亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2630.txt

?? <VC++網絡游戲建摸與實現>源代碼
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                        R. HousleyRequest for Comments: 2630                                       SPYRUSCategory: Standards Track                                     June 1999                      Cryptographic Message SyntaxStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1999).  All Rights Reserved.Abstract   This document describes the Cryptographic Message Syntax.  This   syntax is used to digitally sign, digest, authenticate, or encrypt   arbitrary messages.   The Cryptographic Message Syntax is derived from PKCS #7 version 1.5   as specified in RFC 2315 [PKCS#7].  Wherever possible, backward   compatibility is preserved; however, changes were necessary to   accommodate attribute certificate transfer and key agreement   techniques for key management.Housley                     Standards Track                     [Page 1]RFC 2630              Cryptographic Message Syntax             June 1999Table of Contents   1   Introduction .................................................  4   2   General Overview .............................................  4   3   General Syntax ...............................................  5   4   Data Content Type ............................................  5   5   Signed-data Content Type .....................................  6       5.1  SignedData Type .........................................  7       5.2  EncapsulatedContentInfo Type ............................  8       5.3  SignerInfo Type .........................................  9       5.4  Message Digest Calculation Process ...................... 11       5.5  Message Signature Generation Process .................... 12       5.6  Message Signature Verification Process .................. 12   6   Enveloped-data Content Type .................................. 12       6.1  EnvelopedData Type ...................................... 14       6.2  RecipientInfo Type ...................................... 15            6.2.1  KeyTransRecipientInfo Type ....................... 16            6.2.2  KeyAgreeRecipientInfo Type ....................... 17            6.2.3  KEKRecipientInfo Type ............................ 19       6.3  Content-encryption Process .............................. 20       6.4  Key-encryption Process .................................. 20   7   Digested-data Content Type ................................... 21   8   Encrypted-data Content Type .................................. 22   9   Authenticated-data Content Type .............................. 23       9.1  AuthenticatedData Type .................................. 23       9.2  MAC Generation .......................................... 25       9.3  MAC Verification ........................................ 26   10  Useful Types ................................................. 27       10.1  Algorithm Identifier Types ............................. 27             10.1.1  DigestAlgorithmIdentifier ...................... 27             10.1.2  SignatureAlgorithmIdentifier ................... 27             10.1.3  KeyEncryptionAlgorithmIdentifier ............... 28             10.1.4  ContentEncryptionAlgorithmIdentifier ........... 28             10.1.5  MessageAuthenticationCodeAlgorithm ............. 28       10.2  Other Useful Types ..................................... 28             10.2.1  CertificateRevocationLists ..................... 28             10.2.2  CertificateChoices ............................. 29             10.2.3  CertificateSet ................................. 29             10.2.4  IssuerAndSerialNumber .......................... 30             10.2.5  CMSVersion ..................................... 30             10.2.6  UserKeyingMaterial ............................. 30             10.2.7  OtherKeyAttribute .............................. 30Housley                     Standards Track                     [Page 2]RFC 2630              Cryptographic Message Syntax             June 1999   11  Useful Attributes ............................................ 31       11.1  Content Type ........................................... 31       11.2  Message Digest ......................................... 32       11.3  Signing Time ........................................... 32       11.4  Countersignature ....................................... 34   12  Supported Algorithms ......................................... 35       12.1  Digest Algorithms ...................................... 35             12.1.1  SHA-1 .......................................... 35             12.1.2  MD5 ............................................ 35       12.2  Signature Algorithms ................................... 36             12.2.1  DSA ............................................ 36             12.2.2  RSA ............................................ 36       12.3  Key Management Algorithms .............................. 36             12.3.1  Key Agreement Algorithms ....................... 36                     12.3.1.1  X9.42 Ephemeral-Static Diffie-Hellman. 37             12.3.2  Key Transport Algorithms ....................... 38                     12.3.2.1  RSA .................................. 39             12.3.3  Symmetric Key-Encryption Key Algorithms ........ 39                     12.3.3.1  Triple-DES Key Wrap .................. 40                     12.3.3.2  RC2 Key Wrap ......................... 41      12.4  Content Encryption Algorithms ........................... 41            12.4.1  Triple-DES CBC .................................. 42            12.4.2  RC2 CBC ......................................... 42      12.5  Message Authentication Code Algorithms .................. 42            12.5.1  HMAC with SHA-1 ................................. 43      12.6  Triple-DES and RC2 Key Wrap Algorithms .................. 43            12.6.1  Key Checksum .................................... 44            12.6.2  Triple-DES Key Wrap ............................. 44            12.6.3  Triple-DES Key Unwrap ........................... 44            12.6.4  RC2 Key Wrap .................................... 45            12.6.5  RC2 Key Unwrap .................................. 46   Appendix A:  ASN.1 Module ........................................ 47   References ....................................................... 55   Security Considerations .......................................... 56   Acknowledgments .................................................. 58   Author's Address ................................................. 59   Full Copyright Statement ......................................... 60Housley                     Standards Track                     [Page 3]RFC 2630              Cryptographic Message Syntax             June 19991  Introduction   This document describes the Cryptographic Message Syntax.  This   syntax is used to digitally sign, digest, authenticate, or encrypt   arbitrary messages.   The Cryptographic Message Syntax describes an encapsulation syntax   for data protection.  It supports digital signatures, message   authentication codes, and encryption.  The syntax allows multiple   encapsulation, so one encapsulation envelope can be nested inside   another.  Likewise, one party can digitally sign some previously   encapsulated data.  It also allows arbitrary attributes, such as   signing time, to be signed along with the message content, and   provides for other attributes such as countersignatures to be   associated with a signature.   The Cryptographic Message Syntax can support a variety of   architectures for certificate-based key management, such as the one   defined by the PKIX working group.   The Cryptographic Message Syntax values are generated using ASN.1   [X.208-88], using BER-encoding [X.209-88].  Values are typically   represented as octet strings.  While many systems are capable of   transmitting arbitrary octet strings reliably, it is well known that   many electronic-mail systems are not.  This document does not address   mechanisms for encoding octet strings for reliable transmission in   such environments.2  General Overview   The Cryptographic Message Syntax (CMS) is general enough to support   many different content types.  This document defines one protection   content, ContentInfo.  ContentInfo encapsulates a single identified   content type, and the identified type may provide further   encapsulation.  This document defines six content types: data,   signed-data, enveloped-data, digested-data, encrypted-data, and   authenticated-data.  Additional content types can be defined outside   this document.   An implementation that conforms to this specification must implement   the protection content, ContentInfo, and must implement the data,   signed-data, and enveloped-data content types.  The other content   types may be implemented if desired.   As a general design philosophy, each content type permits single pass   processing using indefinite-length Basic Encoding Rules (BER)   encoding.  Single-pass operation is especially helpful if content is   large, stored on tapes, or is "piped" from another process.  Single-Housley                     Standards Track                     [Page 4]RFC 2630              Cryptographic Message Syntax             June 1999   pass operation has one significant drawback: it is difficult to   perform encode operations using the Distinguished Encoding Rules   (DER) [X.509-88] encoding in a single pass since the lengths of the   various components may not be known in advance.  However, signed   attributes within the signed-data content type and authenticated   attributes within the authenticated-data content type require DER   encoding.  Signed attributes and authenticated attributes must be   transmitted in DER form to ensure that recipients can verify a   content that contains one or more unrecognized attributes.  Signed   attributes and authenticated attributes are the only CMS data types   that require DER encoding.3  General Syntax   The Cryptographic Message Syntax (CMS) associates a content type   identifier with a content.  The syntax shall have ASN.1 type   ContentInfo:      ContentInfo ::= SEQUENCE {        contentType ContentType,        content [0] EXPLICIT ANY DEFINED BY contentType }      ContentType ::= OBJECT IDENTIFIER   The fields of ContentInfo have the following meanings:      contentType indicates the type of the associated content.  It is      an object identifier; it is a unique string of integers assigned      by an authority that defines the content type.      content is the associated content.  The type of content can be      determined uniquely by contentType.  Content types for data,      signed-data, enveloped-data, digested-data, encrypted-data, and      authenticated-data are defined in this document.  If additional      content types are defined in other documents, the ASN.1 type      defined should not be a CHOICE type.4  Data Content Type   The following object identifier identifies the data content type:      id-data OBJECT IDENTIFIER ::= { iso(1) member-body(2)          us(840) rsadsi(113549) pkcs(1) pkcs7(7) 1 }   The data content type is intended to refer to arbitrary octet   strings, such as ASCII text files; the interpretation is left to the   application.  Such strings need not have any internal structureHousley                     Standards Track                     [Page 5]RFC 2630              Cryptographic Message Syntax             June 1999   (although they could have their own ASN.1 definition or other   structure).   The data content type is generally encapsulated in the signed-data,   enveloped-data, digested-data, encrypted-data, or authenticated-data   content type.5  Signed-data Content Type   The signed-data content type consists of a content of any type and   zero or more signature values.  Any number of signers in parallel can   sign any type of content.   The typical application of the signed-data content type represents   one signer's digital signature on content of the data content type.   Another typical application disseminates certificates and certificate   revocation lists (CRLs).   The process by which signed-data is constructed involves the   following steps:      1.  For each signer, a message digest, or hash value, is computed      on the content with a signer-specific message-digest algorithm.      If the signer is signing any information other than the content,      the message digest of the content and the other information are      digested with the signer's message digest algorithm (see Section      5.4), and the result becomes the "message digest."      2.  For each signer, the message digest is digitally signed using      the signer's private key.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品一级黄| 欧美精品乱码久久久久久按摩| 一本色道久久综合精品竹菊| 91精品国产欧美一区二区成人| 国产目拍亚洲精品99久久精品| 日欧美一区二区| 一本到不卡精品视频在线观看| 久久亚区不卡日本| 日韩精品视频网站| 欧美日韩美女一区二区| 成人欧美一区二区三区黑人麻豆| 韩国在线一区二区| 91精品国产品国语在线不卡| 一区二区三区高清| 91麻豆国产自产在线观看| 国产女人18水真多18精品一级做| 免费人成黄页网站在线一区二区| 欧美性受xxxx黑人xyx| 亚洲色图.com| www.亚洲在线| 国产精品国产a| 粉嫩av一区二区三区在线播放| 精品久久久影院| 蜜桃在线一区二区三区| 欧美一区二区三级| 日本女优在线视频一区二区| 欧美日韩在线三级| 无吗不卡中文字幕| 欧美绝品在线观看成人午夜影视 | 一本色道久久综合精品竹菊| 欧美激情一区在线| 成人黄色小视频在线观看| 国产欧美日韩三区| 不卡的av中国片| 一区二区三区四区乱视频| 一本一道波多野结衣一区二区| 亚洲欧美日韩一区二区| 欧美色国产精品| 七七婷婷婷婷精品国产| 久久久久久久久久久久久女国产乱| 久久成人18免费观看| 国产视频一区二区三区在线观看| 国产91精品在线观看| 国产精品免费av| 在线免费观看日本欧美| 亚洲成av人影院| 精品剧情v国产在线观看在线| 精品一区二区三区日韩| 欧美国产成人精品| 欧美在线免费播放| 久久国产精品色| 亚洲欧美怡红院| 欧美精品久久天天躁| 国产伦精品一区二区三区免费迷| 国产亚洲欧洲997久久综合| 99久久精品免费看国产| 亚洲资源在线观看| 精品三级在线看| 99久久精品免费| 丝袜美腿亚洲综合| 久久免费电影网| 91精品福利视频| 国产综合成人久久大片91| 最新国产の精品合集bt伙计| 欧美剧在线免费观看网站| 国产麻豆日韩欧美久久| 亚洲一卡二卡三卡四卡| 精品国产乱子伦一区| 91欧美一区二区| 精品在线视频一区| 亚洲国产一区二区视频| 国产欧美一区二区精品性色| 欧美日韩久久久久久| 国产成人综合网| 免费欧美高清视频| 亚洲男人天堂av| 国产欧美精品一区| 欧美一区二区女人| 91在线精品一区二区三区| 九九九久久久精品| 午夜精品免费在线| 亚洲人一二三区| 中文字幕免费一区| 日韩精品一区二区三区视频播放 | 不卡视频在线看| 麻豆传媒一区二区三区| 一区二区三区日韩在线观看| 国产女人aaa级久久久级 | 国产成人免费视频一区| 五月天中文字幕一区二区| 国产精品伦理一区二区| 久久色成人在线| 日韩午夜在线观看视频| 欧美性欧美巨大黑白大战| 91污片在线观看| 国产 日韩 欧美大片| 免费观看一级特黄欧美大片| 亚洲高清在线精品| 一区二区三区中文字幕电影| 亚洲欧洲美洲综合色网| 日本一区二区免费在线观看视频| 日韩区在线观看| 精品奇米国产一区二区三区| 日韩视频永久免费| 日韩欧美美女一区二区三区| 欧美一级高清大全免费观看| 91精品国产综合久久久蜜臀图片| 在线观看一区不卡| 欧美日韩一区二区三区不卡| 欧美四级电影在线观看| 欧美中文字幕一区二区三区| 色哟哟精品一区| 欧美日韩综合色| 欧美性高清videossexo| 在线精品视频免费观看| 欧美在线影院一区二区| 欧美区在线观看| 日韩欧美高清在线| 久久久久99精品国产片| 中文字幕精品在线不卡| 亚洲欧美自拍偷拍| 一区二区不卡在线视频 午夜欧美不卡在 | 91精品国产麻豆| 日韩欧美国产三级| 久久影院视频免费| 中文字幕一区二区5566日韩| 亚洲婷婷综合色高清在线| 亚洲精品免费播放| 日韩不卡一二三区| 国产激情精品久久久第一区二区| 国产成人综合网站| 色偷偷久久人人79超碰人人澡| 91免费版在线| 7777精品伊人久久久大香线蕉超级流畅| 欧美日韩在线一区二区| 精品国产一区二区三区不卡| 国产欧美日韩在线观看| 亚洲一区免费视频| 久久国产综合精品| 91一区在线观看| 日韩欧美中文字幕公布| 国产调教视频一区| 亚洲国产一二三| 韩国成人福利片在线播放| av网站一区二区三区| 欧美亚洲国产怡红院影院| 日韩欧美亚洲另类制服综合在线| 久久精品亚洲乱码伦伦中文| 亚洲综合一区在线| 激情欧美一区二区| 欧美日韩专区在线| 欧美国产一区在线| 日本va欧美va精品| 91在线精品一区二区三区| 日韩欧美中文字幕精品| 亚洲伦在线观看| 国产美女av一区二区三区| 欧美色视频一区| 国产欧美日韩激情| 美女尤物国产一区| 日本道精品一区二区三区| 久久久精品一品道一区| 午夜在线电影亚洲一区| 99国产精品久久久久久久久久 | 欧美视频一二三区| 国产日韩欧美综合一区| 五月天亚洲精品| 91黄色免费网站| 国产精品三级电影| 精品亚洲成av人在线观看| 欧美精选一区二区| 亚洲男人的天堂在线aⅴ视频| 久久av老司机精品网站导航| 欧美日韩国产综合久久| 亚洲欧美另类久久久精品| 国产91精品久久久久久久网曝门| 欧美猛男男办公室激情| 亚洲综合在线第一页| 99视频热这里只有精品免费| 久久精品男人天堂av| 久久国产精品一区二区| 欧美一级黄色录像| 午夜成人在线视频| 欧美性受xxxx| 亚洲国产裸拍裸体视频在线观看乱了| 99精品视频一区二区三区| 欧美国产一区二区在线观看| 国产一区二区调教| 久久先锋影音av鲁色资源网| 美女在线一区二区| 欧美成人精品福利| 精品中文字幕一区二区小辣椒| 911精品国产一区二区在线| 亚洲成人先锋电影| 337p亚洲精品色噜噜| 婷婷亚洲久悠悠色悠在线播放| 欧美午夜视频网站| 日韩一区精品视频| 欧美va亚洲va香蕉在线| 国产麻豆精品视频|