CMC 请求

以下示例包含 CMC 证书请求。 此示例是使用 Certreq.exe 和 Certutil.exe 工具生成的。 用作Certreq.exe输入的 .inf 文件包含以下配置。

[NewRequest]
Subject="cn=TestCN,o=TestOrg"
RequestType=cmc

[RequestAttributes]
CertificateTemplate=User

此配置生成以下示例输出。 配置指定使用者、请求类型 (CMC) ,以及用户) (证书模板。 用户模板指定:

  • 请求必须使用 Microsoft 基础加密提供程序 1.0 或 Microsoft 增强型加密提供程序 1.0。
  • 使用者名称必须从 Active Directory 生成。
  • 该请求包括证书模板名称、增强型密钥用法 (EKU) 和密钥用法扩展。 EKU 扩展指定颁发的证书可用于加密文件系统 (EFS) 、安全电子邮件和客户端身份验证。

CMC 证书请求由 IX509CertificateRequestCmc 接口表示。

PKCS7/CMS Message:
  CMSG_SIGNED(2)
  CMSG_SIGNED_DATA_CMS_VERSION(3)
  Content Type: 1.3.6.1.5.5.7.12.2 CMC Data

PKCS7 Message Content:
================ Begin Nesting Level 1 ================
CMS Certificate Request:
Tagged Attributes: 1

  Body Part Id: 2
  1.3.6.1.4.1.311.10.10.1 CMC Attributes
  Value[0]:
    Data Reference: 0
    Cert Reference[0]: 1
  1 attributes:

  Attribute[0]: 1.3.6.1.4.1.311.21.20 (Client Information)
    Value[0][0]:
    Unknown Attribute type
    Client Id: = 9
      (XECI_DISABLE -- 0)
      (XECI_XENROLL -- 1)
      (XECI_AUTOENROLL -- 2)
      (XECI_REQWIZARD -- 3)
      (XECI_CERTREQ -- 4)
    User: JDOMCSC\administrator
    Machine: vich3d.jdomcsc.nttest.microsoft.com
    Process: certreq
    0000  30 48 02 01 09 0c 23 76  69 63 68 33 64 2e 6a 64   0H....#vich3d.jd
    0010  6f 6d 63 73 63 2e 6e 74  74 65 73 74 2e 6d 69 63   omcsc.nttest.mic
    0020  72 6f 73 6f 66 74 2e 63  6f 6d 0c 15 4a 44 4f 4d   rosoft.com..JDOM
    0030  43 53 43 5c 61 64 6d 69  6e 69 73 74 72 61 74 6f   CSC\administrato
    0040  72 0c 07 63 65 72 74 72  65 71                     r..certreq


Tagged Requests: 1
  CMC_TAGGED_CERT_REQUEST_CHOICE:
  Body Part Id: 1
================ Begin Nesting Level 2 ================
Element 0:
PKCS10 Certificate Request:
Version: 1
Subject:
    O=TestOrg
    CN=TestCN
    [0,0]: CERT_RDN_PRINTABLE_STRING, Length = 6 (6/64 Characters)
        2.5.4.3 Common Name (CN)="TestCN"

        54 65 73 74 43 4e                                  TestCN

        54 00 65 00 73 00 74 00  43 00 4e 00               T.e.s.t.C.N.

    [1,0]: CERT_RDN_PRINTABLE_STRING, Length = 7 (7/64 Characters)
        2.5.4.10 Organization (O)="TestOrg"

        54 65 73 74 4f 72 67                               TestOrg

        54 00 65 00 73 00 74 00  4f 00 72 00 67 00         T.e.s.t.O.r.g.


Public Key Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.1 RSA (RSA_SIGN)
    Algorithm Parameters:
    05 00
Public Key Length: 1024 bits
Public Key: UnusedBits = 0
    0000  30 81 89 02 81 81 00 af  5e 54 53 58 0d 96 c6 b3
    0010  c0 77 3f 3d 6a 01 8a b6  e8 1f 12 ed da b3 f2 3f
    0020  f3 f0 31 99 61 a1 25 bb  bf 3b d0 aa ae d5 0f ac
    0030  12 a4 30 1f 92 83 e9 bd  6f c8 47 6f 57 8e 91 23
    0040  ac fa 14 ad 42 b7 f9 b1  ab e1 2a 92 7d 76 7a 97
    0050  49 95 83 eb c1 07 89 56  a9 16 96 03 1c e4 01 34
    0060  ff f0 94 8a 83 f9 68 70  92 d1 59 bf 15 70 0f e8
    0070  fd 4b eb 5c e7 9e 1d 4c  e6 73 99 12 7e 52 91 92
    0080  9b 2e d3 2b 0d 89 65 02  03 01 00 01
Request Attributes: 5
  5 attributes:

  Attribute[0]: 1.3.6.1.4.1.311.13.2.3 (OS Version)
    Value[0][0]:
        6.0.5361.2
    0000  16 0a 36 2e 30 2e 35 33  36 31 2e 32               ..6.0.5361.2

  Attribute[1]: 1.3.6.1.4.1.311.13.2.1 (Enrollment Name Value Pair)
    Value[1][0]:
        CertificateTemplate=User
    0000  30 32 1e 26 00 43 00 65  00 72 00 74 00 69 00 66   02.&.C.e.r.t.i.f
    0010  00 69 00 63 00 61 00 74  00 65 00 54 00 65 00 6d   .i.c.a.t.e.T.e.m
    0020  00 70 00 6c 00 61 00 74  00 65 1e 08 00 55 00 73   .p.l.a.t.e...U.s
    0030  00 65 00 72                                        .e.r

  Attribute[2]: 1.3.6.1.4.1.311.21.20 (Client Information)
    Value[2][0]:
    Unknown Attribute type
    Client Id: = 9
      (XECI_DISABLE -- 0)
      (XECI_XENROLL -- 1)
      (XECI_AUTOENROLL -- 2)
      (XECI_REQWIZARD -- 3)
      (XECI_CERTREQ -- 4)
    User: JDOMCSC\administrator
    Machine: vich3d.jdomcsc.nttest.microsoft.com
    Process: certreq
    0000  30 48 02 01 09 0c 23 76  69 63 68 33 64 2e 6a 64   0H....#vich3d.jd
    0010  6f 6d 63 73 63 2e 6e 74  74 65 73 74 2e 6d 69 63   omcsc.nttest.mic
    0020  72 6f 73 6f 66 74 2e 63  6f 6d 0c 15 4a 44 4f 4d   rosoft.com..JDOM
    0030  43 53 43 5c 61 64 6d 69  6e 69 73 74 72 61 74 6f   CSC\administrato
    0040  72 0c 07 63 65 72 74 72  65 71                     r..certreq

  Attribute[3]: 1.3.6.1.4.1.311.13.2.2 (Enrollment CSP)
    Value[3][0]:
    Unknown Attribute type
    CSP Provider Info
    KeySpec = 1
    Provider = Microsoft Enhanced Cryptographic Provider v1.0
    Signature: UnusedBits=0
    0000  30 64 02 01 01 1e 5c 00  4d 00 69 00 63 00 72 00   0d....\.M.i.c.r.
    0010  6f 00 73 00 6f 00 66 00  74 00 20 00 45 00 6e 00   o.s.o.f.t. .E.n.
    0020  68 00 61 00 6e 00 63 00  65 00 64 00 20 00 43 00   h.a.n.c.e.d. .C.
    0030  72 00 79 00 70 00 74 00  6f 00 67 00 72 00 61 00   r.y.p.t.o.g.r.a.
    0040  70 00 68 00 69 00 63 00  20 00 50 00 72 00 6f 00   p.h.i.c. .P.r.o.
    0050  76 00 69 00 64 00 65 00  72 00 20 00 76 00 31 00   v.i.d.e.r. .v.1.
    0060  2e 00 30 03 01 00                                  ..0...

  Attribute[4]: 1.2.840.113549.1.9.14 (Certificate Extensions)
    Value[4][0]:
    Unknown Attribute type
Certificate Extensions: 4
    1.3.6.1.4.1.311.20.2: Flags = 0, Length = a
    Certificate Template Name (Certificate Type)
        User

    0000  1e 08 00 55 00 73 00 65  00 72                     ...U.s.e.r

    2.5.29.37: Flags = 0, Length = 22
    Enhanced Key Usage
        Encrypting File System (1.3.6.1.4.1.311.10.3.4)
        Secure Email (1.3.6.1.5.5.7.3.4)
        Client Authentication (1.3.6.1.5.5.7.3.2)

    0000  30 20 06 0a 2b 06 01 04  01 82 37 0a 03 04 06 08   0 ..+.....7.....
    0010  2b 06 01 05 05 07 03 04  06 08 2b 06 01 05 05 07   +.........+.....
    0020  03 02                                              ..

    2.5.29.15: Flags = 1(Critical), Length = 4
    Key Usage
        Digital Signature, Key Encipherment (a0)

    0000  03 02 05 a0                                        ....

    2.5.29.14: Flags = 0, Length = 16
    Subject Key Identifier
        36 91 78 7a 2f 0b b7 ef af 06 e2 9c 3c cb 06 51 d8 9d 70 57

    0000  04 14 36 91 78 7a 2f 0b  b7 ef af 06 e2 9c 3c cb   ..6.xz/.......<.
    0010  06 51 d8 9d 70 57                                  .Q..pW

    0000  30 73 30 17 06 09 2b 06  01 04 01 82 37 14 02 04   0s0...+.....7...
    0010  0a 1e 08 00 55 00 73 00  65 00 72 30 29 06 03 55   ....U.s.e.r0)..U
    0020  1d 25 04 22 30 20 06 0a  2b 06 01 04 01 82 37 0a   .%."0 ..+.....7.
    0030  03 04 06 08 2b 06 01 05  05 07 03 04 06 08 2b 06   ....+.........+.
    0040  01 05 05 07 03 02 30 0e  06 03 55 1d 0f 01 01 ff   ......0...U.....
    0050  04 04 03 02 05 a0 30 1d  06 03 55 1d 0e 04 16 04   ......0...U.....
    0060  14 36 91 78 7a 2f 0b b7  ef af 06 e2 9c 3c cb 06   .6.xz/.......<..
    0070  51 d8 9d 70 57                                     Q..pW
Signature Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.5 sha1RSA
    Algorithm Parameters:
    05 00
Signature: UnusedBits=0
    0000  62 27 88 c7 5b b4 84 2a  60 88 4a 39 2b e1 64 46
    0010  f3 dc 1c 3a be 56 b9 0e  a7 39 83 d6 1f 88 39 7e
    0020  54 26 7e cf 4b 5f b2 16  25 5c 08 81 ef 7a 9e 9c
    0030  29 d2 0e 74 8d 60 34 d7  1b f9 ac ce 55 2a e0 9a
    0040  8c 08 bd 34 01 bc 8b 70  91 6f f8 eb bb de 8a 2d
    0050  b4 c6 66 d3 7c 86 d5 6c  0f 6e 22 95 ae 09 a8 2d
    0060  91 45 12 56 4d 8c e1 0a  a8 42 15 29 fe ed 15 8a
    0070  bc b9 ba 05 b3 e5 7f c3  ea c0 df 76 99 1b b7 a8
Signature matches Public Key
Key Id Hash(rfc-sha1): 36 91 78 7a 2f 0b b7 ef af 06 e2 9c 3c cb 06 51 d8 9d 70 57
Key Id Hash(sha1): 13 e5 cb f4 54 75 e5 e0 62 6e 20 f6 d3 d7 b0 51 9d 0e 0d 35
----------------  End Nesting Level 2  ----------------

Tagged Content Info: 0
Tagged Other Messages: 0
----------------  End Nesting Level 1  ----------------

Signer Count: 1

Signer Info[0]:
Signature matches request Public Key
CMSG_SIGNER_INFO_CMS_VERSION(3)
CERT_ID_KEY_IDENTIFIER(2)
    0000  36 91 78 7a 2f 0b b7 ef  af 06 e2 9c 3c cb 06 51
    0010  d8 9d 70 57
Hash Algorithm:
    Algorithm ObjectId: 1.3.14.3.2.26 sha1 (sha1NoSign)
    Algorithm Parameters: NULL
Encrypted Hash Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.1 RSA (RSA_SIGN)
    Algorithm Parameters: NULL
Encrypted Hash:
    0000  38 10 60 e2 70 69 91 4a  8b b5 22 57 2a 62 ef de
    0010  15 7d 59 d6 4e 20 9a 45  2b e3 fd fc 68 ba af bf
    0020  9c 17 b0 8e 6d c4 29 1e  e3 21 ac bb 5a 8a c9 67
    0030  0a d4 45 93 10 c0 26 eb  0a 83 c2 b1 40 87 36 f7
    0040  a0 26 da b9 bb 46 73 88  7a 67 b9 e6 b3 6f ea 59
    0050  28 8a d3 92 72 f6 7b 89  a0 d8 2d 9e 40 eb 1e bb
    0060  6e ae f0 5a ed 16 c9 e3  27 59 37 8f f3 4a 98 60
    0070  f8 fb a7 0a ee 1b 6e 91  95 96 cf 0d 56 ac ab 35

Authenticated Attributes[0]:
  2 attributes:

  Attribute[0]: 1.2.840.113549.1.9.3 (Content Type)
    Value[0][0]:
    Unknown Attribute type
    1.3.6.1.5.5.7.12.2 CMC Data
    0000  06 08 2b 06 01 05 05 07  0c 02                     ..+.......

  Attribute[1]: 1.2.840.113549.1.9.4 (Message Digest)
    Value[1][0]:
    Unknown Attribute type
    Message Digest(certutil):
        d1 5d 41 ed 30 cb ca d1 24 0a 57 00 ea 6b 47 a2 f8 79 cd 9b
    0000  04 14 d1 5d 41 ed 30 cb  ca d1 24 0a 57 00 ea 6b   ...]A.0...$.W..k
    0010  47 a2 f8 79 cd 9b                                  G..y..

Unauthenticated Attributes[0]:
  0 attributes:

Computed Hash: 51 47 46 b5 98 2e bc bc 79 43 aa 59 05 1b 77 8d 65 2c be 59
No Recipient

No Certificates
No CRLs
CertUtil: -dump command completed successfully.

示例请求