亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? draft-ietf-pkix-rfc2510bis-07.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號(hào):
         senderKID       [2] KeyIdentifier           OPTIONAL,         recipKID        [3] KeyIdentifier           OPTIONAL,         -- to identify specific keys used for protection         transactionID   [4] OCTET STRING            OPTIONAL,         -- identifies the transaction; i.e., this will be the same in         -- corresponding request, response and confirmation messages         senderNonce     [5] OCTET STRING            OPTIONAL,         recipNonce      [6] OCTET STRING            OPTIONAL,         -- nonces used to provide replay protection, senderNonceAdams & Farrell               Expires May 2003                   [Page 22]         -- is inserted by the creator of this message; recipNonce         -- is a nonce previously inserted in a related message by         -- the intended recipient of this message         freeText        [7] PKIFreeText             OPTIONAL,         -- this may be used to indicate context-specific instructions         -- (this field is intended for human consumption)         generalInfo     [8] SEQUENCE SIZE (1..MAX) OF                                InfoTypeAndValue     OPTIONAL         -- this may be used to convey context-specific information         -- (this field not primarily intended for human consumption)     }     PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String         -- text encoded as UTF-8 String [RFC2279] (note:  each UTF8String          -- MAY include an RFC 1766/RFC 3066 language tag to indicate the          -- language of the contained text -- see [RFC2482] for details)   The pvno field is fixed (at 2) for this version of this   specification.   The sender field contains the name of the sender of the PKIMessage.   This name (in conjunction with senderKID, if supplied) should be   sufficient to indicate the key to use to verify the protection on the    message.  If nothing about the sender is known to the sending entity    (e.g., in the init. req. message, where the end entity may not know    its own Distinguished Name (DN), e-mail name, IP address, etc.), then    the "sender" field MUST contain a "NULL" value; that is, the    SEQUENCE OF relative distinguished names is of zero length. In such a    case the senderKID field MUST hold an identifier (i.e., a reference    number) which indicates to the receiver the appropriate shared secret    information to use to verify the message.   The recipient field contains the name of the recipient of the   PKIMessage. This name (in conjunction with recipKID, if supplied)   should be usable to verify the protection on the message.   The protectionAlg field specifies the algorithm used to protect the   message. If no protection bits are supplied (note that PKIProtection   is OPTIONAL) then this field MUST be omitted; if protection bits are   supplied then this field MUST be supplied.   senderKID and recipKID are usable to indicate which keys have been   used to protect the message (recipKID will normally only be required   where protection of the message uses Diffie-Hellman (DH) keys).   These fields MUST be used if required to uniquely identify a key   (e.g., if more than one key is associated with a given sender name)   and SHOULD be omitted otherwise.Adams & Farrell               Expires May 2003                   [Page 23]   The transactionID field within the message header is to be used to   allow the recipient of a message to correlate this with an ongoing   transaction. This is needed for all transactions that consist of   more than just a single request/response pair. For transactions that   consist of a single request/response pair the rules are as follows.    A client MAY populate the transactionID field of the request. If a   server receives such a request which has the transactionID field set,   then it MUST set the transactionID field of the response to the same   value; if a server receives such request with a missing transactionID   field then it MAY set transactionID field of the response.   For transactions that consist of more than just a single   request/response pair the rules are as follows.  Clients SHOULD    generate a transactionID for the first request. If a server receives    such a request which has the transactionID field set, then it MUST set    the transactionID field of the response to the same value; if a server   receives such request with a missing transactionID field then it MUST   populate transactionID field of the response with a server-generated   ID. Subsequent requests and responses MUST all set the transactionID   field to the thus established value. In all cases where a   transactionID is being used, a given client MUST NOT have more than   one transaction with the same transactionID in progress at any time   (to a given server). Servers are free to require uniqueness of the   transactionID or not, as long as they are able to correctly associate   messages with the corresponding transaction. Typically this means   that a server will require the {client, transactionID} tuple to be   unique, or even the transactionID alone to be unique if it cannot   distinguish clients based on transport level information. A server   receiving the first message of a transaction (which requires more than   a single request/response pair) that contains a transactionID that   does not allow it to meet the above constraints (typically because   the transactionID is already in use) MUST send back an   ErrorMsgContent with a PKIFailureInfo of transactionIdInUse. It is   RECOMMENDED that the clients fill the transactionID field with 128 bits    of (pseudo-) random data for the start of a transaction to reduce the    probability of having the transactionID in use at the server.   The senderNonce and recipNonce fields protect the PKIMessage against   replay attacks.  The senderNonce will typically be 128 bits of    (pseudo-) random data generated by the sender, whereas the recipNonce    is copied from the senderNonce of the previous message in the    transaction.   The messageTime field contains the time at which the sender created   the message. This may be useful to allow end entities to correct/check   their local time for consistency with the time on a central system.   The freeText field may be used to send a human-readable message to   the recipient (in any number of languages).  The first language used   in this sequence indicates the desired language for replies.   The generalInfo field may be used to send machine-processable   additional data to the recipient.  The following generalInfo extensions   are defined and MAY be supported.Adams & Farrell               Expires May 2003                   [Page 24]3.1.1.1 ImplicitConfirm   This is used by the EE to inform the CA that it does not wish to send   a certificate confirmation for issued certificates.      implicitConfirm OBJECT IDENTIFIER ::= {id-it 13}      ImplicitConfirmValue ::= NULL   If the CA grants the request to the EE, it MUST put the same extension   in the PKIHeader of the response.  If the EE does not find the    extension in the response, it MUST send the certificate confirmation.3.1.1.2 ConfirmWaitTime   This is used by the CA to inform the EE how long it intends to wait for   the certificate confirmation before revoking the certificate and    deleting the transaction.      confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14}      ConfirmWaitTimeValue ::= GeneralizedTime -- time CA will wait until   3.1.2 PKI Message Body     PKIBody ::= CHOICE {  -- message-specific body elements & Section ref       ir      [0]   CertReqMessages,       --Initialization Req  (3.3.1)       ip      [1]   CertRepMessage,        --Initialization Resp (3.3.2)       cr      [2]   CertReqMessages,       --Certification Req   (3.3.3)       cp      [3]   CertRepMessage,        --Certification Resp  (3.3.4)       p10cr   [4]   CertificationRequest,  --PKCS #10 Cert. Req. [PKCS10]         -- the PKCS #10 certification request (see [PKCS10])       popdecc [5]   POPODecKeyChallContent --pop Challenge       (3.2.8)       popdecr [6]   POPODecKeyRespContent, --pop Response        (3.2.8)       kur     [7]   CertReqMessages,       --Key Update Request  (3.3.5)       kup     [8]   CertRepMessage,        --Key Update Response (3.3.6)       krr     [9]   CertReqMessages,       --Key Recovery Req    (3.3.7)       krp     [10]  KeyRecRepContent,      --Key Recovery Resp   (3.3.8)       rr      [11]  RevReqContent,         --Revocation Request  (3.3.9)       rp      [12]  RevRepContent,         --Revocation Response (3.3.10)       ccr     [13]  CertReqMessages,       --Cross-Cert. Request (3.3.11)       ccp     [14]  CertRepMessage,        --Cross-Cert. Resp    (3.3.12)       ckuann  [15]  CAKeyUpdAnnContent,    --CA Key Update Ann.  (3.3.13)       cann    [16]  CertAnnContent,        --Certificate Ann.    (3.3.14)       rann    [17]  RevAnnContent,         --Revocation Ann.     (3.3.15)       crlann  [18]  CRLAnnContent,         --CRL Announcement    (3.3.16)       pkiconf [19]  PKIConfirmContent,     --Confirmation        (3.3.17)       nested  [20]  NestedMessageContent,  --Nested Message      (3.1.3)       genm    [21]  GenMsgContent,         --General Message     (3.3.19)       genp    [22]  GenRepContent,         --General Response    (3.3.20)       error   [23]  ErrorMsgContent,       --Error Message       (3.3.21)       certConf [24] CertConfirmContent,    --Certificate confirm (3.3.18)       pollReq [25]  PollReqContent,        --Polling request     (3.3.22)       pollRep [26]  PollRepContent         --Polling response    (3.3.22)       }Adams & Farrell               Expires May 2003                   [Page 25]   The specific types are described in Section 3.3 below.3.1.3 PKI Message Protection   Some PKI messages will be protected for integrity. (Note that if an   asymmetric algorithm is used to protect a message and the relevant   public component has been certified already, then the origin of the   message can also be authenticated.  On the other hand, if the public   component is uncertified then the message origin cannot be   automatically authenticated, but may be authenticated via out-of-band   means.)   When protection is applied the following structure is used:     PKIProtection ::= BIT STRING   The input to the calculation of PKIProtection is the DER encoding of   the following data structure:     ProtectedPart ::= SEQUENCE {         header    PKIHeader,         body      PKIBody     }   There MAY be cases in which the PKIProtection BIT STRING is   deliberately not used to protect a message (i.e., this OPTIONAL field   is omitted) because other protection, external to PKIX, will instead   be applied. Such a choice is explicitly allowed in this   specification.  Examples of such external protection include PKCS #7   [PKCS7] and Security Multiparts [RFC1847] encapsulation of the   PKIMessage (or simply the PKIBody (omitting the CHOICE tag), if the   relevant PKIHeader information is securely carried in the external   mechanism).  It is noted, however, that many   such external mechanisms require that the end entity already   possesses a public-key certificate, and/or a unique Distinguished   Name, and/or other such infrastructure-related information. Thus,   they may not be appropriate for initial registration, key-recovery,   or any other process with "boot-strapping" characteristics.  For   those cases it may be necessary that the PKIProtection parameter be   used.  In the future, if/when external mechanisms are modified to   accommodate boot-strapping scenarios, the use of PKIProtection may   become rare or non-existent.   Depending on the circumstances the PKIProtection bits may contain a   Message Authentication Code (MAC) or signature. Only the following   cases can occur:Adams & Farrell               Expires May 2003                   [Page 26]   - shared secret information   In this case the sender and recipient share secret information   (established via out-of-band means or from a previous PKI management   operation).  PKIProtection will contain a MAC value and the   protectionAlg will be the following (see also Appendix B2):     id-PasswordBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 13}     PBMParameter ::= SEQUENCE {         salt                OCTET STRING,         owf                 AlgorithmIdentifier,         -- AlgId for a One-Way Function (SHA-1 recommended)         iterationCount      INTEGER,         -- number of times the OWF is applied         mac                 AlgorithmIdentifier         -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],     }   -- or HMAC [RFC2104, RFC2202])   In the above protectionAlg the salt value is appended to the shared   secret input. The OWF is then applied iterationCount times, where the   salted secret is the input to the first iteration and, for each   successive iteration, the input is set to be the output of the   previous iteration. The output of the final iteration (called   "BASEKEY" for ease of reference, with a size of "H") is what is used   to form the symmetric key. If the MAC algorithm requires a K-bit key   and K <= H, then the most significant K bits of BASEKEY are used. If   K > H, then all of BASEKEY is used for the most significant H bits of   the key, OWF("1" || BASEKEY) is used for the next most significant H   bits of the key, OWF("2" || BASEKEY) is used for the next most   significant H bits of the key, and so on, until all K bits have been   derived. [Here "N" is the ASCII byte encoding the number N and "||"   represents concatenation.]   Note:  it is RECOMMENDED that the fields of PBMParameter remain    constant throughout the messages of a single transaction (e.g.,    ir/ip/certConf/pkiConf) in order to reduce the overhead associated   with PasswordBasedMac computation).   - DH key pairs   Where the sender and receiver possess Diffie-Hellman certificates   with compatible DH parameters, then in order to protect the message   the end entity must generate a symmetric key based on its private DH   key value and the DH public key of the recipient of the PKI message.   PKIProtection will contain a MAC value keyed with this derived   symmetric key and the protectionAlg will be the following:Adams & Farrell               Expires May 2003                   [Page 27]     id-DHBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 30}     DHBMParameter ::= SEQUENCE {         owf                 AlgorithmIdentifier,         -- AlgId for a One-Way Function (SHA-1 r

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美图区在线视频| 九九热在线视频观看这里只有精品| 一区二区三区鲁丝不卡| 99v久久综合狠狠综合久久| 激情综合色播激情啊| 国产成人免费网站| 一本色道久久加勒比精品| 91精品在线免费观看| 久久久久99精品国产片| 亚洲美女免费在线| 强制捆绑调教一区二区| 国产成人亚洲综合色影视| 日本丰满少妇一区二区三区| 欧美一区二区三区影视| 国产精品视频看| 丝袜国产日韩另类美女| 懂色av中文一区二区三区| 欧美色图在线观看| 欧美精品一区二区三区高清aⅴ | 亚洲曰韩产成在线| 精品在线播放午夜| 日本道色综合久久| 国产欧美一区二区三区沐欲| 亚洲成人中文在线| 成人av资源网站| 日韩女优电影在线观看| 中文字幕在线一区| 精品中文字幕一区二区| 欧美亚洲动漫精品| 中文字幕精品一区二区精品绿巨人 | 三级影片在线观看欧美日韩一区二区| 国内外成人在线| 色94色欧美sute亚洲线路二 | 波多野结衣一区二区三区| 777色狠狠一区二区三区| 国产精品每日更新| 麻豆视频观看网址久久| 在线国产亚洲欧美| 国产女主播一区| 美女视频黄 久久| 欧美色精品在线视频| 国产精品人成在线观看免费| 韩国视频一区二区| 欧美嫩在线观看| 一区二区三区在线视频播放| 国产成人精品亚洲午夜麻豆| 欧美成人伊人久久综合网| 午夜日韩在线观看| 一本久久精品一区二区| 国产精品丝袜在线| 国产在线精品免费| 精品久久久久久最新网址| 三级不卡在线观看| 欧美亚洲国产怡红院影院| 日韩欧美不卡在线观看视频| 国产亚洲成年网址在线观看| 青椒成人免费视频| 91精品婷婷国产综合久久竹菊| 一区二区三区在线视频免费观看| 不卡av在线免费观看| 日本一区二区三区视频视频| 国产精品一区二区在线观看不卡 | 毛片不卡一区二区| 91精品婷婷国产综合久久| 亚洲444eee在线观看| 欧美在线观看视频一区二区| 玉米视频成人免费看| 91视视频在线观看入口直接观看www| 国产精品久久久久影院亚瑟 | 中文字幕综合网| 成人av电影在线观看| 久久久亚洲精华液精华液精华液| 精品一区二区在线看| 26uuu欧美| 国产一区二区三区av电影| 久久婷婷综合激情| 国产老女人精品毛片久久| 国产日产欧美一区二区三区| 国产一区91精品张津瑜| 久久久亚洲精华液精华液精华液 | 欧美韩国日本综合| 国产成人精品www牛牛影视| 久久精品网站免费观看| 成人激情动漫在线观看| 综合激情成人伊人| 在线精品视频免费播放| 五月激情综合网| 精品国产一区久久| 国产一区二区在线影院| 国产精品久久综合| 色婷婷狠狠综合| 日韩精品每日更新| 日韩免费看的电影| 国产成人aaaa| 亚洲精品欧美在线| 欧美日韩成人在线| 国产综合成人久久大片91| 亚洲国产精品t66y| 日本韩国欧美一区| 日本不卡一区二区三区| 精品999久久久| 99久久综合色| 天堂精品中文字幕在线| 久久婷婷色综合| 91丨九色丨蝌蚪富婆spa| 午夜激情一区二区三区| 精品国产免费一区二区三区香蕉| 成人一级片网址| 亚洲图片欧美视频| 26uuu精品一区二区| 91亚洲男人天堂| 日韩电影一区二区三区| 中文字幕国产一区| 欧美综合欧美视频| 韩国精品久久久| 亚洲欧美日本在线| 国产精品一级黄| 久久精品亚洲精品国产欧美kt∨| 91视频一区二区三区| 日韩不卡一区二区三区| 国产午夜精品理论片a级大结局| 91免费国产视频网站| 日本伊人色综合网| 国产精品免费看片| 欧美一级片在线观看| 99久久国产免费看| 日韩中文字幕1| 国产精品无码永久免费888| 欧美视频你懂的| 国产一区二区三区黄视频| 一区二区免费在线播放| 精品免费日韩av| 日本道精品一区二区三区| 国产精品资源在线观看| 亚洲综合另类小说| 国产精品美女久久久久久久久久久| 717成人午夜免费福利电影| 国产69精品久久777的优势| 亚洲大型综合色站| 久久久久久影视| 欧美日韩dvd在线观看| 国产91富婆露脸刺激对白| 视频一区欧美日韩| 国产精品国产自产拍高清av| 日韩一级高清毛片| 91麻豆国产福利在线观看| 午夜欧美一区二区三区在线播放| 欧美色倩网站大全免费| 国产精品一区二区在线观看网站| 亚洲国产综合91精品麻豆| 国产亚洲欧美日韩日本| 欧美日韩一本到| 成人晚上爱看视频| 亚洲成人一区在线| 国产精品国产三级国产普通话蜜臀| 欧美色综合天天久久综合精品| 国产麻豆精品theporn| 亚洲精品成人精品456| 欧美激情一区二区三区全黄 | 久久久久久一二三区| 91视频一区二区| 成人精品免费视频| 精品综合久久久久久8888| 伊人夜夜躁av伊人久久| 久久久久久电影| 欧美日韩国产精品自在自线| 成人高清视频在线观看| 美日韩黄色大片| 亚洲综合激情另类小说区| 亚洲免费看黄网站| 国产欧美中文在线| 欧美夫妻性生活| 91免费视频大全| 高清不卡一区二区在线| 日本在线不卡视频| 亚洲一区二区在线观看视频 | 国产高清久久久久| 丝袜诱惑亚洲看片| 亚洲成人av一区二区| 中文字幕一区二区三中文字幕| 精品欧美一区二区久久| 欧美丰满一区二区免费视频| 91精品久久久久久久91蜜桃| 91黄色激情网站| av一区二区三区在线| 精品一区精品二区高清| 精彩视频一区二区三区| 日韩精品电影一区亚洲| 亚洲国产精品自拍| 一区二区在线观看视频在线观看| 《视频一区视频二区| 国产欧美中文在线| 欧美激情一区二区三区在线| 欧美国产综合色视频| 久久久久久久久久久黄色| 欧美电影精品一区二区| 欧美大片拔萝卜| 91精品国产综合久久久久久久久久 | 91精品国产综合久久精品性色| 97se亚洲国产综合自在线不卡 |