亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專(zhuān)輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? snmp-user-based-sm-mib.txt

?? 數(shù)據(jù)庫(kù)軟件 php-5.2.1-Win32.zip
?? TXT
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
SNMP-USER-BASED-SM-MIB DEFINITIONS ::= BEGIN

IMPORTS
    MODULE-IDENTITY, OBJECT-TYPE,
    OBJECT-IDENTITY,
    snmpModules, Counter32                FROM SNMPv2-SMI
    TEXTUAL-CONVENTION, TestAndIncr,
    RowStatus, RowPointer,
    StorageType, AutonomousType           FROM SNMPv2-TC
    MODULE-COMPLIANCE, OBJECT-GROUP       FROM SNMPv2-CONF
    SnmpAdminString, SnmpEngineID,
    snmpAuthProtocols, snmpPrivProtocols  FROM SNMP-FRAMEWORK-MIB;

snmpUsmMIB MODULE-IDENTITY
    LAST-UPDATED "9901200000Z"            -- 20 Jan 1999, midnight
    ORGANIZATION "SNMPv3 Working Group"
    CONTACT-INFO "WG-email:   snmpv3@lists.tislabs.com
                  Subscribe:  majordomo@lists.tislabs.com
                              In msg body:  subscribe snmpv3

                  Chair:      Russ Mundy
                              Trusted Information Systems
                  postal:     3060 Washington Rd
                              Glenwood MD 21738
                              USA
                  email:      mundy@tislabs.com
                  phone:      +1-301-854-6889

                  Co-editor   Uri Blumenthal

                              IBM T. J. Watson Research
                  postal:     30 Saw Mill River Pkwy,
                              Hawthorne, NY 10532
                              USA
                  email:      uri@watson.ibm.com
                  phone:      +1-914-784-7964

                  Co-editor:  Bert Wijnen
                              IBM T. J. Watson Research
                  postal:     Schagen 33
                              3461 GL Linschoten
                              Netherlands
                  email:      wijnen@vnet.ibm.com
                  phone:      +31-348-432-794
                 "
    DESCRIPTION  "The management information definitions for the
                  SNMP User-based Security Model.
                 "
--  Revision history

    REVISION     "9901200000Z"            -- 20 Jan 1999, midnight
    DESCRIPTION  "Clarifications, published as RFC2574"

    REVISION     "9711200000Z"            -- 20 Nov 1997, midnight
    DESCRIPTION  "Initial version, published as RFC2274"
    ::= { snmpModules 15 }

-- Administrative assignments ****************************************

usmMIBObjects     OBJECT IDENTIFIER ::= { snmpUsmMIB 1 }
usmMIBConformance OBJECT IDENTIFIER ::= { snmpUsmMIB 2 }

-- Identification of Authentication and Privacy Protocols ************

usmNoAuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "No Authentication Protocol."
    ::= { snmpAuthProtocols 1 }

usmHMACMD5AuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The HMAC-MD5-96 Digest Authentication Protocol."
    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti HMAC:
                    Keyed-Hashing for Message Authentication,
                    RFC2104, Feb 1997.
                  - Rivest, R., Message Digest Algorithm MD5, RFC1321.
                 "
    ::= { snmpAuthProtocols 2 }

usmHMACSHAAuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The HMAC-SHA-96 Digest Authentication Protocol."
    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti, HMAC:
                    Keyed-Hashing for Message Authentication,
                    RFC2104, Feb 1997.
                  - Secure Hash Algorithm. NIST FIPS 180-1.
                 "
    ::= { snmpAuthProtocols 3 }

usmNoPrivProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "No Privacy Protocol."
    ::= { snmpPrivProtocols 1 }

usmDESPrivProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The CBC-DES Symmetric Encryption Protocol."
    REFERENCE    "- Data Encryption Standard, National Institute of
                    Standards and Technology.  Federal Information
                    Processing Standard (FIPS) Publication 46-1.
                    Supersedes FIPS Publication 46,
                    (January, 1977; reaffirmed January, 1988).

                  - Data Encryption Algorithm, American National
                    Standards Institute.  ANSI X3.92-1981,
                    (December, 1980).

                  - DES Modes of Operation, National Institute of
                    Standards and Technology.  Federal Information
                    Processing Standard (FIPS) Publication 81,
                    (December, 1980).

                  - Data Encryption Algorithm - Modes of Operation,
                    American National Standards Institute.
                    ANSI X3.106-1983, (May 1983).
                 "
    ::= { snmpPrivProtocols 2 }

-- Textual Conventions ***********************************************

KeyChange ::=     TEXTUAL-CONVENTION
   STATUS         current
   DESCRIPTION
         "Every definition of an object with this syntax must identify
          a protocol P, a secret key K, and a hash algorithm H
          that produces output of L octets.

          The object's value is a manager-generated, partially-random
          value which, when modified, causes the value of the secret
          key K, to be modified via a one-way function.

          The value of an instance of this object is the concatenation
          of two components: first a 'random' component and then a
          'delta' component.

          The lengths of the random and delta components
          are given by the corresponding value of the protocol P;
          if P requires K to be a fixed length, the length of both the
          random and delta components is that fixed length; if P
          allows the length of K to be variable up to a particular
          maximum length, the length of the random component is that
          maximum length and the length of the delta component is any
          length less than or equal to that maximum length.
          For example, usmHMACMD5AuthProtocol requires K to be a fixed
          length of 16 octets and L - of 16 octets.
          usmHMACSHAAuthProtocol requires K to be a fixed length of
          20 octets and L - of 20 octets. Other protocols may define
          other sizes, as deemed appropriate.

          When a requester wants to change the old key K to a new
          key keyNew on a remote entity, the 'random' component is
          obtained from either a true random generator, or from a
          pseudorandom generator, and the 'delta' component is
          computed as follows:

           - a temporary variable is initialized to the existing value
             of K;
           - if the length of the keyNew is greater than L octets,
             then:
              - the random component is appended to the value of the
                temporary variable, and the result is input to the
                the hash algorithm H to produce a digest value, and
                the temporary variable is set to this digest value;
              - the value of the temporary variable is XOR-ed with
                the first (next) L-octets (16 octets in case of MD5)
                of the keyNew to produce the first (next) L-octets
                (16 octets in case of MD5) of the 'delta' component.
              - the above two steps are repeated until the unused
                portion of the keyNew component is L octets or less,
           - the random component is appended to the value of the
             temporary variable, and the result is input to the

             hash algorithm H to produce a digest value;
           - this digest value, truncated if necessary to be the same
             length as the unused portion of the keyNew, is XOR-ed
             with the unused portion of the keyNew to produce the
             (final portion of the) 'delta' component.

           For example, using MD5 as the hash algorithm H:

              iterations = (lenOfDelta - 1)/16; /* integer division */
              temp = keyOld;
              for (i = 0; i < iterations; i++) {
                  temp = MD5 (temp || random);
                  delta[i*16 .. (i*16)+15] =
                         temp XOR keyNew[i*16 .. (i*16)+15];
              }
              temp = MD5 (temp || random);
              delta[i*16 .. lenOfDelta-1] =
                     temp XOR keyNew[i*16 .. lenOfDelta-1];

          The 'random' and 'delta' components are then concatenated as
          described above, and the resulting octet string is sent to
          the recipient as the new value of an instance of this object.

          At the receiver side, when an instance of this object is set
          to a new value, then a new value of K is computed as follows:

           - a temporary variable is initialized to the existing value
             of K;
           - if the length of the delta component is greater than L
             octets, then:
              - the random component is appended to the value of the
                temporary variable, and the result is input to the
                hash algorithm H to produce a digest value, and the
                temporary variable is set to this digest value;
              - the value of the temporary variable is XOR-ed with
                the first (next) L-octets (16 octets in case of MD5)
                of the delta component to produce the first (next)
                L-octets (16 octets in case of MD5) of the new value
                of K.
              - the above two steps are repeated until the unused
                portion of the delta component is L octets or less,
           - the random component is appended to the value of the
             temporary variable, and the result is input to the
             hash algorithm H to produce a digest value;
           - this digest value, truncated if necessary to be the same
             length as the unused portion of the delta component, is
             XOR-ed with the unused portion of the delta component to
             produce the (final portion of the) new value of K.

           For example, using MD5 as the hash algorithm H:

              iterations = (lenOfDelta - 1)/16; /* integer division */
              temp = keyOld;
              for (i = 0; i < iterations; i++) {
                  temp = MD5 (temp || random);
                  keyNew[i*16 .. (i*16)+15] =
                         temp XOR delta[i*16 .. (i*16)+15];
              }
              temp = MD5 (temp || random);
              keyNew[i*16 .. lenOfDelta-1] =
                     temp XOR delta[i*16 .. lenOfDelta-1];

          The value of an object with this syntax, whenever it is
          retrieved by the management protocol, is always the zero
          length string.

          Note that the keyOld and keyNew are the localized keys.

          Note that it is probably wise that when an SNMP entity sends
          a SetRequest to change a key, that it keeps a copy of the old
          key until it has confirmed that the key change actually
          succeeded.
         "
    SYNTAX       OCTET STRING

-- Statistics for the User-based Security Model **********************

usmStats         OBJECT IDENTIFIER ::= { usmMIBObjects 1 }

usmStatsUnsupportedSecLevels OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they requested a
                 securityLevel that was unknown to the SNMP engine
                 or otherwise unavailable.
                "
    ::= { usmStats 1 }

usmStatsNotInTimeWindows OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they appeared
                 outside of the authoritative SNMP engine's window.
                "
    ::= { usmStats 2 }

usmStatsUnknownUserNames OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they referenced a
                 user that was not known to the SNMP engine.
                "
    ::= { usmStats 3 }

usmStatsUnknownEngineIDs OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they referenced an
                 snmpEngineID that was not known to the SNMP engine.
                "
    ::= { usmStats 4 }

usmStatsWrongDigests OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
美腿丝袜亚洲三区| 亚洲不卡av一区二区三区| 91精品国产日韩91久久久久久| 91在线国产福利| 成人免费福利片| 不卡一区二区三区四区| www.日韩av| 91免费看`日韩一区二区| 99re热视频这里只精品| 99精品国产视频| 91久久精品一区二区| 色菇凉天天综合网| 在线影院国内精品| 国产精品水嫩水嫩| 夜夜嗨av一区二区三区中文字幕| 国产精品视频线看| 中文字幕一区二区日韩精品绯色| 中文字幕在线一区免费| 亚洲天堂久久久久久久| 一区二区在线观看免费| 午夜久久久影院| 久久精品国产亚洲一区二区三区| 激情小说欧美图片| 丰满少妇在线播放bd日韩电影| 99久久99久久精品免费观看| 91国偷自产一区二区三区观看| 欧美日韩免费电影| 2023国产精品自拍| 18涩涩午夜精品.www| 亚洲国产视频a| 久久99精品久久久| 菠萝蜜视频在线观看一区| 在线观看91精品国产入口| 欧美日韩国产区一| 国产亚洲成年网址在线观看| 亚洲欧美另类久久久精品2019| 丝袜脚交一区二区| 国产精品一区在线观看乱码| 欧美最猛性xxxxx直播| 91国在线观看| 欧美日本韩国一区二区三区视频| 日韩欧美亚洲国产另类| 国产三级精品在线| 亚洲综合999| 美女www一区二区| 91在线国产观看| 日韩免费性生活视频播放| 国产精品伦一区二区三级视频| 五月婷婷激情综合| 国产69精品久久久久毛片| 在线看国产一区二区| 国产亚洲一区二区三区四区| 一区二区三区中文字幕| 国产自产视频一区二区三区| 欧美视频你懂的| 久久久www成人免费毛片麻豆| 亚洲精品视频自拍| 激情亚洲综合在线| 欧美日韩精品久久久| 日韩精品午夜视频| 成人美女视频在线看| 日韩一区二区三区免费看| 国产精品人成在线观看免费| 日韩精品乱码免费| 国产成人一区在线| 91麻豆精品国产91久久久资源速度| 日本一区二区视频在线| 日韩精品视频网| 色女孩综合影院| 国产精品热久久久久夜色精品三区| 日韩av电影免费观看高清完整版 | 丝袜亚洲另类丝袜在线| jizzjizzjizz欧美| 久久蜜桃一区二区| 麻豆精品视频在线| 欧美日韩精品二区第二页| 1区2区3区精品视频| 国产精品一区二区三区乱码| 91精品国产福利| 亚洲一级在线观看| 99re这里都是精品| 欧美激情综合网| 卡一卡二国产精品| 8x福利精品第一导航| 一区二区在线看| 99免费精品在线观看| 久久综合色一综合色88| 美腿丝袜亚洲一区| 日韩一级成人av| 天天爽夜夜爽夜夜爽精品视频| 色悠悠久久综合| 亚洲男人天堂一区| 色网站国产精品| 亚洲美腿欧美偷拍| 一本久久a久久免费精品不卡| 国产精品欧美一级免费| 国产成a人亚洲| 亚洲国产精品精华液2区45| 国产精华液一区二区三区| 久久综合中文字幕| 国产米奇在线777精品观看| 日韩美女天天操| 久热成人在线视频| 精品国产百合女同互慰| 老司机免费视频一区二区三区| 69堂成人精品免费视频| 日韩中文字幕91| 欧美一区二区三区色| 奇米影视7777精品一区二区| 91精品国产色综合久久ai换脸 | 亚洲精品美国一| 91精品福利视频| 亚洲午夜一二三区视频| 欧美日本国产视频| 蜜臀av一区二区三区| 欧美大肚乱孕交hd孕妇| 久久国产尿小便嘘嘘尿| 26uuu国产一区二区三区| 国产成人综合网站| 亚洲欧洲美洲综合色网| 91麻豆国产精品久久| 亚洲一区二区三区中文字幕在线| 欧美亚洲动漫另类| 日本在线播放一区二区三区| 欧美成人精品1314www| 高清成人免费视频| 亚洲视频一二三区| 欧美疯狂性受xxxxx喷水图片| 国产91露脸合集magnet| 国产精品久久久久影院老司 | 精品国产免费久久| 国产xxx精品视频大全| 日韩一区有码在线| 欧美日韩一区小说| 久久国产精品区| 国产视频一区二区在线观看| 91在线小视频| 日本欧美在线观看| 久久精品无码一区二区三区| 99久久免费精品高清特色大片| 亚洲一区二区四区蜜桃| 欧美成人精品福利| 91无套直看片红桃| 日韩av一级片| 国产精品进线69影院| 欧美性猛交一区二区三区精品 | 在线电影欧美成精品| 国产激情视频一区二区在线观看| 亚洲欧美一区二区三区极速播放| 欧美酷刑日本凌虐凌虐| 国产成人自拍在线| 午夜亚洲福利老司机| 久久久亚洲欧洲日产国码αv| 91美女片黄在线观看91美女| 免费在线视频一区| 亚洲欧美激情小说另类| 91精品国产乱码久久蜜臀| 国产91丝袜在线18| 日本不卡一区二区| 亚洲日本欧美天堂| 亚洲精品在线三区| 欧美色倩网站大全免费| 国产成人久久精品77777最新版本| 亚洲超碰精品一区二区| 亚洲国产高清在线| 日韩欧美一区二区免费| 一本大道久久精品懂色aⅴ| 久久激情五月婷婷| 亚洲午夜电影在线| 日本一区二区三区在线不卡| 日韩一区二区不卡| 欧美性欧美巨大黑白大战| 成人夜色视频网站在线观看| 日本美女一区二区三区视频| 一区二区在线观看不卡| 中文字幕欧美日韩一区| 精品久久久久久久久久久久久久久| 欧日韩精品视频| aaa亚洲精品一二三区| 国产又黄又大久久| 天堂蜜桃91精品| 亚洲自拍欧美精品| 亚洲精品免费播放| 国产精品久久免费看| 久久综合丝袜日本网| 欧美变态口味重另类| 884aa四虎影成人精品一区| 色噜噜狠狠色综合欧洲selulu | 欧美激情综合在线| 五月天亚洲婷婷| 最新高清无码专区| 国产色91在线| 欧美精品一区二区三区很污很色的 | 亚洲午夜三级在线| 亚洲欧美成人一区二区三区| 国产精品青草久久| 国产欧美日韩另类一区| 国产亚洲欧美激情| 久久亚洲一级片| 久久久精品人体av艺术|