亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc2831.txt

?? 中、英文RFC文檔大全打包下載完全版 .
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
      its value SHOULD be one of those realms. If the directive is      missing, "realm-value" will set to the empty string when computing      A1 (see below for details).   nonce      The server-specified data string received in the preceding      digest-challenge. This directive is required and MUST be present      exactly once; otherwise, authentication fails.Leach & Newman              Standards Track                     [Page 7]RFC 2831                 Digest SASL Mechanism                  May 2000   cnonce      A client-specified data string which MUST be different each time a      digest-response is sent as part of initial authentication. The      cnonce-value is an opaque quoted string value provided by the      client and used by both client and server to avoid chosen      plaintext attacks, and to provide mutual authentication. The      security of the implementation depends on a good choice. It is      RECOMMENDED that it contain at least 64 bits of entropy. This      directive is required and MUST be present exactly once; otherwise,      authentication fails.   nonce-count      The nc-value is the hexadecimal count of the number of requests      (including the current request) that the client has sent with the      nonce value in this request.  For example, in the first request      sent in response to a given nonce value, the client sends      "nc=00000001". The purpose of this directive is to allow the      server to detect request replays by maintaining its own copy of      this count - if the same nc-value is seen twice, then the request      is a replay.   See the description below of the construction of      the response value. This directive may appear at most once; if      multiple instances are present, the client should abort the      authentication exchange.   qop      Indicates what "quality of protection" the client accepted. If      present, it may appear exactly once and  its value MUST be one of      the alternatives in qop-options. If not present, it defaults to      "auth". These values affect the computation of the response. Note      that this is a single token, not a quoted list of alternatives.   serv-type      Indicates the type of service, such as "www" for web service,      "ftp" for FTP service, "smtp" for mail delivery service, etc. The      service name as defined in the SASL profile for the protocol see      section 4 of [RFC 2222], registered in the IANA registry of      "service" elements for the GSSAPI host-based service name form      [RFC 2078].   host      The DNS host name or IP address for the service requested.  The      DNS host name must be the fully-qualified canonical name of the      host. The DNS host name is the preferred form; see notes on server      processing of the digest-uri.Leach & Newman              Standards Track                     [Page 8]RFC 2831                 Digest SASL Mechanism                  May 2000   serv-name      Indicates the name of the service if it is replicated. The service      is considered to be replicated if the client's service-location      process involves resolution using standard DNS lookup operations,      and if these operations involve DNS records (such as SRV, or MX)      which resolve one DNS name into a set of other DNS names. In this      case, the initial name used by the client is the "serv-name", and      the final name is the "host" component. For example, the incoming      mail service for "example.com" may be replicated through the use      of MX records stored in the DNS, one of which points at an SMTP      server called "mail3.example.com"; it's "serv-name" would be      "example.com", it's "host" would be "mail3.example.com". If the      service is not replicated, or the serv-name is identical to the      host, then the serv-name component MUST be omitted.   digest-uri      Indicates the principal name of the service with which the client      wishes to connect, formed from the serv-type, host, and serv-name.      For example, the FTP service on "ftp.example.com" would have a      "digest-uri" value of "ftp/ftp.example.com"; the SMTP server from      the example above would have a "digest-uri" value of      "smtp/mail3.example.com/example.com".   Servers SHOULD check that the supplied value is correct. This will   detect accidental connection to the incorrect server. It is also so   that clients will be trained to provide values that will work with   implementations that use a shared back-end authentication service   that can provide server authentication.   The serv-type component should match the service being offered. The   host component should match one of the host names of the host on   which the service is running, or it's IP address. Servers SHOULD NOT   normally support the IP address form, because server authentication   by IP address is not very useful; they should only do so if the DNS   is unavailable or unreliable. The serv-name component should match   one of the service's configured service names.   This directive may appear at most once; if multiple instances are   present, the client should abort the authentication exchange.   Note: In the HTTP use of Digest authentication, the digest-uri is the   URI (usually a URL) of the resource requested -- hence the name of   the directive.   response      A string of 32 hex digits computed as defined below, which proves      that the user knows a password. This directive is required and      MUST be present exactly once; otherwise, authentication fails.Leach & Newman              Standards Track                     [Page 9]RFC 2831                 Digest SASL Mechanism                  May 2000   maxbuf      A number indicating the size of the largest buffer the client is      able to receive. If this directive is missing, the default value      is 65536. This directive may appear at most once; if multiple      instances are present, the server should abort the authentication      exchange.   charset      This directive, if present, specifies that the client has used      UTF-8 encoding for the username and password. If not present, the      username and password must be encoded in ISO 8859-1 (of which      US-ASCII is a subset). The client should send this directive only      if the server has indicated it supports UTF-8. The directive is      needed for backwards compatibility with HTTP Digest, which only      supports ISO 8859-1.   LHEX      32 hex digits, where the alphabetic characters MUST be lower case,      because MD5 is not case insensitive.   cipher      The cipher chosen by the client. This directive MUST appear      exactly once if "auth-conf" is negotiated; if required and not      present, authentication fails.   authzid      The "authorization ID" as per RFC 2222, encoded in UTF-8. This      directive is optional. If present, and the authenticating user has      sufficient privilege, and the server supports it, then after      authentication the server will use this identity for making all      accesses and access checks. If the client specifies it, and the      server does not support it, then the response-value will be      incorrect, and authentication will fail.   The size of a digest-response MUST be less than 4096 bytes.2.1.2.1   Response-value   The definition of "response-value" above indicates the encoding for   its value -- 32 lower case hex characters. The following definitions   show how the value is computed.   Although qop-value and components of digest-uri-value may be   case-insensitive, the case which the client supplies in step two is   preserved for the purpose of computing and verifying the   response-value.      response-value  =Leach & Newman              Standards Track                    [Page 10]RFC 2831                 Digest SASL Mechanism                  May 2000         HEX( KD ( HEX(H(A1)),                 { nonce-value, ":" nc-value, ":",                   cnonce-value, ":", qop-value, ":", HEX(H(A2)) }))   If authzid is specified, then A1 is      A1 = { H( { username-value, ":", realm-value, ":", passwd } ),           ":", nonce-value, ":", cnonce-value, ":", authzid-value }   If authzid is not specified, then A1 is      A1 = { H( { username-value, ":", realm-value, ":", passwd } ),           ":", nonce-value, ":", cnonce-value }   where         passwd   = *OCTET   The "username-value", "realm-value" and "passwd" are encoded   according to the value of the "charset" directive. If "charset=UTF-8"   is present, and all the characters of either "username-value" or   "passwd" are in the ISO 8859-1 character set, then it must be   converted to ISO 8859-1 before being hashed. This is so that   authentication databases that store the hashed username, realm and   password (which is common) can be shared compatibly with HTTP, which   specifies ISO 8859-1. A sample implementation of this conversion is   in section 8.   If the "qop" directive's value is "auth", then A2 is:      A2       = { "AUTHENTICATE:", digest-uri-value }   If the "qop" value is "auth-int" or "auth-conf" then A2 is:      A2       = { "AUTHENTICATE:", digest-uri-value,               ":00000000000000000000000000000000" }   Note that "AUTHENTICATE:" must be in upper case, and the second   string constant is a string with a colon followed by 32 zeros.   These apparently strange values of A2 are for compatibility with   HTTP; they were arrived at by setting "Method" to "AUTHENTICATE" and   the hash of the entity body to zero in the HTTP digest calculation of   A2.   Also, in the HTTP usage of Digest, several directives in theLeach & Newman              Standards Track                    [Page 11]RFC 2831                 Digest SASL Mechanism                  May 2000   "digest-challenge" sent by the server have to be returned by the   client in the "digest-response". These are:    opaque    algorithm   These directives are not needed when Digest is used as a SASL   mechanism (i.e., MUST NOT be sent, and MUST be ignored if received).2.1.3  Step Three   The server receives and validates the "digest-response". The server   checks that the nonce-count is "00000001". If it supports subsequent   authentication (see section 2.2), it saves the value of the nonce and   the nonce-count. It sends a message formatted as follows:    response-auth = "rspauth" "=" response-value   where response-value is calculated as above, using the values sent in   step two, except that if qop is "auth", then A2 is       A2 = { ":", digest-uri-value }   And if qop is "auth-int" or "auth-conf" then A2 is       A2 = { ":", digest-uri-value, ":00000000000000000000000000000000" }   Compared to its use in HTTP, the following Digest directives in the   "digest-response" are unused:       nextnonce       qop       cnonce       nonce-count2.2  Subsequent Authentication   If the client has previously authenticated to the server, and   remembers the values of username, realm, nonce, nonce-count, cnonce,   and qop that it used in that authentication, and the SASL profile for   a protocol permits an initial client response, then it MAY perform   "subsequent authentication", as defined in this section.Leach & Newman              Standards Track                    [Page 12]RFC 2831                 Digest SASL Mechanism                  May 20002.2.1  Step one   The client uses the values from the previous authentication and sends   an initial response with a string formatted and computed according to   the rules for a "digest-response", as defined above, but with a   nonce-count one greater than used in the last "digest-response".2.2.2  Step Two   The server receives the "digest-response". If the server does not   support subsequent authentication, then it sends a   "digest-challenge", and authentication proceeds as in initial   authentication. If the server has no saved nonce and nonce-count from   a previous authentication, then it sends a "digest-challenge", and   authentication proceeds as in initial authentication. Otherwise, the   server validates the "digest-response", checks that the nonce-count   is one greater than that used in the previous authentication using   that nonce, and saves the new value of nonce-count.   If the response is invalid, then the server sends a   "digest-challenge", and authentication proceeds as in initial   authentication (and should be configurable to log an authentication   failure in some sort of security audit log, since the failure may be   a symptom of an attack). The nonce-count MUST NOT be incremented in   this case: to do so would allow a denial of service attack by sending   an out-of-order nonce-count.   If the response is valid, the server MAY choose to deem that   authentication has succeeded. However, if it has been too long since   the previous authentication, or for any other reason, the server MAY   send a new "digest-challenge" with a new value for nonce. The   challenge MAY contain a "stale" directive with value "true", which   says that the client may respond to the challenge using the password   it used in the previous response; otherwise, the client must solicit   the password anew from the user. This permits the server to make sure   that the user has presented their password recently. (The directive   name refers to the previous nonce being stale, not to the last use of   the password.) Except for the handling of "stale", after sending the   "digest-challenge" authentication proceeds as in the case of initial   authentication.2.3   Integrity Protection   If the server offered "qop=auth-int" and the client responded   "qop=auth-int", then subsequent messages, up to but not including the   next subsequent authentication, between the client and the serverLeach & Newman              Standards Track                    [Page 13]RFC 2831                 Digest SASL Mechanism                  May 2000   MUST be integrity protected. Using as a base session key the value of   H(A1) as defined above the client and server calculate a pair of   message integrity keys as follows.   The key for integrity protecting messages from client to server is:   Kic = MD5({H(A1),   "Digest session key to client-to-server signing key magic constant"})   The key for integrity protecting messages from server to client is:   Kis = MD5({H(A1),   "Digest session key to server-to-client signing key magic constant"})   where MD5 is as specified in [RFC 1321]. If message integrity is   negotiated, a MAC block for each message is appended to the message.   The MAC block is 16 bytes: the first 10 bytes of the HMAC-MD5 [RFC   2104] of the message, a 2-byte message type number in network byte   order with value 1, and the 4-byte sequence number in network byte   order. The message type is to allow for future extensions such as   rekeying.   MAC(Ki, SeqNum, msg) = (HMAC(Ki, {SeqNum, msg})[0..9], 0x0001,   SeqNum)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美日韩国产综合一区二区 | 高清视频一区二区| 日韩午夜激情电影| 日韩国产精品久久久久久亚洲| 在线不卡中文字幕播放| 琪琪久久久久日韩精品| 欧美tickle裸体挠脚心vk| 国内精品伊人久久久久av一坑 | 一区精品在线播放| 99九九99九九九视频精品| 亚洲欧美一区二区三区极速播放| 日本高清视频一区二区| 日韩电影免费一区| 26uuu精品一区二区三区四区在线 26uuu精品一区二区在线观看 | 日韩经典中文字幕一区| 日韩欧美国产一区在线观看| 国产成人一区在线| 亚洲欧洲日韩av| 欧美图区在线视频| 国产一区二区美女| 亚洲色图20p| 日韩一区二区免费视频| 成人午夜短视频| 亚洲影院理伦片| 精品国产凹凸成av人网站| 国产成人久久精品77777最新版本| 成人欧美一区二区三区视频网页| 91啪亚洲精品| 日韩国产高清影视| 国产精品美女一区二区在线观看| 欧美性生活大片视频| 蜜臀av性久久久久蜜臀aⅴ四虎| 国产日韩精品一区| 欧美视频精品在线观看| 国产乱色国产精品免费视频| 亚洲男女一区二区三区| 日韩精品一区二区三区在线观看| av色综合久久天堂av综合| 日韩av二区在线播放| 国产精品大尺度| 欧美tickling网站挠脚心| 一本色道亚洲精品aⅴ| 麻豆成人av在线| 亚洲欧美经典视频| 久久伊人中文字幕| 欧美综合久久久| 国产成a人无v码亚洲福利| 偷窥少妇高潮呻吟av久久免费| 国产精品久久久久一区二区三区 | 欧美一区二区三区在线观看视频| 床上的激情91.| 日韩电影在线观看一区| 亚洲品质自拍视频| 国产免费观看久久| 欧美电影免费观看完整版| 欧美性猛片aaaaaaa做受| 99riav久久精品riav| 国产一区二区三区电影在线观看 | 亚洲国产一区二区a毛片| 中文字幕不卡三区| wwwwww.欧美系列| 欧美一级日韩免费不卡| 欧美老女人第四色| 欧美视频三区在线播放| 91丨porny丨国产入口| 成人免费视频视频在线观看免费| 久久99精品久久只有精品| 视频一区在线播放| 天天综合天天做天天综合| 夜夜嗨av一区二区三区网页| 中文字幕一区二区三区在线播放| 久久久亚洲午夜电影| 欧美精品一区二区三区在线播放 | 一本色道久久综合精品竹菊| 成人精品一区二区三区中文字幕| 国产精品77777竹菊影视小说| 久久精品999| 激情五月婷婷综合网| 久久精品国产精品亚洲精品| 老司机免费视频一区二区| 蜜臀91精品一区二区三区 | 欧美猛男超大videosgay| 色噜噜偷拍精品综合在线| 91在线视频官网| 色偷偷久久一区二区三区| 91香蕉视频污| 欧美视频三区在线播放| 91精品在线观看入口| 日韩三级av在线播放| 欧美v日韩v国产v| 久久嫩草精品久久久久| 国产午夜久久久久| 国产精品久久久久久久岛一牛影视| 欧美国产精品专区| 亚洲视频你懂的| 亚洲国产精品久久人人爱蜜臀| 亚洲午夜视频在线| 欧美aaaaaa午夜精品| 国产精品资源在线看| 99r国产精品| 欧美顶级少妇做爰| 精品国产乱码久久久久久图片 | 日本欧美一区二区在线观看| 美国欧美日韩国产在线播放 | 丁香另类激情小说| 91日韩精品一区| 欧美福利电影网| 欧美精品一区二区三区四区| 中文字幕中文字幕在线一区| 一区二区三区在线视频播放| 日韩av电影免费观看高清完整版在线观看| 日韩综合在线视频| 国产激情一区二区三区| 日本丰满少妇一区二区三区| 制服丝袜亚洲精品中文字幕| 久久新电视剧免费观看| 亚洲欧美色综合| 另类小说一区二区三区| 99久久久精品| 日韩欧美三级在线| 综合婷婷亚洲小说| 久久av老司机精品网站导航| 99精品在线免费| 精品久久人人做人人爰| 亚洲精品乱码久久久久久黑人| 免费在线观看一区二区三区| 99re6这里只有精品视频在线观看 99re8在线精品视频免费播放 | 一区二区三区自拍| 蜜桃av一区二区在线观看 | 5858s免费视频成人| 国产女人18毛片水真多成人如厕| 丝袜亚洲另类欧美综合| thepron国产精品| 久久亚洲免费视频| 秋霞影院一区二区| 色综合亚洲欧洲| 国产免费成人在线视频| 日本不卡一二三| 在线观看区一区二| 中文字幕二三区不卡| 精品亚洲成a人| 3d成人动漫网站| 一区二区在线观看免费视频播放| 国产伦精品一区二区三区视频青涩| 欧美日韩三级视频| 综合av第一页| 成人动漫一区二区| 久久久久久久久久美女| 美女网站一区二区| 91精品一区二区三区久久久久久 | 99精品国产视频| 国产日本欧美一区二区| 蓝色福利精品导航| 制服丝袜一区二区三区| 性感美女极品91精品| 日本韩国一区二区三区视频| 国产精品国产馆在线真实露脸 | 国产精品成人免费| 国产99久久久国产精品| 久久久蜜臀国产一区二区| 久久国产尿小便嘘嘘尿| 日韩欧美国产一区二区在线播放| 免费看日韩精品| 日韩欧美的一区| 国内外精品视频| 欧美成人一级视频| 国产在线视频精品一区| 精品国产亚洲在线| 国产综合久久久久影院| 精品国产乱码久久久久久1区2区| 日本中文字幕不卡| 欧美一区二区美女| 精品一区二区在线播放| 欧美成人vr18sexvr| 国内成人精品2018免费看| 久久综合狠狠综合久久综合88 | 欧美一级久久久| 热久久国产精品| 久久婷婷色综合| 风间由美性色一区二区三区| 中文字幕一区二区三区乱码在线| 成人av集中营| 一区二区久久久久久| 欧美女孩性生活视频| 久久精品国产一区二区三区免费看 | 久久免费视频一区| 国产成人丝袜美腿| 中文字幕亚洲成人| 欧美日韩国产片| 激情综合亚洲精品| 综合久久一区二区三区| 欧美日产在线观看| 精品亚洲国产成人av制服丝袜| 中文字幕av一区二区三区免费看 | 国产风韵犹存在线视精品| 欧美精品一区视频| 91麻豆国产福利在线观看| 水野朝阳av一区二区三区| www成人在线观看| 91香蕉视频在线|