo,        issuerUniqueID  [1]  IMPLICIT UniqueIdentifier OPTIONAL,                             -- If present, version shall be v2 or v3        subjectUniqueID [2]  IMPLICIT UniqueIdentifier OPTIONAL,                             -- If present, version shall be v2 or v3        extensions      [3]  EXPLICIT Extensions OPTIONAL                             -- If present, version shall be v3        }Housley, et. al.            Standards Track                    [Page 15]RFC 2459        Internet X.509 Public Key Infrastructure    January 1999   Version  ::=  INTEGER  {  v1(0), v2(1), v3(2)  }   CertificateSerialNumber  ::=  INTEGER   Validity ::= SEQUENCE {        notBefore      Time,        notAfter       Time }   Time ::= CHOICE {        utcTime        UTCTime,        generalTime    GeneralizedTime }   UniqueIdentifier  ::=  BIT STRING   SubjectPublicKeyInfo  ::=  SEQUENCE  {        algorithm            AlgorithmIdentifier,        subjectPublicKey     BIT STRING  }   Extensions  ::=  SEQUENCE SIZE (1..MAX) OF Extension   Extension  ::=  SEQUENCE  {

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩欧美亚洲一区二区| 美脚の诱脚舐め脚责91 | 国产亚洲欧洲一区高清在线观看| 亚洲综合在线电影| 欧美色视频在线| 亚洲国产另类精品专区| 欧美日韩在线播放三区| 卡一卡二国产精品| 国产网红主播福利一区二区| 波多野结衣中文字幕一区| 亚洲视频1区2区| 欧美日韩久久一区| 国内精品免费**视频| 国产欧美精品一区| 在线看国产一区二区| 免费的成人av| 欧美极品少妇xxxxⅹ高跟鞋| 色婷婷久久久久swag精品| 性欧美疯狂xxxxbbbb| 欧美精品一区二区三区久久久| 国产成人精品一区二 | 亚洲国产精品久久久久秋霞影院 | 亚洲色图欧洲色图婷婷| 欧美日韩一区 二区 三区 久久精品| 日韩av不卡一区二区| 中文字幕av一区二区三区免费看| 91精品福利在线| 久久精品国产色蜜蜜麻豆| 中文字幕日本乱码精品影院| 欧美精品免费视频| 国产精品一级片在线观看| 亚洲国产一区二区在线播放| 欧美精品一区二区三| 色婷婷av一区二区三区软件| 激情图片小说一区| 一区二区三区在线免费播放| 精品国产一区二区三区av性色 | 欧美日韩一区二区在线观看| 国产精品一区二区免费不卡| 亚洲国产精品尤物yw在线观看| 26uuu国产一区二区三区| 欧美日韩免费观看一区三区| 国产凹凸在线观看一区二区| 日韩专区欧美专区| 亚洲综合免费观看高清在线观看| 精品久久久久香蕉网| 欧美最新大片在线看| 国产xxx精品视频大全| 久久不见久久见中文字幕免费| 亚洲黄色尤物视频| 国产无人区一区二区三区| 欧美一级一区二区| 欧美特级限制片免费在线观看| 成人精品一区二区三区中文字幕| 久久成人久久鬼色| 免费看黄色91| 婷婷久久综合九色综合绿巨人| 国产精品五月天| 精品国产区一区| 欧美一区二区三区在线观看 | 国产精品99久久久久久久vr | 久久综合99re88久久爱| 777奇米成人网| 欧美手机在线视频| 色综合天天综合给合国产| 国产成人aaa| 国产福利精品一区| 国产麻豆日韩欧美久久| 狠狠色狠狠色综合日日91app| 日本女优在线视频一区二区| 亚洲超碰精品一区二区| 亚洲一区av在线| 亚洲综合色噜噜狠狠| 亚洲美女偷拍久久| 亚洲免费av网站| 亚洲激情自拍偷拍| 一区二区三区四区不卡在线| 亚洲人午夜精品天堂一二香蕉| 国产精品高潮久久久久无| 国产精品三级av| 1000精品久久久久久久久| 亚洲视频电影在线| 亚洲一区中文日韩| 亚洲电影一区二区| 奇米一区二区三区| 久草这里只有精品视频| 国产伦精品一区二区三区免费迷| 国产剧情一区在线| 成人app软件下载大全免费| 99精品国产视频| 在线视频你懂得一区| 欧美日韩电影在线播放| 国产欧美1区2区3区| 国产亚洲精品超碰| 综合久久综合久久| 亚洲一区二区av在线| 美女视频黄免费的久久| 国产乱码一区二区三区| 99久久精品费精品国产一区二区| 一本色道综合亚洲| 91精品一区二区三区在线观看| 日韩欧美国产午夜精品| 久久一区二区三区四区| 国产精品麻豆99久久久久久| 一区二区三区色| 日韩国产一二三区| 国产一区二区主播在线| 99久久精品免费看| 欧美一级欧美一级在线播放| 久久久久久99久久久精品网站| 国产精品国模大尺度视频| 一区二区三区国产豹纹内裤在线 | 亚洲成人一区在线| 韩日av一区二区| 9人人澡人人爽人人精品| 欧美色综合天天久久综合精品| 91麻豆精品国产91久久久资源速度 | 国产精品国产三级国产aⅴ入口| 亚洲人成网站精品片在线观看| 香蕉av福利精品导航| 国产美女在线观看一区| 91福利在线免费观看| 精品国产百合女同互慰| 亚洲免费观看高清| 国内偷窥港台综合视频在线播放| 色综合咪咪久久| 久久久亚洲高清| 亚洲国产视频一区| 大胆亚洲人体视频| 日韩视频一区二区三区在线播放| 中文字幕综合网| 国产精品自在在线| 欧美人体做爰大胆视频| 亚洲欧美综合网| 国产一区二区精品久久91| 欧美日韩亚洲国产综合| 国产精品青草久久| 精品在线观看视频| 欧美一区二区观看视频| 亚洲一区在线观看免费| av网站一区二区三区| 久久久久久久精| 日本系列欧美系列| 欧美在线小视频| 亚洲欧洲综合另类| 成人激情开心网| 久久影音资源网| 国内外精品视频| 欧美zozozo| 美女视频黄久久| 日韩欧美综合在线| 日韩vs国产vs欧美| 欧美日本一道本| 亚洲成人在线网站| 在线观看国产一区二区| 樱桃国产成人精品视频| 91丨porny丨蝌蚪视频| 国产精品欧美一级免费| 国产成人午夜精品5599| 久久综合五月天婷婷伊人| 麻豆精品国产传媒mv男同| 欧美猛男男办公室激情| 亚洲在线中文字幕| 日本韩国欧美国产| 亚洲黄色免费电影| 色欧美片视频在线观看在线视频| 136国产福利精品导航| 成人黄色小视频在线观看| 国产人成亚洲第一网站在线播放 | 视频在线观看91| 欧美蜜桃一区二区三区| 日韩经典中文字幕一区| 欧美一级片免费看| 国产一区二区视频在线| 久久久久99精品一区| www.一区二区| 尤物视频一区二区| 911国产精品| 久久99精品久久只有精品| 精品粉嫩超白一线天av| 国产v综合v亚洲欧| 亚洲美女一区二区三区| 欧美日韩一区高清| 久久精品国产澳门| 久久先锋影音av鲁色资源| 成人性生交大片免费看中文网站| 国产精品久线观看视频| 欧洲一区二区三区在线| 男男gaygay亚洲| 国产精品五月天| 欧美影院一区二区| 日韩国产精品久久久久久亚洲| 26uuu亚洲综合色| 99国产精品国产精品毛片| 亚洲一区二区三区自拍| 欧美tk丨vk视频| 99久久精品国产毛片| 日本强好片久久久久久aaa| 久久九九国产精品| 欧美性大战xxxxx久久久|