Certificate attributes
This section lists the filterable certificate attributes and indicates whether the CryptoAPI and Netscape signature engines return identical strings when returning certificate attributes with identical data. If you want to filter for specific filteridentity tag values without specifying an engine, filter for strings that can be recognized by both RSA-compliant signature engines. If you want to filter for other tag values, your organization should maintain a policy stating the preferred signature engine for attaining digital certificates.
For example, if you wanted to filter for certificates encrypted with an md5 algorithm, you would find that Netscape and CryptoAPI return different strings for this attribute. CryptoAPI returns md5RSA, while Netscape returns PKCS #1 MD5 With RSA Encryption. If you listed either of these attributes as a tag value, you would return certificates from only one engine.
Subject: CN | the certificate owner’s common name | Yes |
Subject: E | the certificate owner’s email address | Yes |
Subject: T | the certificate owner’s locality | Yes |
Subject: ST | the certificate owner’s state of residence | Yes |
Subject: O | the organization to which the certificate owner belongs | Yes |
Subject: OU | the name of the organizational unit to which the certificate owner belongs | Yes |
Subject: C | the certificate owner’s country of residence | Yes |
Subject: STREET | the certificate owner’s street address | Yes |
Subject: ALL | the certificate owner’s complete distinguished name | Yes |
Issuer: CN | the certificate issuer’s common name | Yes |
Issuer: E | the certificate issuer’s email address | Yes |
Issuer: T | the certificate issuer’s locality | Yes |
Issuer: ST | the certificate issuer’s state of residence | Yes |
Issuer: O | the organization to which the certificate issuer belongs | Yes |
Issuer: OU | the name of the organizational unit to which the certificate issuer belongs | Yes |
Issuer: C | the certificate issuer’s country of residence | Yes |
Issuer: STREET | the certificate issuer’s street address | Yes |
Issuer: ALL | the certificate issuer’s complete distinguished name | Yes |
Serial | the certificate’s serial number | No |
SignatureAlg | the algorithm used by the Certificate Authority to sign the certificate | No |
BeginDate | the date at which the certificate becomes valid | Yes |
EndDate | the date at which the certificate becomes invalid | Yes |
PublicKey | the certificate’s public key | No |
FriendlyName | the certificate’s friendly name | No |
KeyUsage: ALL | indicates the purposes for which the certificate’s public key can be used | No |
KeyUsage: Digital Signature | this certificate’s public key can create digital signatures | No |
KeyUsage: NonRepudiation | this certificate’s public key can be used for non-repudiation | No |
KeyUsage: KeyEncipherment | this certificate’s public key can encipher keys | No |
KeyUsage: DataEncipherment | this certificate’s public key can encipher data | No |
KeyUsage: KeyAgreement | this certificate’s public key can ensure that other public keys match their certificates. Used in certificate management. | No |
KeyUsage: KeyCertSign | this certificate’s public key can sign key certificates | No |
KeyUsage: CRLSign | this certificate’s public key can sign Certificate Revocation Lists | No |
KeyUsage: EncipherOnly | this certificate’s public key can only encipher keys or data | No |
KeyUsage: DecipherOnly | this certificate’s public key can only decipher keys or data | No |
BasicConstraints | behaves as though the fCA tag was specified | Yes |
BasicConstraints: fCA | determines whether the subject of this certificate can act as a Certificate Authority (1 if true, 0 if false) | Yes |
BasicConstraints: pathLength | the number of CA certificates that can follow this certificate in a certification path. | Yes |
Policies | returns all of the Object Identification Numbers of the certificate's policies in a comma separated string | Yes |
PolicyConstraints: requireExplicitPolicy | indicates whether an explicit policy is required | Yes |
PolicyConstraints: inhibitPolicyMapping | indicates whether policy mapping is inhibited | Yes |
Engine: Name | the name of the signature engine that created the certificate | Yes |
相关推荐
WANG Zhong-rong, LIU Zhao School of Electronic ...Key Words streaming media; Binary Runtime Environment for Wireless (BREW); Real-time Transport Protocol (RTP); Real-time Streaming Protocol (RTSP)
squaremod( t[(i+2)%DWORDS_IN_KEY]^t[(i+3)%DWORDS_IN_KEY], prime[(i+2)%DWORDS_IN_KEY] ); } } // generates the decryption subkeys from the encryption subkeys void de_key_ake32(ake32key EK, ake32...
Key words: Newton iterates the equation root 1 牛顿迭代法的简介 1.1 牛顿迭代法的概述 牛顿迭代法(Newton's method)又称为牛顿-拉夫逊方法(Newton-Raphson method),它是牛顿在17世纪提出的...
reverse_word_index = dict([(value, key) for (key, value) in word_index.items()]) # We decode the review; note that our indices were offset by 3 # because 0, 1 and 2 are reserved indices for "padding",...
Key words: automated testing, computer security, cryptographic algorithms, cryptography, Triple Data Encryption Algorithm (TDEA), Triple Data Encryption Standard (TDES), Federal Information Processing...
1.首先是这样写的: import jieba txt = open(D:/python程序/threekingdoms.txt,rt,encoding='utf-8').read() words=jieba.lcut(txt) counts={} for word in words: ...items.sort(key=lambda x:x[1],reverse=True)
硕士论文选辑(一)。 With the developing of Internet and the increasing of users , the Chinese text for the Internet are growing ...Key Words: Cloud Computing; Text; Support Vector Machine; MapReduce
wc Count the number of lines, words, and chars in an object who Display credential information whoami Display information about this peer or the current peergroup xfer Send a file to another peer
A function key “Editor: Refresh Code Assistant” has been added, to bring the Code Assistant up to date after creating new database objects. When selecting a word, all matching words will be ...
Throughout this text, the words “host” and “end system” are used interchangeably. End systems include PCs, workstations, Web servers, mail servers, PDAs, Internet-connected game consoles, etc. ...
(case=1521) 6792, 5961, 5796, 5249 Long words (>64 chars) in comments are not underlined as mistyped. (case=3485) 5634, 5588 Improved Autosave performance. (case=9821) 6916, 5613 Open ...
Key Words Simple priority relations Over relations Less than relations Equal relations 目 录 摘要…………………………………………………………………………………………2 一、概述……………………...
>>> emojiable_words.sort(key=lambda x: len(x), reverse=True) >>> for word in emojiable_words[:30]: ... print(word) ... antidiscrimination antivaccinationist coccidioidomycosis transincorporation ...
1.6.2. A reference model in physical reality: the channel with Gaussian additive noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 1.6.3. Communication via a channel with additive ...
Key words: through measurement; error prediction; through the meeting point; optimal solution 1 工程概况 彩屯煤矿位于本溪市西湖区,井田平均走向长5470m,平均倾斜宽3500m,面积19.30 平方公里。上起—350m...
X509 version 3 certification. Each certificate is generated and signed by a recognized certificate authority and has a unique serial number. Information about the X509 standard can be found at the let...
containing the words 'false' and 'true' for saving/reading TBoolProp. - ADD: In the module FlexUtils added the function FlexStrNeedQuote. Returns True if the string must be enclosed in quotes (flex...
x 执行权限;对目录,是进入该目录 - 表示没有权限 形式 - rw- r-- r-- 其中 第一个是文件类型(-表普通文件,d表目录,l表软链接文件) 第2~4个是属主,生成文件时登录的人,权限最高,用u表示 第5~7个是属组...
Associating Multiple Values with Each Key in a Dictionary Recipe 4.16. Using a Dictionary to Dispatch Methods or Functions Recipe 4.17. Finding Unions and Intersections of Dictionaries Recipe ...
SCGCQ00289585 Defect Command line generated along with press any key in help file operation SCGCQ00315805 Defect Change the UI fro "adpBBucmd getbbumodes a0" command SCGCQ00317547 Defect MegaCLI ...