亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2511.txt

?? RFC規范的翻譯稿
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
References

   [RFC1738]  Berners-Lee, T., Masinter, L. and M.  McCahill,
             "Uniform Resource Locators (URL)", RFC 1738, December 1994.

Appendix C. ASN.1 Structures and OIDs

PKIXCRMF {iso(1) identified-organization(3) dod(6) internet(1)
   security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-crmf(5)}

CRMF DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
     -- Directory Authentication Framework (X.509)
        Version, AlgorithmIdentifier, Name, Time,
        SubjectPublicKeyInfo, Extensions, UniqueIdentifier
           FROM PKIX1Explicit88 {iso(1) identified-organization(3) dod(6)
               internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
               id-pkix1-explicit-88(1)}

     -- Certificate Extensions (X.509)
        GeneralName
           FROM PKIX1Implicit88 {iso(1) identified-organization(3) dod(6)
                  internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
                  id-pkix1-implicit-88(2)}

     -- Cryptographic Message Syntax
        EnvelopedData
           FROM CryptographicMessageSyntax { iso(1) member-body(2)
                us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16)
                modules(0) cms(1) };

CertReqMessages ::= SEQUENCE SIZE (1..MAX) OF CertReqMsg

CertReqMsg ::= SEQUENCE {
    certReq   CertRequest,
    pop       ProofOfPossession  OPTIONAL,
    -- content depends upon key type
    regInfo   SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue OPTIONAL }

CertRequest ::= SEQUENCE {
    certReqId     INTEGER,          -- ID for matching request and reply
    certTemplate  CertTemplate,  -- Selected fields of cert to be issued
    controls      Controls OPTIONAL }   -- Attributes affecting issuance

CertTemplate ::= SEQUENCE {
    version      [0] Version               OPTIONAL,
    serialNumber [1] INTEGER               OPTIONAL,
    signingAlg   [2] AlgorithmIdentifier   OPTIONAL,
    issuer       [3] Name                  OPTIONAL,
    validity     [4] OptionalValidity      OPTIONAL,
    subject      [5] Name                  OPTIONAL,

    publicKey    [6] SubjectPublicKeyInfo  OPTIONAL,
    issuerUID    [7] UniqueIdentifier      OPTIONAL,
    subjectUID   [8] UniqueIdentifier      OPTIONAL,
    extensions   [9] Extensions            OPTIONAL }

OptionalValidity ::= SEQUENCE {
    notBefore  [0] Time OPTIONAL,
    notAfter   [1] Time OPTIONAL } --at least one MUST be present

Controls  ::= SEQUENCE SIZE(1..MAX) OF AttributeTypeAndValue

AttributeTypeAndValue ::= SEQUENCE {
    type         OBJECT IDENTIFIER,
    value        ANY DEFINED BY type }

ProofOfPossession ::= CHOICE {
    raVerified        [0] NULL,
    -- used if the RA has already verified that the requester is in
    -- possession of the private key
    signature         [1] POPOSigningKey,
    keyEncipherment   [2] POPOPrivKey,
    keyAgreement      [3] POPOPrivKey }

POPOSigningKey ::= SEQUENCE {
    poposkInput           [0] POPOSigningKeyInput OPTIONAL,
    algorithmIdentifier   AlgorithmIdentifier,
    signature             BIT STRING }
    -- The signature (using "algorithmIdentifier") is on the
    -- DER-encoded value of poposkInput.  NOTE: If the CertReqMsg
    -- certReq CertTemplate contains the subject and publicKey values,
    -- then poposkInput MUST be omitted and the signature MUST be
    -- computed on the DER-encoded value of CertReqMsg certReq.  If
    -- the CertReqMsg certReq CertTemplate does not contain the public
    -- key and subject values, then poposkInput MUST be present and
    -- MUST be signed.  This strategy ensures that the public key is
    -- not present in both the poposkInput and CertReqMsg certReq
    -- CertTemplate fields.

POPOSigningKeyInput ::= SEQUENCE {
    authInfo            CHOICE {
        sender              [0] GeneralName,
        -- used only if an authenticated identity has been
        -- established for the sender (e.g., a DN from a
        -- previously-issued and currently-valid certificate
        publicKeyMAC        PKMACValue },
        -- used if no authenticated GeneralName currently exists for
        -- the sender; publicKeyMAC contains a password-based MAC
        -- on the DER-encoded value of publicKey

    publicKey           SubjectPublicKeyInfo }  -- from CertTemplate

PKMACValue ::= SEQUENCE {
   algId  AlgorithmIdentifier,
   -- algorithm value shall be PasswordBasedMac {1 2 840 113533 7 66 13}
   -- parameter value is PBMParameter
   value  BIT STRING }

PBMParameter ::= SEQUENCE {
      salt                OCTET STRING,
      owf                 AlgorithmIdentifier,
      -- AlgId for a One-Way Function (SHA-1 recommended)
      iterationCount      INTEGER,
      -- number of times the OWF is applied
      mac                 AlgorithmIdentifier
      -- the MAC AlgId (e.g., DES-MAC, Triple-DES-MAC [PKCS11],
}   -- or HMAC [RFC2104, RFC2202])

POPOPrivKey ::= CHOICE {
    thisMessage       [0] BIT STRING,
    -- posession is proven in this message (which contains the private
    -- key itself (encrypted for the CA))
    subsequentMessage [1] SubsequentMessage,
    -- possession will be proven in a subsequent message
    dhMAC             [2] BIT STRING }
    -- for keyAgreement (only), possession is proven in this message
    -- (which contains a MAC (over the DER-encoded value of the
    -- certReq parameter in CertReqMsg, which MUST include both subject
    -- and publicKey) based on a key derived from the end entity's
    -- private DH key and the CA's public DH key);
    -- the dhMAC value MUST be calculated as per the directions given
    -- in Appendix A.

SubsequentMessage ::= INTEGER {
    encrCert (0),
    -- requests that resulting certificate be encrypted for the
    -- end entity (following which, POP will be proven in a
    -- confirmation message)
    challengeResp (1) }
    -- requests that CA engage in challenge-response exchange with
    -- end entity in order to prove private key possession

-- Object identifier assignments --

id-pkix  OBJECT IDENTIFIER  ::= { iso(1) identified-organization(3)
dod(6) internet(1) security(5) mechanisms(5) 7 }

-- arc for Internet X.509 PKI protocols and their components

id-pkip  OBJECT IDENTIFIER ::= { id-pkix 5 }

-- Registration Controls in CRMF
id-regCtrl OBJECT IDENTIFIER ::= { id-pkip 1 }

-- The following definition may be uncommented for use with
-- ASN.1 compilers which do not understand UTF8String.

-- UTF8String ::= [UNIVERSAL 12] IMPLICIT OCTET STRING

id-regCtrl-regToken OBJECT IDENTIFIER ::= { id-regCtrl 1 }
--with syntax:
RegToken ::= UTF8String

id-regCtrl-authenticator OBJECT IDENTIFIER ::= { id-regCtrl 2 }
--with syntax:
Authenticator ::= UTF8String

id-regCtrl-pkiPublicationInfo OBJECT IDENTIFIER ::= { id-regCtrl 3 }
--with syntax:

PKIPublicationInfo ::= SEQUENCE {
   action     INTEGER {
                dontPublish (0),
                pleasePublish (1) },
   pubInfos  SEQUENCE SIZE (1..MAX) OF SinglePubInfo OPTIONAL }
     -- pubInfos MUST NOT be present if action is "dontPublish"
     -- (if action is "pleasePublish" and pubInfos is omitted,
     -- "dontCare" is assumed)

SinglePubInfo ::= SEQUENCE {
    pubMethod    INTEGER {
        dontCare    (0),
        x500        (1),
        web         (2),
        ldap        (3) },
    pubLocation  GeneralName OPTIONAL }

id-regCtrl-pkiArchiveOptions     OBJECT IDENTIFIER ::= { id-regCtrl 4 }
--with syntax:
PKIArchiveOptions ::= CHOICE {
    encryptedPrivKey     [0] EncryptedKey,
    -- the actual value of the private key
    keyGenParameters     [1] KeyGenParameters,
    -- parameters which allow the private key to be re-generated
    archiveRemGenPrivKey [2] BOOLEAN }
    -- set to TRUE if sender wishes receiver to archive the private
    -- key of a key pair which the receiver generates in response to

    -- this request; set to FALSE if no archival is desired.

EncryptedKey ::= CHOICE {
    encryptedValue        EncryptedValue,
    envelopedData     [0] EnvelopedData }
    -- The encrypted private key MUST be placed in the envelopedData
    -- encryptedContentInfo encryptedContent OCTET STRING.

EncryptedValue ::= SEQUENCE {
    intendedAlg   [0] AlgorithmIdentifier  OPTIONAL,
    -- the intended algorithm for which the value will be used
    symmAlg       [1] AlgorithmIdentifier  OPTIONAL,
    -- the symmetric algorithm used to encrypt the value
    encSymmKey    [2] BIT STRING           OPTIONAL,
    -- the (encrypted) symmetric key used to encrypt the value
    keyAlg        [3] AlgorithmIdentifier  OPTIONAL,
    -- algorithm used to encrypt the symmetric key
    valueHint     [4] OCTET STRING         OPTIONAL,
    -- a brief description or identifier of the encValue content
    -- (may be meaningful only to the sending entity, and used only
    -- if EncryptedValue might be re-examined by the sending entity
    -- in the future)
    encValue       BIT STRING }
    -- the encrypted value itself

KeyGenParameters ::= OCTET STRING

id-regCtrl-oldCertID          OBJECT IDENTIFIER ::= { id-regCtrl 5 }
--with syntax:
OldCertId ::= CertId

CertId ::= SEQUENCE {
    issuer           GeneralName,
    serialNumber     INTEGER }

id-regCtrl-protocolEncrKey    OBJECT IDENTIFIER ::= { id-regCtrl 6 }
--with syntax:
ProtocolEncrKey ::= SubjectPublicKeyInfo

-- Registration Info in CRMF
id-regInfo OBJECT IDENTIFIER ::= { id-pkip 2 }

id-regInfo-utf8Pairs    OBJECT IDENTIFIER ::= { id-regInfo 1 }
--with syntax
UTF8Pairs ::= UTF8String

id-regInfo-certReq       OBJECT IDENTIFIER ::= { id-regInfo 2 }

--with syntax
CertReq ::= CertRequest

END

Full Copyright Statement

   Copyright (C) The Internet Society (1999).  All Rights Reserved.

   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works.  However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.

   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

RFC2511——Internet X.509 Certificate Request Message Format                  X.509證書請求消息格式


2
RFC文檔中文翻譯計劃

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美最猛黑人xxxxx猛交| 97精品超碰一区二区三区| 另类调教123区| 国内精品免费**视频| 91麻豆国产在线观看| 成人小视频在线| 免费高清视频精品| 日韩精品视频网| 亚洲欧美成人一区二区三区| 久久免费美女视频| 欧美日韩国产欧美日美国产精品| 欧洲中文字幕精品| 精品国产一区a| 中文字幕五月欧美| 久久69国产一区二区蜜臀| 国产成人精品影视| 国产呦精品一区二区三区网站| 性久久久久久久久久久久| 老司机一区二区| 五月天欧美精品| 日韩一区在线看| 国产视频一区二区在线观看| 国产精品美女www爽爽爽| 一区二区三区四区精品在线视频| 日本aⅴ亚洲精品中文乱码| 丁香另类激情小说| 欧美精品自拍偷拍动漫精品| 国产精品三级av在线播放| 依依成人精品视频| 国产自产2019最新不卡| 精品1区2区3区| 亚洲精选视频免费看| 国产剧情一区二区| 日韩写真欧美这视频| 亚洲自拍偷拍九九九| 成人av午夜电影| 国产精品天天看| 国产一区不卡视频| 91麻豆精品国产无毒不卡在线观看 | 欧美久久一区二区| 亚洲欧美色图小说| 99精品国产99久久久久久白柏| 久久先锋影音av| 麻豆精品视频在线观看| 欧美精选在线播放| 性做久久久久久免费观看| 欧美性三三影院| 亚洲一二三区不卡| 色综合天天在线| 亚洲人精品午夜| 欧洲精品中文字幕| 亚洲va欧美va人人爽| 欧美日韩高清影院| 青青草伊人久久| 久久久久一区二区三区四区| 国内一区二区在线| 国产精品第四页| 91小视频免费观看| 五月婷婷激情综合| 精品国产露脸精彩对白| 粉嫩av亚洲一区二区图片| 国产精品传媒入口麻豆| 一本久久a久久免费精品不卡| 亚洲乱码国产乱码精品精小说 | 亚洲午夜国产一区99re久久| 91麻豆精品国产91久久久 | 国产精品伦理在线| 欧美日韩免费高清一区色橹橹| 男人的j进女人的j一区| 日本一区二区免费在线| 欧美在线观看视频一区二区| 男女男精品视频网| 亚洲日本丝袜连裤袜办公室| 欧美日韩成人在线一区| 国产福利视频一区二区三区| 一区二区三区在线影院| 欧美电视剧在线观看完整版| 成人精品一区二区三区四区 | 国产ts人妖一区二区| 青青草伊人久久| 亚洲激情男女视频| 欧美日韩国产美| 成人高清av在线| 久久精品国产精品亚洲综合| 亚洲精品美腿丝袜| 国产精品毛片高清在线完整版| 日本道精品一区二区三区 | 欧美一级片在线观看| 白白色 亚洲乱淫| 国产精品一区二区x88av| 日韩综合小视频| 91亚洲精品乱码久久久久久蜜桃 | 亚洲综合免费观看高清在线观看| 国产高清在线精品| 亚洲成a人v欧美综合天堂| 欧美日韩激情一区| 日本亚洲欧美天堂免费| youjizz久久| 一区二区三区中文字幕| 欧美精品777| 国产一区视频导航| 国产精品狼人久久影院观看方式| 91污在线观看| 日本女人一区二区三区| 国产欧美一区二区三区在线老狼| 97精品久久久久中文字幕 | 欧美性生活一区| 麻豆国产欧美一区二区三区| 国产午夜精品一区二区三区嫩草| 99久久久久久99| 亚洲va欧美va天堂v国产综合| 日韩欧美精品三级| 国产精品亚洲一区二区三区妖精| 中文久久乱码一区二区| 色屁屁一区二区| 日本一道高清亚洲日美韩| 91精品国产色综合久久ai换脸| 精品一区二区日韩| 亚洲三级在线播放| 884aa四虎影成人精品一区| 国产精品夜夜爽| 性做久久久久久| 欧美国产1区2区| 欧美精品tushy高清| 国产不卡免费视频| 日日噜噜夜夜狠狠视频欧美人| 欧美国产精品一区| 6080日韩午夜伦伦午夜伦| 成人深夜在线观看| 日韩二区三区在线观看| 中文字幕中文字幕在线一区| 欧美高清www午色夜在线视频| 风间由美中文字幕在线看视频国产欧美| 亚洲一区二区精品久久av| 国产女同互慰高潮91漫画| 欧美亚洲一区二区在线观看| 国产福利精品一区| 日韩精品视频网| 一区二区三区在线高清| 久久久精品影视| 3d动漫精品啪啪1区2区免费| 粉嫩av亚洲一区二区图片| 午夜久久久久久久久| 中文字幕巨乱亚洲| 精品粉嫩aⅴ一区二区三区四区| 欧美网站一区二区| 91丨porny丨最新| 国产精品99久久久久| 男男成人高潮片免费网站| 亚洲欧美日韩久久精品| 国产三级三级三级精品8ⅰ区| 91精品国产综合久久蜜臀| 色噜噜狠狠色综合中国| 国产69精品久久777的优势| 麻豆精品一区二区综合av| 亚洲国产综合91精品麻豆| 亚洲欧洲日韩在线| 欧美激情一二三区| 久久综合五月天婷婷伊人| 日韩三级.com| 在线不卡中文字幕| 91免费观看视频| av在线播放不卡| 国产91丝袜在线播放0| 国模大尺度一区二区三区| 奇米一区二区三区av| 亚洲综合免费观看高清在线观看| 久久精品亚洲麻豆av一区二区| 日韩一卡二卡三卡| 在线播放91灌醉迷j高跟美女| 色久综合一二码| 91福利资源站| 在线免费观看视频一区| 一本到高清视频免费精品| 99国产精品国产精品久久| 成人黄色软件下载| a级高清视频欧美日韩| 成人在线一区二区三区| 成人三级在线视频| 成人一区在线看| 波多野结衣在线一区| av成人老司机| 色婷婷精品久久二区二区蜜臂av | 一区二区三区日韩精品| 久久久亚洲高清| 亚洲成人精品一区二区| 91麻豆免费在线观看| 国产色婷婷亚洲99精品小说| 国产91对白在线观看九色| 国产精品麻豆欧美日韩ww| 在线观看亚洲a| 精品无码三级在线观看视频| 久久亚洲影视婷婷| 亚洲国产精品一区二区久久 | 成人av在线一区二区三区| 亚洲视频图片小说| 欧美一区二区免费视频| 国产一二精品视频| 国产精品不卡一区二区三区| 色综合亚洲欧洲|