亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? snmp-user-based-sm-mib.txt

?? java聊天軟件源碼
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
SNMP-USER-BASED-SM-MIB DEFINITIONS ::= BEGIN

IMPORTS
    MODULE-IDENTITY, OBJECT-TYPE,
    OBJECT-IDENTITY,
    snmpModules, Counter32                FROM SNMPv2-SMI
    TEXTUAL-CONVENTION, TestAndIncr,
    RowStatus, RowPointer,
    StorageType, AutonomousType           FROM SNMPv2-TC
    MODULE-COMPLIANCE, OBJECT-GROUP       FROM SNMPv2-CONF
    SnmpAdminString, SnmpEngineID,
    snmpAuthProtocols, snmpPrivProtocols  FROM SNMP-FRAMEWORK-MIB;

snmpUsmMIB MODULE-IDENTITY
    LAST-UPDATED "9901200000Z"            -- 20 Jan 1999, midnight
    ORGANIZATION "SNMPv3 Working Group"
    CONTACT-INFO "WG-email:   snmpv3@lists.tislabs.com
                  Subscribe:  majordomo@lists.tislabs.com
                              In msg body:  subscribe snmpv3

                  Chair:      Russ Mundy
                              Trusted Information Systems
                  postal:     3060 Washington Rd
                              Glenwood MD 21738
                              USA
                  email:      mundy@tislabs.com
                  phone:      +1-301-854-6889

                  Co-editor   Uri Blumenthal

                              IBM T. J. Watson Research
                  postal:     30 Saw Mill River Pkwy,
                              Hawthorne, NY 10532
                              USA
                  email:      uri@watson.ibm.com
                  phone:      +1-914-784-7964

                  Co-editor:  Bert Wijnen
                              IBM T. J. Watson Research
                  postal:     Schagen 33
                              3461 GL Linschoten
                              Netherlands
                  email:      wijnen@vnet.ibm.com
                  phone:      +31-348-432-794
                 "
    DESCRIPTION  "The management information definitions for the
                  SNMP User-based Security Model.
                 "
--  Revision history

    REVISION     "9901200000Z"            -- 20 Jan 1999, midnight
    DESCRIPTION  "Clarifications, published as RFC2574"

    REVISION     "9711200000Z"            -- 20 Nov 1997, midnight
    DESCRIPTION  "Initial version, published as RFC2274"
    ::= { snmpModules 15 }

-- Administrative assignments ****************************************

usmMIBObjects     OBJECT IDENTIFIER ::= { snmpUsmMIB 1 }
usmMIBConformance OBJECT IDENTIFIER ::= { snmpUsmMIB 2 }

-- Identification of Authentication and Privacy Protocols ************

usmNoAuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "No Authentication Protocol."
    ::= { snmpAuthProtocols 1 }

usmHMACMD5AuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The HMAC-MD5-96 Digest Authentication Protocol."
    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti HMAC:
                    Keyed-Hashing for Message Authentication,
                    RFC2104, Feb 1997.
                  - Rivest, R., Message Digest Algorithm MD5, RFC1321.
                 "
    ::= { snmpAuthProtocols 2 }

usmHMACSHAAuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The HMAC-SHA-96 Digest Authentication Protocol."
    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti, HMAC:
                    Keyed-Hashing for Message Authentication,
                    RFC2104, Feb 1997.
                  - Secure Hash Algorithm. NIST FIPS 180-1.
                 "
    ::= { snmpAuthProtocols 3 }

usmNoPrivProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "No Privacy Protocol."
    ::= { snmpPrivProtocols 1 }

usmDESPrivProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The CBC-DES Symmetric Encryption Protocol."
    REFERENCE    "- Data Encryption Standard, National Institute of
                    Standards and Technology.  Federal Information
                    Processing Standard (FIPS) Publication 46-1.
                    Supersedes FIPS Publication 46,
                    (January, 1977; reaffirmed January, 1988).

                  - Data Encryption Algorithm, American National
                    Standards Institute.  ANSI X3.92-1981,
                    (December, 1980).

                  - DES Modes of Operation, National Institute of
                    Standards and Technology.  Federal Information
                    Processing Standard (FIPS) Publication 81,
                    (December, 1980).

                  - Data Encryption Algorithm - Modes of Operation,
                    American National Standards Institute.
                    ANSI X3.106-1983, (May 1983).
                 "
    ::= { snmpPrivProtocols 2 }

-- Textual Conventions ***********************************************

KeyChange ::=     TEXTUAL-CONVENTION
   STATUS         current
   DESCRIPTION
         "Every definition of an object with this syntax must identify
          a protocol P, a secret key K, and a hash algorithm H
          that produces output of L octets.

          The object's value is a manager-generated, partially-random
          value which, when modified, causes the value of the secret
          key K, to be modified via a one-way function.

          The value of an instance of this object is the concatenation
          of two components: first a 'random' component and then a
          'delta' component.

          The lengths of the random and delta components
          are given by the corresponding value of the protocol P;
          if P requires K to be a fixed length, the length of both the
          random and delta components is that fixed length; if P
          allows the length of K to be variable up to a particular
          maximum length, the length of the random component is that
          maximum length and the length of the delta component is any
          length less than or equal to that maximum length.
          For example, usmHMACMD5AuthProtocol requires K to be a fixed
          length of 16 octets and L - of 16 octets.
          usmHMACSHAAuthProtocol requires K to be a fixed length of
          20 octets and L - of 20 octets. Other protocols may define
          other sizes, as deemed appropriate.

          When a requester wants to change the old key K to a new
          key keyNew on a remote entity, the 'random' component is
          obtained from either a true random generator, or from a
          pseudorandom generator, and the 'delta' component is
          computed as follows:

           - a temporary variable is initialized to the existing value
             of K;
           - if the length of the keyNew is greater than L octets,
             then:
              - the random component is appended to the value of the
                temporary variable, and the result is input to the
                the hash algorithm H to produce a digest value, and
                the temporary variable is set to this digest value;
              - the value of the temporary variable is XOR-ed with
                the first (next) L-octets (16 octets in case of MD5)
                of the keyNew to produce the first (next) L-octets
                (16 octets in case of MD5) of the 'delta' component.
              - the above two steps are repeated until the unused
                portion of the keyNew component is L octets or less,
           - the random component is appended to the value of the
             temporary variable, and the result is input to the

             hash algorithm H to produce a digest value;
           - this digest value, truncated if necessary to be the same
             length as the unused portion of the keyNew, is XOR-ed
             with the unused portion of the keyNew to produce the
             (final portion of the) 'delta' component.

           For example, using MD5 as the hash algorithm H:

              iterations = (lenOfDelta - 1)/16; /* integer division */
              temp = keyOld;
              for (i = 0; i < iterations; i++) {
                  temp = MD5 (temp || random);
                  delta[i*16 .. (i*16)+15] =
                         temp XOR keyNew[i*16 .. (i*16)+15];
              }
              temp = MD5 (temp || random);
              delta[i*16 .. lenOfDelta-1] =
                     temp XOR keyNew[i*16 .. lenOfDelta-1];

          The 'random' and 'delta' components are then concatenated as
          described above, and the resulting octet string is sent to
          the recipient as the new value of an instance of this object.

          At the receiver side, when an instance of this object is set
          to a new value, then a new value of K is computed as follows:

           - a temporary variable is initialized to the existing value
             of K;
           - if the length of the delta component is greater than L
             octets, then:
              - the random component is appended to the value of the
                temporary variable, and the result is input to the
                hash algorithm H to produce a digest value, and the
                temporary variable is set to this digest value;
              - the value of the temporary variable is XOR-ed with
                the first (next) L-octets (16 octets in case of MD5)
                of the delta component to produce the first (next)
                L-octets (16 octets in case of MD5) of the new value
                of K.
              - the above two steps are repeated until the unused
                portion of the delta component is L octets or less,
           - the random component is appended to the value of the
             temporary variable, and the result is input to the
             hash algorithm H to produce a digest value;
           - this digest value, truncated if necessary to be the same
             length as the unused portion of the delta component, is
             XOR-ed with the unused portion of the delta component to
             produce the (final portion of the) new value of K.

           For example, using MD5 as the hash algorithm H:

              iterations = (lenOfDelta - 1)/16; /* integer division */
              temp = keyOld;
              for (i = 0; i < iterations; i++) {
                  temp = MD5 (temp || random);
                  keyNew[i*16 .. (i*16)+15] =
                         temp XOR delta[i*16 .. (i*16)+15];
              }
              temp = MD5 (temp || random);
              keyNew[i*16 .. lenOfDelta-1] =
                     temp XOR delta[i*16 .. lenOfDelta-1];

          The value of an object with this syntax, whenever it is
          retrieved by the management protocol, is always the zero
          length string.

          Note that the keyOld and keyNew are the localized keys.

          Note that it is probably wise that when an SNMP entity sends
          a SetRequest to change a key, that it keeps a copy of the old
          key until it has confirmed that the key change actually
          succeeded.
         "
    SYNTAX       OCTET STRING

-- Statistics for the User-based Security Model **********************

usmStats         OBJECT IDENTIFIER ::= { usmMIBObjects 1 }

usmStatsUnsupportedSecLevels OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they requested a
                 securityLevel that was unknown to the SNMP engine
                 or otherwise unavailable.
                "
    ::= { usmStats 1 }

usmStatsNotInTimeWindows OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they appeared
                 outside of the authoritative SNMP engine's window.
                "
    ::= { usmStats 2 }

usmStatsUnknownUserNames OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they referenced a
                 user that was not known to the SNMP engine.
                "
    ::= { usmStats 3 }

usmStatsUnknownEngineIDs OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they referenced an
                 snmpEngineID that was not known to the SNMP engine.
                "
    ::= { usmStats 4 }

usmStatsWrongDigests OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲色图视频网站| 欧美日韩国产在线观看| 制服丝袜一区二区三区| 亚洲欧美一区二区三区孕妇| 国产激情一区二区三区桃花岛亚洲| 欧美人xxxx| 婷婷一区二区三区| 欧美专区日韩专区| 亚洲激情图片一区| 欧美日韩成人激情| 亚洲不卡av一区二区三区| 欧美在线你懂的| 日韩激情av在线| 日韩欧美电影在线| 国产大陆精品国产| 综合分类小说区另类春色亚洲小说欧美| 奇米四色…亚洲| 精品少妇一区二区三区在线播放| 日本一区中文字幕| 2017欧美狠狠色| eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 成人高清视频在线| 亚洲一区二区欧美激情| 欧美另类z0zxhd电影| 奇米亚洲午夜久久精品| 91精品国产色综合久久不卡蜜臀| 美女在线一区二区| 综合激情网...| 日韩欧美中文字幕一区| 黄网站免费久久| 一区二区三区免费在线观看| 26uuu久久天堂性欧美| 色婷婷精品大在线视频| 激情综合色丁香一区二区| 中文字幕一区二区不卡| 69堂精品视频| 99精品视频中文字幕| 日韩中文欧美在线| 亚洲日本va午夜在线影院| 欧美成va人片在线观看| 欧美色图在线观看| 成人av网址在线| 毛片一区二区三区| 日韩精品成人一区二区三区| 亚洲少妇最新在线视频| 国产精品你懂的| 欧美韩国日本不卡| 国产亚洲午夜高清国产拍精品 | 91热门视频在线观看| 天堂在线一区二区| 亚洲黄色免费网站| 亚洲精品国产一区二区三区四区在线| 911精品国产一区二区在线| 国产福利视频一区二区三区| 蜜臀a∨国产成人精品| 日本特黄久久久高潮| 亚洲国产精品一区二区www| 亚洲国产精品成人综合| 日本一区二区免费在线| 久久久久99精品国产片| 欧美最猛黑人xxxxx猛交| 成人午夜短视频| jizz一区二区| 51精品秘密在线观看| 亚洲综合清纯丝袜自拍| 亚洲bt欧美bt精品| 久久国产精品露脸对白| 久久99精品国产91久久来源| 黑人精品欧美一区二区蜜桃| 成人黄色电影在线 | 色香蕉久久蜜桃| 在线观看欧美日本| 久久影院午夜论| 亚洲视频每日更新| 青青草精品视频| 国产成人三级在线观看| 色88888久久久久久影院按摩| 欧美放荡的少妇| 国产丝袜欧美中文另类| 久久久久九九视频| 亚洲视频一二三| 日韩综合小视频| 91久色porny | 国产综合色精品一区二区三区| 国产不卡高清在线观看视频| 国产精品乡下勾搭老头1| 欧美日韩久久久一区| 国产亲近乱来精品视频| 日韩二区三区在线观看| 91在线国产福利| 2023国产精品| 麻豆精品久久精品色综合| 91丝袜呻吟高潮美腿白嫩在线观看| 日韩欧美在线一区二区三区| 亚洲色图制服诱惑 | 国产成人午夜99999| 欧美日本乱大交xxxxx| 久久色.com| 国产jizzjizz一区二区| 久久久国产午夜精品| 蜜臀久久99精品久久久久宅男 | 欧美一级专区免费大片| 蜜臀av在线播放一区二区三区| 欧美日韩精品欧美日韩精品一| 亚洲精品久久久蜜桃| 色婷婷综合久久久久中文一区二区| 日本一区二区三区高清不卡| 国产在线播精品第三| 精品久久99ma| 国产精品一区二区三区99| 久久久影院官网| 91在线精品一区二区| 午夜精品久久久久久| 精品电影一区二区| 麻豆精品精品国产自在97香蕉| 日韩欧美在线1卡| 国产精品一区二区你懂的| 国产精品国产自产拍高清av | 国产成人av资源| 久久久久久久久久久黄色| 国产成人精品在线看| 中文字幕亚洲综合久久菠萝蜜| 色噜噜狠狠成人中文综合| 婷婷一区二区三区| 国产精品天美传媒| 在线综合视频播放| 不卡一区中文字幕| 麻豆成人91精品二区三区| 欧美国产一区二区在线观看| 欧美视频完全免费看| 国产专区欧美精品| 亚洲成人第一页| 中文字幕一区二区三区四区| 日韩丝袜美女视频| 在线观看日韩国产| heyzo一本久久综合| 国产麻豆视频精品| 久久精品国产亚洲一区二区三区| 中文字幕在线不卡视频| 日韩欧美另类在线| 欧美日韩中文字幕精品| 91视频一区二区三区| 国产成人精品免费视频网站| 免费看欧美女人艹b| 亚洲国产日产av| 一区二区三区四区五区视频在线观看| 精品三级av在线| 日韩精品一区二区三区中文精品| 欧美性受极品xxxx喷水| 在线看国产日韩| 欧美网站大全在线观看| 色久优优欧美色久优优| 色天使久久综合网天天| 在线视频中文字幕一区二区| 成人精品高清在线| aaa欧美大片| 欧美伊人精品成人久久综合97| 欧美中文字幕一二三区视频| 欧美日韩精品一区二区三区四区| 欧美天堂亚洲电影院在线播放| 色婷婷av一区二区| 国产欧美精品区一区二区三区| 午夜精品福利一区二区蜜股av | 精品久久久久久综合日本欧美| 中文字幕视频一区二区三区久| 久久精品99久久久| 欧美日韩在线播| 亚洲黄色免费网站| 97se亚洲国产综合在线| 日本一区二区成人| 国产99久久精品| 欧美精品一区二区三区四区 | 成人中文字幕合集| 在线观看日韩毛片| 久久精品夜色噜噜亚洲a∨| 日一区二区三区| 欧美午夜精品电影| 成人免费一区二区三区在线观看| 午夜精品福利一区二区三区av| 国产精品18久久久久久久久 | 欧美一区二区精品在线| 亚洲欧美日韩电影| 国产精品一区二区果冻传媒| 欧美日韩一区二区三区在线看| 久久久久国产精品厨房| 轻轻草成人在线| 欧洲精品一区二区三区在线观看| 中文字幕不卡三区| 国产精一区二区三区| 日韩免费观看高清完整版| 亚洲愉拍自拍另类高清精品| 成人动漫av在线| 国产精品日韩成人| 国产99一区视频免费| 久久综合色鬼综合色| 精品亚洲成a人在线观看| 国产精品日韩成人| 国产精品1区2区3区在线观看| 欧美理论在线播放| 亚洲日本va午夜在线电影|