黄色在线观看视频-黄色在线免费看-黄色在线视频免费-黄色在线视频免费看-免费啪啪网-免费啪啪网站

首頁 考試吧論壇 Exam8視線 考試商城 網絡課程 模擬考試 考友錄 實用文檔 求職招聘 論文下載
2011中考 | 2011高考 | 2012考研 | 考研培訓 | 在職研 | 自學考試 | 成人高考 | 法律碩士 | MBA考試
MPA考試 | 中科院
四六級 | 職稱英語 | 商務英語 | 公共英語 | 托福 | 雅思 | 專四專八 | 口譯筆譯 | 博思 | GRE GMAT
新概念英語 | 成人英語三級 | 申碩英語 | 攻碩英語 | 職稱日語 | 日語學習 | 法語 | 德語 | 韓語
計算機等級考試 | 軟件水平考試 | 職稱計算機 | 微軟認證 | 思科認證 | Oracle認證 | Linux認證
華為認證 | Java認證
公務員 | 報關員 | 銀行從業資格 | 證券從業資格 | 期貨從業資格 | 司法考試 | 法律顧問 | 導游資格
報檢員 | 教師資格 | 社會工作者 | 外銷員 | 國際商務師 | 跟單員 | 單證員 | 物流師 | 價格鑒證師
人力資源 | 管理咨詢師考試 | 秘書資格 | 心理咨詢師考試 | 出版專業資格 | 廣告師職業水平
駕駛員 | 網絡編輯
衛生資格 | 執業醫師 | 執業藥師 | 執業護士
會計從業資格考試會計證) | 經濟師 | 會計職稱 | 注冊會計師 | 審計師 | 注冊稅務師
注冊資產評估師 | 高級會計師 | ACCA | 統計師 | 精算師 | 理財規劃師 | 國際內審師
一級建造師 | 二級建造師 | 造價工程師 | 造價員 | 咨詢工程師 | 監理工程師 | 安全工程師
質量工程師 | 物業管理師 | 招標師 | 結構工程師 | 建筑師 | 房地產估價師 | 土地估價師 | 巖土師
設備監理師 | 房地產經紀人 | 投資項目管理師 | 土地登記代理人 | 環境影響評價師 | 環保工程師
城市規劃師 | 公路監理師 | 公路造價師 | 安全評價師 | 電氣工程師 | 注冊測繪師 | 注冊計量師
繽紛校園 | 實用文檔 | 英語學習 | 作文大全 | 求職招聘 | 論文下載 | 訪談 | 游戲
您現在的位置: 考試吧(Exam8.com) > 軟件水平考試 > 計算機專業英語 > 正文

  The server sends this message when it is satisfied with the clients security handshake and is ready to proceed with transmission/reception of the higher level protocols data. The SESSION-ID-DATA is used by the client and the server at this time to add entries to their respective session-identifier caches. The session-identifier caches must contain a copy of the MASTER-KEY sent in the CLIENT-MASTER-KEY message as the master key is used for all subsequent session key generation.
"N" is the number of bytes in the message that was sent, so "N-1" is the number of bytes in the SESSION-ID-DATA without the message header byte.

  This message must be sent after the SERVER-VERIFY message.


  REQUEST-CERTIFICATE (Phase 2; Sent encrypted)
  char MSG-REQUEST-CERTIFICATE
  char AUTHENTICATION-TYPE
  char CERTIFICATE-CHALLENGE-DATA[N-2]

  A server may issue this request at any time during the second phase of the connection handshake, asking for the client's certificate. The client responds with a CLIENT-CERTIFICATE message immediately if it has one, or an ERROR message (with error code NO-CERTIFICATE-ERROR) if it doesn't. The CERTIFICATE-CHALLENGE-DATA is a short byte string (whose length is greater than or equal to 16 bytes and less than or equal to 32 bytes) that the client will use to respond to this message.
The AUTHENTICATION-TYPE value is used to choose a particular means of authenticating the client. The following types are defined:


  SSL_AT_MD5_WITH_RSA_ENCRYPTION
  The SSL_AT_MD5_WITH_RSA_ENCRYPTION type requires that the client construct an MD5 message digest using information as described above in the section on the CLIENT-CERTIFICATE message. Once the digest is created, the client encrypts it using its private key (formatted according to the digital signature standard defined in PKCS#1). The server authenticates the client when it receives the CLIENT-CERTIFICATE message.

  This message may be sent after a SERVER-VERIFY message and before a SERVER-FINISHED message.


2.7 Client/Server Protocol Messages

  These messages are generated by both the client and the server.

  ERROR (Sent clear or encrypted)
  char MSG-ERROR
  char ERROR-CODE-MSB
  char ERROR-CODE-LSB

  This message is sent when an error is detected. After the message is sent, the sending party shuts the connection down. The receiving party records the error and then shuts its connection down.
This message is sent in the clear if an error occurs during session key negotiation. After a session key has been agreed upon, errors are sent encrypted like all other messages.


  Appendix A: ASN.1 Syntax For Certificates

  Certificates are used by SSL to authenticate servers and clients. SSL Certificates are based largely on the X.509 [3] certificates. An X.509 certificate contains the following information (in ASN.1 [1] notation):

  X.509-Certificate ::= SEQUENCE {
  certificateInfo CertificateInfo,
  signatureAlgorithm AlgorithmIdentifier,
  signature BIT STRING
}

  CertificateInfo ::= SEQUENCE {
  version [0] Version DEFAULT v1988,
  serialNumber CertificateSerialNumber,
  signature AlgorithmIdentifier,
  issuer Name,
  validity Validity,
  subject Name,
  subjectPublicKeyInfo SubjectPublicKeyInfo
}

  Version ::= INTEGER { v1988(0) }

  CertificateSerialNumber ::= INTEGER

  Validity ::= SEQUENCE {
  notBefore UTCTime,
  notAfter UTCTime
}

  SubjectPublicKeyInfo ::= SEQUENCE {
  algorithm AlgorithmIdentifier,
  subjectPublicKey BIT STRING
}

  AlgorithmIdentifier ::= SEQUENCE {
  algorithm OBJECT IDENTIFIER,
  parameters ANY DEFINED BY ALGORITHM OPTIONAL
}

  For SSL's purposes we restrict the values of some of the X.509 fields:

  The X.509-Certificate::signatureAlgorithm and CertificateInfo::signature fields must be identical in value.

  The issuer name must resolve to a name that is deemed acceptable by the application using SSL. How the application using SSL does this is outside the scope of this memo.

  Certificates are validated using a few straightforward steps. First, the signature on the certificate is checked and if invalid, the certificate is invalid (either a transmission error or an attempted forgery occurred). Next, the CertificateInfo::issuer field is verified to be an issuer that the application trusts (using an unspecified mechanism). The CertificateInfo::validity field is checked against the current date and verified.

  Finally, the CertificateInfo::subject field is checked. This check is optional and depends on the level of trust required by the application using SSL.


  Appendix B: Attribute Types and Object Identifiers

  SSL uses a subset of the X.520 selected attribute types as well as a few specific object identifiers. Future revisions of the SSL protocol may include support for more attribute types and more object identifiers.

  B.1 Selected attribute types
  commonName { attributeType 3 }
  The common name contained in the distinguished name contained within a certificate issuer or certificate subject.

  countryName { attributeType 6 }
  The country name contained in the distinguished name contained within a certificate issuer or certificate subject.

  localityName { attributeType 7 }
  The locality name contained in the distinguished name contained within a certificate issuer or certificate subject.

  stateOrProvinceName { attributeType 8 }
  The state or province name contained in the distinguished name contained within a certificate issuer or certificate subject.

  organizationName { attributeType 10 }
  The organization name contained in the distinguished name contained within a certificate issuer or certificate subject.

  organizationalUnitName { attributeType 11 }
  The organizational unit name contained in the distinguished name contained within a certificate issuer or certificate subject.

  B.2 Object identifiers
  md2withRSAEncryption { ... pkcs(1) 1 2 }
  The object identifier for digital signatures that use both MD2 and RSA encryption. Used by SSL for certificate signature verification.

  md5withRSAEncryption { ... pkcs(1) 1 4 }
  The object identifier for digital signatures that use both MD5 and RSA encryption. Used by SSL for certificate signature verification.

  rc4 { ... rsadsi(113549) 3 4 }
  The RC4 symmetric stream cipher algorithm used by SSL for bulk encryption.

  Appendix C: Protocol Constant Values
  This section describes various protocol constants. A special value needs mentioning - the IANA reserved port number for "https" (HTTP using SSL). IANA has reserved port number 443 (decimal) for "https".

  C.1 Protocol Version Codes
  #define SSL_CLIENT_VERSION 0x0002
  #define SSL_SERVER_VERSION 0x0002

  C.2 Protocol Message Codes
  The following values define the message codes that are used by version 2 of the SSL Handshake Protocol.

  #define SSL_MT_ERROR 0
  #define SSL_MT_CLIENT_HELLO 1
  #define SSL_MT_CLIENT_MASTER_KEY 2
  #define SSL_MT_CLIENT_FINISHED 3
  #define SSL_MT_SERVER_HELLO 4
  #define SSL_MT_SERVER_VERIFY 5
  #define SSL_MT_SERVER_FINISHED 6
  #define SSL_MT_REQUEST_CERTIFICATE 7
  #define SSL_MT_CLIENT_CERTIFICATE 8

  C.3 Error Message Codes
  The following values define the error codes used by the ERROR message.

  #define SSL_PE_NO_CIPHER 0x0001
  #define SSL_PE_NO_CERTIFICATE 0x0002
  #define SSL_PE_BAD_CERTIFICATE 0x0004
  #define SSL_PE_UNSUPPORTED_CERTIFICATE_TYPE 0x0006

  C.4 Cipher Kind Values
  The following values define the CIPHER-KIND codes used in the CLIENT-HELLO and SERVER-HELLO messages.

  #define SSL_CK_RC4_128_WITH_MD5 0x01,0x00,0x80
  #define SSL_CK_RC4_128_EXPORT40_WITH_MD5 0x02,0x00,0x80
  #define SSL_CK_RC2_128_CBC_WITH_MD5 0x03,0x00,0x80
  #define SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 0x04,0x00,0x80
  #define SSL_CK_IDEA_128_CBC_WITH_MD5 0x05,0x00,0x80
  #define SSL_CK_DES_64_CBC_WITH_MD5 0x06,0x00,0x40
  #define SSL_CK_DES_192_EDE3_CBC_WITH_MD5 0x07,0x00,0xC0

上一頁  1 2 3 4 5 6 7 8 9 10 下一頁
文章責編:ak47  
看了本文的網友還看了
·計算機英語因特網(中英對照)  (2007-6-21 8:35:31)
·常見網址英文縮寫的含義匯編表  (2007-6-21 11:33:47)
·計算機專業英語名詞解釋大匯總  (2007-1-25 11:39:39)
·E-mail地址中的符號@是什么意思  (2007-1-25 11:32:20)
·了解到底什么是多媒體  (2007-1-25 11:29:34)
·A range of grid-related questions  (2007-1-25 11:26:39)
文章搜索
軟件水平考試欄目導航
版權聲明:如果軟件水平考試網所轉載內容不慎侵犯了您的權益,請與我們聯系800@exam8.com,我們將會及時處理。如轉載本軟件水平考試網內容,請注明出處。
主站蜘蛛池模板: 欧洲成人在线视频 | 欧美视频亚洲视频 | 欧美一级特黄aaa大片 | 国产成人一区二区三区在线播放 | 在线看成人片 | 在线免费视频网站 | 中文字字幕码一二三区 | 北条麻妃中文字幕在线观看 | 污污免费视频 | 一区二区三区四区精品视频 | 久久一级毛片 | 亚洲高清二区 | 久久天天 | 激情丁香开心久久综合 | 亚洲国产成人成上人色 | 精品国产一区二区三区www | 日日操夜夜操视频 | 久久国产香蕉视频 | 免费视频久久久 | 午夜免费观看体验区入口 | 人人干视频在线观看 | 久久精品成人免费网站 | 欧美亚洲另类色国产综合 | 日本免费专区 | 天堂资源wwww在线看 | 亚洲v天堂v手机在线观看 | 羞羞视频网址 | 成年性午夜免费视频网站不卡 | 综合五月天堂 | 欧美xxxx成人免费网站 | 欧美午夜在线播放 | 一级寡妇乱色毛片全场免费 | 欧美一级特黄啪啪片免费看 | 黄色小视频在线免费观看 | 夜色福利视频 | 可以免费观看一级毛片黄a 可以免费观看的一级毛片 可以免费观看的黄色网址 可以看的黄色网址 | 亚洲一区二区三区免费观看 | 又黄又免费的视频 | 亚洲国产高清视频 | 亚洲第一视频网站 | 免费人成激情视频在线观看 |