⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc3039.txt

📁 PKIX的RFC英文文档
💻 TXT
📖 第 1 页 / 共 5 页
字号:
   must be unique for the subject, and must be maintained under the   subject's sole control.  That is, a CA should not issue a qualified   certificate if the means to use the private key is not protected   against unintended usage.  This implies that the CA have some   knowledge about the subject's cryptographic module.   The CA must further verify that the public key contained in the   certificate is legitimately representing the subject.   CAs should not issue CA certificates with policy mapping extensions   indicating acceptance of another CA's policy unless these conditions   are met.   Combining the nonRepudiation bit in the keyUsage certificate   extension with other keyUsage bits may have security implications and   this specification therefore recommends against such practices.   The ability to compare two qualified certificates to determine if   they represent the same physical entity is dependent on the semantics   of the subjects' names.  The semantics of a particular attribute may   be different for different issuers.  Comparing names without   knowledge of the semantics of names in these particular certificates   may provide misleading results.   This specification is a profile of RFC 2459.  The security   considerations section of that document applies to this specification   as well.Santesson, et al.           Standards Track                    [Page 14]RFC 3039             Qualified Certificates Profile         January 20015 References   [RFC 2119] Bradner, S., "Key words for use in RFCs to Indicate              Requirement Levels", BCP 14, RFC 2119, March 1997.   [RFC 2247] Kille, S., Wahl, M., Grimstad, A., Huber, R. and S.              Sataluri, "Using Domains in LDAP/X.500 Distinguished              Names", RFC 2247, January 1998.   [RFC 2459] Housley, R., Ford, W., Polk, W. and D. Solo, "Internet              X.509 Public Key Infrastructure: Certificate and CRL              Profile", RFC 2459, January 1999.   [RFC 2985] Nystrom, M. and B. Kaliski, "PKCS #9: Selected Object              Classes and Attribute Types Version 2.0", RFC 2985,              November 2000.   [X.501]    ITU-T Recommendation X.501: Information Technology - Open              Systems Interconnection - The Directory: Models, June              1993.   [X.509]    ITU-T Recommendation X.509: Information Technology - Open              Systems Interconnection - The Directory: Authentication              Framework, June 1997.   [X.520]    ITU-T Recommendation X.520: Information Technology - Open              Systems Interconnection - The Directory: Selected              Attribute Types, June 1993.   [X.680]    ITU-T Recommendation X.680: Information Technology -              Abstract Syntax Notation One, 1997.   [ISO 3166] ISO Standard 3166: Codes for the representation of names              of countries, 1993.Santesson, et al.           Standards Track                    [Page 15]RFC 3039             Qualified Certificates Profile         January 20016 Intellectual Property Rights   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights.  Information on the   IETF's procedures with respect to rights in standards-track and   standards related documentation can be found in BCP-11.  Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard.  Please address the information to the IETF Executive   Director.Santesson, et al.           Standards Track                    [Page 16]RFC 3039             Qualified Certificates Profile         January 2001A. ASN.1 definitions   As in RFC 2459, ASN.1 modules are supplied in two different variants   of the ASN.1 syntax.   Appendix A.1 is in the 1988 syntax, and does not use macros.   However, since the module imports type definitions from modules in   RFC 2459 which are not completely in the 1988 syntax, the same   comments as in RFC 2459 regarding its use applies here as well; i.e.,   Appendix A.1 may be parsed by an 1988 ASN.1-parser by removing the   definitions for the UNIVERSAL types and all references to them in RFC   2459's 1988 modules.   Appendix A.2 is in the 1993 syntax.  However, since the module   imports type definitions from modules in RFC 2459 which are not   completely in the 1993 syntax, the same comments as in RFC 2459   regarding its use applies here as well; i.e., Appendix A.2 may be   parsed by an 1993 ASN.1-parser by removing the UTF8String choice from   the definition of DirectoryString in the module PKIX1Explicit93 in   RFC 2459.  Appendix A.2 may be parsed "as is" by an 1997 ASN.1   parser, however.   In case of discrepancies between these modules, the 1988 module is   the normative one.A.1 1988 ASN.1 ModulePKIXqualified88 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-mod-qualified-cert-88(10) }DEFINITIONS EXPLICIT TAGS ::=BEGIN-- EXPORTS ALL --IMPORTSGeneralName    FROM PKIX1Implicit88 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-pkix1-implicit-88(2)}AlgorithmIdentifier, DirectoryString, Attribute, AttributeType,    id-pkix, id-pe, id-at    FROM PKIX1Explicit88 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)Santesson, et al.           Standards Track                    [Page 17]RFC 3039             Qualified Certificates Profile         January 2001    id-pkix1-explicit-88(1)};-- Locally defined OIDs-- Arc for QC personal data attributesid-pda  OBJECT IDENTIFIER ::= { id-pkix 9 }-- Arc for QC statementsid-qcs  OBJECT IDENTIFIER ::= { id-pkix 11 }-- Attributesid-at-serialNumber          AttributeType ::= { id-at 5 }SerialNumber ::=            PrintableString (SIZE(1..64))id-at-postalAddress         AttributeType ::= { id-at 16 }PostalAddress ::=           SEQUENCE SIZE (1..6) OF DirectoryStringid-at-pseudonym             AttributeType ::= { id-at 65 }Pseudonym ::=               DirectoryStringdomainComponent             AttributeType ::=                            { 0 9 2342 19200300 100 1 25 }DomainComponent ::=         IA5Stringid-pda-dateOfBirth          AttributeType ::= { id-pda 1 }DateOfBirth ::=             GeneralizedTimeid-pda-placeOfBirth         AttributeType ::= { id-pda 2 }PlaceOfBirth ::=            DirectoryStringid-pda-gender               AttributeType ::= { id-pda 3 }Gender ::=                  PrintableString (SIZE(1))                            -- "M", "F", "m" or "f"id-pda-countryOfCitizenship AttributeType ::= { id-pda 4 }CountryOfCitizenship ::=    PrintableString (SIZE (2))                            -- ISO 3166 Country Codeid-pda-countryOfResidence   AttributeType ::= { id-pda 5 }CountryOfResidence ::=      PrintableString (SIZE (2))                            -- ISO 3166 Country Code-- Private extensions-- Biometric info extensionid-pe-biometricInfo OBJECT IDENTIFIER  ::= {id-pe 2}Santesson, et al.           Standards Track                    [Page 18]RFC 3039             Qualified Certificates Profile         January 2001BiometricSyntax ::= SEQUENCE OF BiometricDataBiometricData ::= SEQUENCE {    typeOfBiometricData  TypeOfBiometricData,    hashAlgorithm        AlgorithmIdentifier,    biometricDataHash    OCTET STRING,    sourceDataUri        IA5String OPTIONAL }TypeOfBiometricData ::= CHOICE {    predefinedBiometricType   PredefinedBiometricType,    biometricDataOid          OBJECT IDENTIFIER }PredefinedBiometricType ::= INTEGER {    picture(0),handwritten-signature(1)}    (picture|handwritten-signature)-- QC Statements Extensionid-pe-qcStatements OBJECT IDENTIFIER ::= { id-pe 3}QCStatements ::= SEQUENCE OF QCStatementQCStatement ::= SEQUENCE {    statementId        OBJECT IDENTIFIER,    statementInfo      ANY DEFINED BY statementId OPTIONAL}-- QC statementsid-qcs-pkixQCSyntax-v1   OBJECT IDENTIFIER ::= { id-qcs 1 }--  This statement identifies conformance with syntax and--  semantics defined in this Qualified Certificate profile--  (Version 1). This statement may optionally contain--  additional semantics information as specified below.SemanticsInformation  ::= SEQUENCE {    semanticsIndentifier        OBJECT IDENTIFIER OPTIONAL,    nameRegistrationAuthorities NameRegistrationAuthorities OPTIONAL    } -- At least one field shall be presentNameRegistrationAuthorities ::= SEQUENCE SIZE (1..MAX) OF GeneralNameENDA.2 1993 ASN.1  ModulePKIXqualified93 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-mod-qualified-cert-93(11) }Santesson, et al.           Standards Track                    [Page 19]RFC 3039             Qualified Certificates Profile         January 2001DEFINITIONS EXPLICIT TAGS ::=BEGIN-- EXPORTS ALL --IMPORTSauthorityKeyIdentifier, subjectKeyIdentifier, keyUsage,    extendedKeyUsage, privateKeyUsagePeriod, certificatePolicies,    policyMappings, subjectAltName, issuerAltName, basicConstraints,    nameConstraints, policyConstraints, cRLDistributionPoints,    subjectDirectoryAttributes, authorityInfoAccess, GeneralName,    OTHER-NAME    FROM PKIX1Implicit93 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-pkix1-implicit-93(4)}id-pkix, AlgorithmIdentifier, ATTRIBUTE, Extension, EXTENSION,    DirectoryString{}, ub-name, id-pe, id-at, id-at-commonName,    id-at-surname, id-at-countryName, id-at-localityName,    id-at-stateOrProvinceName, id-at-organizationName,    id-at-organizationalUnitName, id-at-givenName, id-at-dnQualifier,    pkcs9email, title, organizationName, organizationalUnitName,    stateOrProvinceName, localityName, countryName,    generationQualifier, dnQualifier, initials, givenName, surname,    commonName, name    FROM PKIX1Explicit93 {iso(1) identified-organization(3) dod(6)    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)    id-pkix1-explicit-93(3)};-- Object Identifiers-- Externally defined OIDsid-at-serialNumber  OBJECT IDENTIFIER ::= { id-at 5}id-at-postalAddress OBJECT IDENTIFIER ::= { id-at 16 }id-at-pseudonym     OBJECT IDENTIFIER ::= { id-at 65 }id-domainComponent  OBJECT IDENTIFIER ::= { 0 9 2342 19200300 100 1 25 }-- Locally defined OIDs-- Arc for QC personal data attributesid-pda  OBJECT IDENTIFIER ::= { id-pkix 9 }-- Arc for QC statementsid-qcs  OBJECT IDENTIFIER ::= { id-pkix 11 }-- Private extensionsSantesson, et al.           Standards Track                    [Page 20]RFC 3039             Qualified Certificates Profile         January 2001

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -