亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2630.txt

?? <VC++網絡游戲建摸與實現>源代碼
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                        R. HousleyRequest for Comments: 2630                                       SPYRUSCategory: Standards Track                                     June 1999                      Cryptographic Message SyntaxStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This document describes the Cryptographic Message Syntax.  This   syntax is used to digitally sign, digest, authenticate, or encrypt   arbitrary messages.   The Cryptographic Message Syntax is derived from PKCS #7 version 1.5   as specified in RFC 2315 [PKCS#7].  Wherever possible, backward   compatibility is preserved; however, changes were necessary to   accommodate attribute certificate transfer and key agreement   techniques for key management.Housley                     Standards Track                     [Page 1]RFC 2630              Cryptographic Message Syntax             June 1999Table of Contents   1   Introduction .................................................  4   2   General Overview .............................................  4   3   General Syntax ...............................................  5   4   Data Content Type ............................................  5   5   Signed-data Content Type .....................................  6       5.1  SignedData Type .........................................  7       5.2  EncapsulatedContentInfo Type ............................  8       5.3  SignerInfo Type .........................................  9       5.4  Message Digest Calculation Process ...................... 11       5.5  Message Signature Generation Process .................... 12       5.6  Message Signature Verification Process .................. 12   6   Enveloped-data Content Type .................................. 12       6.1  EnvelopedData Type ...................................... 14       6.2  RecipientInfo Type ...................................... 15            6.2.1  KeyTransRecipientInfo Type ....................... 16            6.2.2  KeyAgreeRecipientInfo Type ....................... 17            6.2.3  KEKRecipientInfo Type ............................ 19       6.3  Content-encryption Process .............................. 20       6.4  Key-encryption Process .................................. 20   7   Digested-data Content Type ................................... 21   8   Encrypted-data Content Type .................................. 22   9   Authenticated-data Content Type .............................. 23       9.1  AuthenticatedData Type .................................. 23       9.2  MAC Generation .......................................... 25       9.3  MAC Verification ........................................ 26   10  Useful Types ................................................. 27       10.1  Algorithm Identifier Types ............................. 27             10.1.1  DigestAlgorithmIdentifier ...................... 27             10.1.2  SignatureAlgorithmIdentifier ................... 27             10.1.3  KeyEncryptionAlgorithmIdentifier ............... 28             10.1.4  ContentEncryptionAlgorithmIdentifier ........... 28             10.1.5  MessageAuthenticationCodeAlgorithm ............. 28       10.2  Other Useful Types ..................................... 28             10.2.1  CertificateRevocationLists ..................... 28             10.2.2  CertificateChoices ............................. 29             10.2.3  CertificateSet ................................. 29             10.2.4  IssuerAndSerialNumber .......................... 30             10.2.5  CMSVersion ..................................... 30             10.2.6  UserKeyingMaterial ............................. 30             10.2.7  OtherKeyAttribute .............................. 30Housley                     Standards Track                     [Page 2]RFC 2630              Cryptographic Message Syntax             June 1999   11  Useful Attributes ............................................ 31       11.1  Content Type ........................................... 31       11.2  Message Digest ......................................... 32       11.3  Signing Time ........................................... 32       11.4  Countersignature ....................................... 34   12  Supported Algorithms ......................................... 35       12.1  Digest Algorithms ...................................... 35             12.1.1  SHA-1 .......................................... 35             12.1.2  MD5 ............................................ 35       12.2  Signature Algorithms ................................... 36             12.2.1  DSA ............................................ 36             12.2.2  RSA ............................................ 36       12.3  Key Management Algorithms .............................. 36             12.3.1  Key Agreement Algorithms ....................... 36                     12.3.1.1  X9.42 Ephemeral-Static Diffie-Hellman. 37             12.3.2  Key Transport Algorithms ....................... 38                     12.3.2.1  RSA .................................. 39             12.3.3  Symmetric Key-Encryption Key Algorithms ........ 39                     12.3.3.1  Triple-DES Key Wrap .................. 40                     12.3.3.2  RC2 Key Wrap ......................... 41      12.4  Content Encryption Algorithms ........................... 41            12.4.1  Triple-DES CBC .................................. 42            12.4.2  RC2 CBC ......................................... 42      12.5  Message Authentication Code Algorithms .................. 42            12.5.1  HMAC with SHA-1 ................................. 43      12.6  Triple-DES and RC2 Key Wrap Algorithms .................. 43            12.6.1  Key Checksum .................................... 44            12.6.2  Triple-DES Key Wrap ............................. 44            12.6.3  Triple-DES Key Unwrap ........................... 44            12.6.4  RC2 Key Wrap .................................... 45            12.6.5  RC2 Key Unwrap .................................. 46   Appendix A:  ASN.1 Module ........................................ 47   References ....................................................... 55   Security Considerations .......................................... 56   Acknowledgments .................................................. 58   Author's Address ................................................. 59   Full Copyright Statement ......................................... 60Housley                     Standards Track                     [Page 3]RFC 2630              Cryptographic Message Syntax             June 19991  Introduction   This document describes the Cryptographic Message Syntax.  This   syntax is used to digitally sign, digest, authenticate, or encrypt   arbitrary messages.   The Cryptographic Message Syntax describes an encapsulation syntax   for data protection.  It supports digital signatures, message   authentication codes, and encryption.  The syntax allows multiple   encapsulation, so one encapsulation envelope can be nested inside   another.  Likewise, one party can digitally sign some previously   encapsulated data.  It also allows arbitrary attributes, such as   signing time, to be signed along with the message content, and   provides for other attributes such as countersignatures to be   associated with a signature.   The Cryptographic Message Syntax can support a variety of   architectures for certificate-based key management, such as the one   defined by the PKIX working group.   The Cryptographic Message Syntax values are generated using ASN.1   [X.208-88], using BER-encoding [X.209-88].  Values are typically   represented as octet strings.  While many systems are capable of   transmitting arbitrary octet strings reliably, it is well known that   many electronic-mail systems are not.  This document does not address   mechanisms for encoding octet strings for reliable transmission in   such environments.2  General Overview   The Cryptographic Message Syntax (CMS) is general enough to support   many different content types.  This document defines one protection   content, ContentInfo.  ContentInfo encapsulates a single identified   content type, and the identified type may provide further   encapsulation.  This document defines six content types: data,   signed-data, enveloped-data, digested-data, encrypted-data, and   authenticated-data.  Additional content types can be defined outside   this document.   An implementation that conforms to this specification must implement   the protection content, ContentInfo, and must implement the data,   signed-data, and enveloped-data content types.  The other content   types may be implemented if desired.   As a general design philosophy, each content type permits single pass   processing using indefinite-length Basic Encoding Rules (BER)   encoding.  Single-pass operation is especially helpful if content is   large, stored on tapes, or is "piped" from another process.  Single-Housley                     Standards Track                     [Page 4]RFC 2630              Cryptographic Message Syntax             June 1999   pass operation has one significant drawback: it is difficult to   perform encode operations using the Distinguished Encoding Rules   (DER) [X.509-88] encoding in a single pass since the lengths of the   various components may not be known in advance.  However, signed   attributes within the signed-data content type and authenticated   attributes within the authenticated-data content type require DER   encoding.  Signed attributes and authenticated attributes must be   transmitted in DER form to ensure that recipients can verify a   content that contains one or more unrecognized attributes.  Signed   attributes and authenticated attributes are the only CMS data types   that require DER encoding.3  General Syntax   The Cryptographic Message Syntax (CMS) associates a content type   identifier with a content.  The syntax shall have ASN.1 type   ContentInfo:      ContentInfo ::= SEQUENCE {        contentType ContentType,        content [0] EXPLICIT ANY DEFINED BY contentType }      ContentType ::= OBJECT IDENTIFIER   The fields of ContentInfo have the following meanings:      contentType indicates the type of the associated content.  It is      an object identifier; it is a unique string of integers assigned      by an authority that defines the content type.      content is the associated content.  The type of content can be      determined uniquely by contentType.  Content types for data,      signed-data, enveloped-data, digested-data, encrypted-data, and      authenticated-data are defined in this document.  If additional      content types are defined in other documents, the ASN.1 type      defined should not be a CHOICE type.4  Data Content Type   The following object identifier identifies the data content type:      id-data OBJECT IDENTIFIER ::= { iso(1) member-body(2)          us(840) rsadsi(113549) pkcs(1) pkcs7(7) 1 }   The data content type is intended to refer to arbitrary octet   strings, such as ASCII text files; the interpretation is left to the   application.  Such strings need not have any internal structureHousley                     Standards Track                     [Page 5]RFC 2630              Cryptographic Message Syntax             June 1999   (although they could have their own ASN.1 definition or other   structure).   The data content type is generally encapsulated in the signed-data,   enveloped-data, digested-data, encrypted-data, or authenticated-data   content type.5  Signed-data Content Type   The signed-data content type consists of a content of any type and   zero or more signature values.  Any number of signers in parallel can   sign any type of content.   The typical application of the signed-data content type represents   one signer's digital signature on content of the data content type.   Another typical application disseminates certificates and certificate   revocation lists (CRLs).   The process by which signed-data is constructed involves the   following steps:      1.  For each signer, a message digest, or hash value, is computed      on the content with a signer-specific message-digest algorithm.      If the signer is signing any information other than the content,      the message digest of the content and the other information are      digested with the signer's message digest algorithm (see Section      5.4), and the result becomes the "message digest."      2.  For each signer, the message digest is digitally signed using      the signer's private key.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产 日韩 欧美大片| 国产性色一区二区| 亚洲福利一二三区| 欧美亚洲禁片免费| 午夜精品一区在线观看| 日韩视频免费观看高清完整版在线观看 | 亚洲国产成人91porn| 91精品久久久久久蜜臀| 国产一区福利在线| 亚洲日本va午夜在线影院| 欧美日韩专区在线| 久久99久久久久久久久久久| 国产片一区二区| 91成人免费网站| 美女视频网站黄色亚洲| 日本一区二区三区在线不卡| 色丁香久综合在线久综合在线观看| 亚洲国产裸拍裸体视频在线观看乱了 | 91丨porny丨户外露出| 亚洲欧美日韩国产一区二区三区| 欧美视频中文一区二区三区在线观看| 久久国产人妖系列| 亚洲色欲色欲www| 日韩一区二区三区在线观看 | www.爱久久.com| 亚洲一区视频在线| 精品日韩av一区二区| 99久久精品国产麻豆演员表| 日本亚洲三级在线| 亚洲欧美一区二区视频| 欧美xxxxxxxxx| 欧美影视一区在线| 色综合婷婷久久| 蜜臀av性久久久久蜜臀aⅴ四虎 | 亚洲第一电影网| 日本一区二区电影| 日韩一区二区三区四区五区六区| av在线免费不卡| 国产一区二区在线观看视频| 亚洲18女电影在线观看| 中文字幕在线观看一区二区| 日韩欧美国产一二三区| 91久久精品午夜一区二区| 国产一区二区三区久久久| 亚洲高清视频在线| 中文字幕综合网| 国产日韩欧美精品一区| 日韩欧美电影一二三| 日本高清视频一区二区| 国产凹凸在线观看一区二区| 美女国产一区二区三区| 亚洲午夜三级在线| 中文字幕中文字幕中文字幕亚洲无线| 日韩一级大片在线| 欧美性色黄大片手机版| 91啪在线观看| 99久久国产免费看| 成人黄色片在线观看| 极品少妇一区二区| 青娱乐精品在线视频| 亚洲高清不卡在线观看| 亚洲精品v日韩精品| 中文字幕一区二区三中文字幕| 国产午夜精品美女毛片视频| 欧美v亚洲v综合ⅴ国产v| 欧美一级精品大片| 91精品蜜臀在线一区尤物| 欧美日产在线观看| 欧美色网一区二区| 欧美美女激情18p| 欧美三级日韩三级| 欧美视频一区二区三区| 欧美性xxxxxx少妇| 欧美视频日韩视频| 欧美日韩你懂得| 欧美精品久久天天躁| 欧美日韩和欧美的一区二区| 欧美亚洲综合色| 在线播放一区二区三区| 91精品婷婷国产综合久久性色| 欧美一级精品大片| 欧美精品一区二区在线观看| 久久久精品免费网站| 国产日韩欧美在线一区| 国产精品无圣光一区二区| 一区在线播放视频| 亚洲午夜免费电影| 天堂成人国产精品一区| 免费看日韩精品| 国产精品69毛片高清亚洲| 国产成人免费av在线| 99久久99久久免费精品蜜臀| 欧美视频自拍偷拍| 日韩欧美第一区| 国产精品午夜在线观看| 一区2区3区在线看| 天堂午夜影视日韩欧美一区二区| 久久国产精品露脸对白| 国产剧情一区在线| 99久久精品一区二区| 欧美日韩不卡在线| 久久久不卡网国产精品一区| 久草中文综合在线| 成人黄色网址在线观看| 精品视频一区二区不卡| 精品少妇一区二区三区免费观看 | 欧美一区二区三区免费观看视频| 日韩欧美你懂的| 中文字幕一区二区三区不卡在线| 亚洲伊人色欲综合网| 久久精品国产一区二区| caoporm超碰国产精品| 欧美年轻男男videosbes| 精品成人a区在线观看| 亚洲日本va午夜在线影院| 男女性色大片免费观看一区二区 | 精品国产伦理网| 亚洲欧洲日本在线| 奇米一区二区三区| 丁香五精品蜜臀久久久久99网站 | 欧美日韩一区二区不卡| 久久综合丝袜日本网| 一区二区三区国产精华| 国产真实精品久久二三区| 在线观看免费亚洲| 久久亚洲二区三区| 午夜精品成人在线| 99精品国产91久久久久久 | 欧美另类久久久品| 中文在线一区二区| 免费看日韩a级影片| 欧洲视频一区二区| 国产精品―色哟哟| 精品一区精品二区高清| 欧美乱妇20p| 亚洲精品自拍动漫在线| 国产精品自拍毛片| 4438成人网| 亚洲国产美国国产综合一区二区| jizz一区二区| 久久久久久久久岛国免费| 天堂蜜桃91精品| 欧洲一区在线观看| 亚洲人123区| 99久久免费视频.com| 国产欧美日韩久久| 国内精品写真在线观看| 欧美精品精品一区| 午夜精品久久久| 欧美日韩成人激情| 午夜免费久久看| 欧美日韩亚洲综合在线| 自拍偷拍亚洲激情| jlzzjlzz欧美大全| 日韩久久一区二区| aaa国产一区| 亚洲人亚洲人成电影网站色| 丁香桃色午夜亚洲一区二区三区| 久久网站最新地址| 国产一区二区网址| 久久久不卡影院| 豆国产96在线|亚洲| 欧美国产日本视频| 成人一区二区三区在线观看 | 一区二区三区丝袜| 91麻豆自制传媒国产之光| 中文字幕一区二区三区蜜月 | 国产精品色哟哟| 91天堂素人约啪| 亚洲永久免费av| 欧美日韩国产小视频| 视频一区免费在线观看| 欧美一区二区免费视频| 美女在线一区二区| 欧美成va人片在线观看| 激情成人午夜视频| 久久精品人人做人人爽人人| 国产成人精品免费网站| 中文av字幕一区| 9人人澡人人爽人人精品| 亚洲精品大片www| 欧美久久久久久久久中文字幕| 香蕉久久夜色精品国产使用方法 | 亚洲三级免费电影| 色婷婷狠狠综合| 亚洲成人综合视频| 日韩无一区二区| 国产成人午夜视频| 亚洲人成网站在线| 91精品免费观看| 国产成人日日夜夜| 亚洲黄色尤物视频| 欧美一区二区人人喊爽| 国产成人av一区二区| 亚洲精品第1页| 欧美电影免费观看高清完整版| 成人伦理片在线| 午夜精品久久久久久不卡8050| 久久久久久久久99精品| 色婷婷精品久久二区二区蜜臂av|