首页 考试吧论坛 Exam8视线 考试商城 网络课程 模拟考试 考友录 实用文档 求职招聘 论文下载
2011中考 | 2011高考 | 2012考研 | 考研培训 | 在职研 | 自学考试 | 成人高考 | 法律硕士 | MBA考试
MPA考试 | 中科院
四六级 | 职称英语 | 商务英语 | 公共英语 | 托福 | 雅思 | 专四专八 | 口译笔译 | 博思 | GRE GMAT
新概念英语 | 成人英语三级 | 申硕英语 | 攻硕英语 | 职称日语 | 日语学习 | 法语 | 德语 | 韩语
计算机等级考试 | 软件水平考试 | 职称计算机 | 微软认证 | 思科认证 | Oracle认证 | Linux认证
华为认证 | Java认证
公务员 | 报关员 | 银行从业资格 | 证券从业资格 | 期货从业资格 | 司法考试 | 法律顾问 | 导游资格
报检员 | 教师资格 | 社会工作者 | 外销员 | 国际商务师 | 跟单员 | 单证员 | 物流师 | 价格鉴证师
人力资源 | 管理咨询师考试 | 秘书资格 | 心理咨询师考试 | 出版专业资格 | 广告师职业水平
驾驶员 | 网络编辑
卫生资格 | 执业医师 | 执业药师 | 执业护士
会计从业资格考试会计证) | 经济师 | 会计职称 | 注册会计师 | 审计师 | 注册税务师
注册资产评估师 | 高级会计师 | ACCA | 统计师 | 精算师 | 理财规划师 | 国际内审师
一级建造师 | 二级建造师 | 造价工程师 | 造价员 | 咨询工程师 | 监理工程师 | 安全工程师
质量工程师 | 物业管理师 | 招标师 | 结构工程师 | 建筑师 | 房地产估价师 | 土地估价师 | 岩土师
设备监理师 | 房地产经纪人 | 投资项目管理师 | 土地登记代理人 | 环境影响评价师 | 环保工程师
城市规划师 | 公路监理师 | 公路造价师 | 安全评价师 | 电气工程师 | 注册测绘师 | 注册计量师
缤纷校园 | 实用文档 | 英语学习 | 作文大全 | 求职招聘 | 论文下载 | 访谈 | 游戏
您现在的位置: 考试吧(Exam8.com) > 软件水平考试 > 计算机专业英语 > 正文

  The server sends this message when it is satisfied with the clients security handshake and is ready to proceed with transmission/reception of the higher level protocols data. The SESSION-ID-DATA is used by the client and the server at this time to add entries to their respective session-identifier caches. The session-identifier caches must contain a copy of the MASTER-KEY sent in the CLIENT-MASTER-KEY message as the master key is used for all subsequent session key generation.
"N" is the number of bytes in the message that was sent, so "N-1" is the number of bytes in the SESSION-ID-DATA without the message header byte.

  This message must be sent after the SERVER-VERIFY message.


  REQUEST-CERTIFICATE (Phase 2; Sent encrypted)
  char MSG-REQUEST-CERTIFICATE
  char AUTHENTICATION-TYPE
  char CERTIFICATE-CHALLENGE-DATA[N-2]

  A server may issue this request at any time during the second phase of the connection handshake, asking for the client's certificate. The client responds with a CLIENT-CERTIFICATE message immediately if it has one, or an ERROR message (with error code NO-CERTIFICATE-ERROR) if it doesn't. The CERTIFICATE-CHALLENGE-DATA is a short byte string (whose length is greater than or equal to 16 bytes and less than or equal to 32 bytes) that the client will use to respond to this message.
The AUTHENTICATION-TYPE value is used to choose a particular means of authenticating the client. The following types are defined:


  SSL_AT_MD5_WITH_RSA_ENCRYPTION
  The SSL_AT_MD5_WITH_RSA_ENCRYPTION type requires that the client construct an MD5 message digest using information as described above in the section on the CLIENT-CERTIFICATE message. Once the digest is created, the client encrypts it using its private key (formatted according to the digital signature standard defined in PKCS#1). The server authenticates the client when it receives the CLIENT-CERTIFICATE message.

  This message may be sent after a SERVER-VERIFY message and before a SERVER-FINISHED message.


2.7 Client/Server Protocol Messages

  These messages are generated by both the client and the server.

  ERROR (Sent clear or encrypted)
  char MSG-ERROR
  char ERROR-CODE-MSB
  char ERROR-CODE-LSB

  This message is sent when an error is detected. After the message is sent, the sending party shuts the connection down. The receiving party records the error and then shuts its connection down.
This message is sent in the clear if an error occurs during session key negotiation. After a session key has been agreed upon, errors are sent encrypted like all other messages.


  Appendix A: ASN.1 Syntax For Certificates

  Certificates are used by SSL to authenticate servers and clients. SSL Certificates are based largely on the X.509 [3] certificates. An X.509 certificate contains the following information (in ASN.1 [1] notation):

  X.509-Certificate ::= SEQUENCE {
  certificateInfo CertificateInfo,
  signatureAlgorithm AlgorithmIdentifier,
  signature BIT STRING
}

  CertificateInfo ::= SEQUENCE {
  version [0] Version DEFAULT v1988,
  serialNumber CertificateSerialNumber,
  signature AlgorithmIdentifier,
  issuer Name,
  validity Validity,
  subject Name,
  subjectPublicKeyInfo SubjectPublicKeyInfo
}

  Version ::= INTEGER { v1988(0) }

  CertificateSerialNumber ::= INTEGER

  Validity ::= SEQUENCE {
  notBefore UTCTime,
  notAfter UTCTime
}

  SubjectPublicKeyInfo ::= SEQUENCE {
  algorithm AlgorithmIdentifier,
  subjectPublicKey BIT STRING
}

  AlgorithmIdentifier ::= SEQUENCE {
  algorithm OBJECT IDENTIFIER,
  parameters ANY DEFINED BY ALGORITHM OPTIONAL
}

  For SSL's purposes we restrict the values of some of the X.509 fields:

  The X.509-Certificate::signatureAlgorithm and CertificateInfo::signature fields must be identical in value.

  The issuer name must resolve to a name that is deemed acceptable by the application using SSL. How the application using SSL does this is outside the scope of this memo.

  Certificates are validated using a few straightforward steps. First, the signature on the certificate is checked and if invalid, the certificate is invalid (either a transmission error or an attempted forgery occurred). Next, the CertificateInfo::issuer field is verified to be an issuer that the application trusts (using an unspecified mechanism). The CertificateInfo::validity field is checked against the current date and verified.

  Finally, the CertificateInfo::subject field is checked. This check is optional and depends on the level of trust required by the application using SSL.


  Appendix B: Attribute Types and Object Identifiers

  SSL uses a subset of the X.520 selected attribute types as well as a few specific object identifiers. Future revisions of the SSL protocol may include support for more attribute types and more object identifiers.

  B.1 Selected attribute types
  commonName { attributeType 3 }
  The common name contained in the distinguished name contained within a certificate issuer or certificate subject.

  countryName { attributeType 6 }
  The country name contained in the distinguished name contained within a certificate issuer or certificate subject.

  localityName { attributeType 7 }
  The locality name contained in the distinguished name contained within a certificate issuer or certificate subject.

  stateOrProvinceName { attributeType 8 }
  The state or province name contained in the distinguished name contained within a certificate issuer or certificate subject.

  organizationName { attributeType 10 }
  The organization name contained in the distinguished name contained within a certificate issuer or certificate subject.

  organizationalUnitName { attributeType 11 }
  The organizational unit name contained in the distinguished name contained within a certificate issuer or certificate subject.

  B.2 Object identifiers
  md2withRSAEncryption { ... pkcs(1) 1 2 }
  The object identifier for digital signatures that use both MD2 and RSA encryption. Used by SSL for certificate signature verification.

  md5withRSAEncryption { ... pkcs(1) 1 4 }
  The object identifier for digital signatures that use both MD5 and RSA encryption. Used by SSL for certificate signature verification.

  rc4 { ... rsadsi(113549) 3 4 }
  The RC4 symmetric stream cipher algorithm used by SSL for bulk encryption.

  Appendix C: Protocol Constant Values
  This section describes various protocol constants. A special value needs mentioning - the IANA reserved port number for "https" (HTTP using SSL). IANA has reserved port number 443 (decimal) for "https".

  C.1 Protocol Version Codes
  #define SSL_CLIENT_VERSION 0x0002
  #define SSL_SERVER_VERSION 0x0002

  C.2 Protocol Message Codes
  The following values define the message codes that are used by version 2 of the SSL Handshake Protocol.

  #define SSL_MT_ERROR 0
  #define SSL_MT_CLIENT_HELLO 1
  #define SSL_MT_CLIENT_MASTER_KEY 2
  #define SSL_MT_CLIENT_FINISHED 3
  #define SSL_MT_SERVER_HELLO 4
  #define SSL_MT_SERVER_VERIFY 5
  #define SSL_MT_SERVER_FINISHED 6
  #define SSL_MT_REQUEST_CERTIFICATE 7
  #define SSL_MT_CLIENT_CERTIFICATE 8

  C.3 Error Message Codes
  The following values define the error codes used by the ERROR message.

  #define SSL_PE_NO_CIPHER 0x0001
  #define SSL_PE_NO_CERTIFICATE 0x0002
  #define SSL_PE_BAD_CERTIFICATE 0x0004
  #define SSL_PE_UNSUPPORTED_CERTIFICATE_TYPE 0x0006

  C.4 Cipher Kind Values
  The following values define the CIPHER-KIND codes used in the CLIENT-HELLO and SERVER-HELLO messages.

  #define SSL_CK_RC4_128_WITH_MD5 0x01,0x00,0x80
  #define SSL_CK_RC4_128_EXPORT40_WITH_MD5 0x02,0x00,0x80
  #define SSL_CK_RC2_128_CBC_WITH_MD5 0x03,0x00,0x80
  #define SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 0x04,0x00,0x80
  #define SSL_CK_IDEA_128_CBC_WITH_MD5 0x05,0x00,0x80
  #define SSL_CK_DES_64_CBC_WITH_MD5 0x06,0x00,0x40
  #define SSL_CK_DES_192_EDE3_CBC_WITH_MD5 0x07,0x00,0xC0

上一页  1 2 3 4 5 6 7 8 9 10 下一页
文章责编:ak47  
看了本文的网友还看了
·计算机英语因特网(中英对照)  (2007-6-21 8:35:31)
·常见网址英文缩写的含义汇编表  (2007-6-21 11:33:47)
·计算机专业英语名词解释大汇总  (2007-1-25 11:39:39)
·E-mail地址中的符号@是什么意思  (2007-1-25 11:32:20)
·了解到底什么是多媒体  (2007-1-25 11:29:34)
·A range of grid-related questions  (2007-1-25 11:26:39)
文章搜索
软件水平考试栏目导航
版权声明:如果软件水平考试网所转载内容不慎侵犯了您的权益,请与我们联系800@exam8.com,我们将会及时处理。如转载本软件水平考试网内容,请注明出处。