亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? snmp-user-based-sm-mib.txt

?? php安裝源碼,請下載后按照說明文件安裝及配置
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
SNMP-USER-BASED-SM-MIB DEFINITIONS ::= BEGIN

IMPORTS
    MODULE-IDENTITY, OBJECT-TYPE,
    OBJECT-IDENTITY,
    snmpModules, Counter32                FROM SNMPv2-SMI
    TEXTUAL-CONVENTION, TestAndIncr,
    RowStatus, RowPointer,
    StorageType, AutonomousType           FROM SNMPv2-TC
    MODULE-COMPLIANCE, OBJECT-GROUP       FROM SNMPv2-CONF
    SnmpAdminString, SnmpEngineID,
    snmpAuthProtocols, snmpPrivProtocols  FROM SNMP-FRAMEWORK-MIB;

snmpUsmMIB MODULE-IDENTITY
    LAST-UPDATED "9901200000Z"            -- 20 Jan 1999, midnight
    ORGANIZATION "SNMPv3 Working Group"
    CONTACT-INFO "WG-email:   snmpv3@lists.tislabs.com
                  Subscribe:  majordomo@lists.tislabs.com
                              In msg body:  subscribe snmpv3

                  Chair:      Russ Mundy
                              Trusted Information Systems
                  postal:     3060 Washington Rd
                              Glenwood MD 21738
                              USA
                  email:      mundy@tislabs.com
                  phone:      +1-301-854-6889

                  Co-editor   Uri Blumenthal

                              IBM T. J. Watson Research
                  postal:     30 Saw Mill River Pkwy,
                              Hawthorne, NY 10532
                              USA
                  email:      uri@watson.ibm.com
                  phone:      +1-914-784-7964

                  Co-editor:  Bert Wijnen
                              IBM T. J. Watson Research
                  postal:     Schagen 33
                              3461 GL Linschoten
                              Netherlands
                  email:      wijnen@vnet.ibm.com
                  phone:      +31-348-432-794
                 "
    DESCRIPTION  "The management information definitions for the
                  SNMP User-based Security Model.
                 "
--  Revision history

    REVISION     "9901200000Z"            -- 20 Jan 1999, midnight
    DESCRIPTION  "Clarifications, published as RFC2574"

    REVISION     "9711200000Z"            -- 20 Nov 1997, midnight
    DESCRIPTION  "Initial version, published as RFC2274"
    ::= { snmpModules 15 }

-- Administrative assignments ****************************************

usmMIBObjects     OBJECT IDENTIFIER ::= { snmpUsmMIB 1 }
usmMIBConformance OBJECT IDENTIFIER ::= { snmpUsmMIB 2 }

-- Identification of Authentication and Privacy Protocols ************

usmNoAuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "No Authentication Protocol."
    ::= { snmpAuthProtocols 1 }

usmHMACMD5AuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The HMAC-MD5-96 Digest Authentication Protocol."
    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti HMAC:
                    Keyed-Hashing for Message Authentication,
                    RFC2104, Feb 1997.
                  - Rivest, R., Message Digest Algorithm MD5, RFC1321.
                 "
    ::= { snmpAuthProtocols 2 }

usmHMACSHAAuthProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The HMAC-SHA-96 Digest Authentication Protocol."
    REFERENCE    "- H. Krawczyk, M. Bellare, R. Canetti, HMAC:
                    Keyed-Hashing for Message Authentication,
                    RFC2104, Feb 1997.
                  - Secure Hash Algorithm. NIST FIPS 180-1.
                 "
    ::= { snmpAuthProtocols 3 }

usmNoPrivProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "No Privacy Protocol."
    ::= { snmpPrivProtocols 1 }

usmDESPrivProtocol OBJECT-IDENTITY
    STATUS        current
    DESCRIPTION  "The CBC-DES Symmetric Encryption Protocol."
    REFERENCE    "- Data Encryption Standard, National Institute of
                    Standards and Technology.  Federal Information
                    Processing Standard (FIPS) Publication 46-1.
                    Supersedes FIPS Publication 46,
                    (January, 1977; reaffirmed January, 1988).

                  - Data Encryption Algorithm, American National
                    Standards Institute.  ANSI X3.92-1981,
                    (December, 1980).

                  - DES Modes of Operation, National Institute of
                    Standards and Technology.  Federal Information
                    Processing Standard (FIPS) Publication 81,
                    (December, 1980).

                  - Data Encryption Algorithm - Modes of Operation,
                    American National Standards Institute.
                    ANSI X3.106-1983, (May 1983).
                 "
    ::= { snmpPrivProtocols 2 }

-- Textual Conventions ***********************************************

KeyChange ::=     TEXTUAL-CONVENTION
   STATUS         current
   DESCRIPTION
         "Every definition of an object with this syntax must identify
          a protocol P, a secret key K, and a hash algorithm H
          that produces output of L octets.

          The object's value is a manager-generated, partially-random
          value which, when modified, causes the value of the secret
          key K, to be modified via a one-way function.

          The value of an instance of this object is the concatenation
          of two components: first a 'random' component and then a
          'delta' component.

          The lengths of the random and delta components
          are given by the corresponding value of the protocol P;
          if P requires K to be a fixed length, the length of both the
          random and delta components is that fixed length; if P
          allows the length of K to be variable up to a particular
          maximum length, the length of the random component is that
          maximum length and the length of the delta component is any
          length less than or equal to that maximum length.
          For example, usmHMACMD5AuthProtocol requires K to be a fixed
          length of 16 octets and L - of 16 octets.
          usmHMACSHAAuthProtocol requires K to be a fixed length of
          20 octets and L - of 20 octets. Other protocols may define
          other sizes, as deemed appropriate.

          When a requester wants to change the old key K to a new
          key keyNew on a remote entity, the 'random' component is
          obtained from either a true random generator, or from a
          pseudorandom generator, and the 'delta' component is
          computed as follows:

           - a temporary variable is initialized to the existing value
             of K;
           - if the length of the keyNew is greater than L octets,
             then:
              - the random component is appended to the value of the
                temporary variable, and the result is input to the
                the hash algorithm H to produce a digest value, and
                the temporary variable is set to this digest value;
              - the value of the temporary variable is XOR-ed with
                the first (next) L-octets (16 octets in case of MD5)
                of the keyNew to produce the first (next) L-octets
                (16 octets in case of MD5) of the 'delta' component.
              - the above two steps are repeated until the unused
                portion of the keyNew component is L octets or less,
           - the random component is appended to the value of the
             temporary variable, and the result is input to the

             hash algorithm H to produce a digest value;
           - this digest value, truncated if necessary to be the same
             length as the unused portion of the keyNew, is XOR-ed
             with the unused portion of the keyNew to produce the
             (final portion of the) 'delta' component.

           For example, using MD5 as the hash algorithm H:

              iterations = (lenOfDelta - 1)/16; /* integer division */
              temp = keyOld;
              for (i = 0; i < iterations; i++) {
                  temp = MD5 (temp || random);
                  delta[i*16 .. (i*16)+15] =
                         temp XOR keyNew[i*16 .. (i*16)+15];
              }
              temp = MD5 (temp || random);
              delta[i*16 .. lenOfDelta-1] =
                     temp XOR keyNew[i*16 .. lenOfDelta-1];

          The 'random' and 'delta' components are then concatenated as
          described above, and the resulting octet string is sent to
          the recipient as the new value of an instance of this object.

          At the receiver side, when an instance of this object is set
          to a new value, then a new value of K is computed as follows:

           - a temporary variable is initialized to the existing value
             of K;
           - if the length of the delta component is greater than L
             octets, then:
              - the random component is appended to the value of the
                temporary variable, and the result is input to the
                hash algorithm H to produce a digest value, and the
                temporary variable is set to this digest value;
              - the value of the temporary variable is XOR-ed with
                the first (next) L-octets (16 octets in case of MD5)
                of the delta component to produce the first (next)
                L-octets (16 octets in case of MD5) of the new value
                of K.
              - the above two steps are repeated until the unused
                portion of the delta component is L octets or less,
           - the random component is appended to the value of the
             temporary variable, and the result is input to the
             hash algorithm H to produce a digest value;
           - this digest value, truncated if necessary to be the same
             length as the unused portion of the delta component, is
             XOR-ed with the unused portion of the delta component to
             produce the (final portion of the) new value of K.

           For example, using MD5 as the hash algorithm H:

              iterations = (lenOfDelta - 1)/16; /* integer division */
              temp = keyOld;
              for (i = 0; i < iterations; i++) {
                  temp = MD5 (temp || random);
                  keyNew[i*16 .. (i*16)+15] =
                         temp XOR delta[i*16 .. (i*16)+15];
              }
              temp = MD5 (temp || random);
              keyNew[i*16 .. lenOfDelta-1] =
                     temp XOR delta[i*16 .. lenOfDelta-1];

          The value of an object with this syntax, whenever it is
          retrieved by the management protocol, is always the zero
          length string.

          Note that the keyOld and keyNew are the localized keys.

          Note that it is probably wise that when an SNMP entity sends
          a SetRequest to change a key, that it keeps a copy of the old
          key until it has confirmed that the key change actually
          succeeded.
         "
    SYNTAX       OCTET STRING

-- Statistics for the User-based Security Model **********************

usmStats         OBJECT IDENTIFIER ::= { usmMIBObjects 1 }

usmStatsUnsupportedSecLevels OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they requested a
                 securityLevel that was unknown to the SNMP engine
                 or otherwise unavailable.
                "
    ::= { usmStats 1 }

usmStatsNotInTimeWindows OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they appeared
                 outside of the authoritative SNMP engine's window.
                "
    ::= { usmStats 2 }

usmStatsUnknownUserNames OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they referenced a
                 user that was not known to the SNMP engine.
                "
    ::= { usmStats 3 }

usmStatsUnknownEngineIDs OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current
    DESCRIPTION "The total number of packets received by the SNMP
                 engine which were dropped because they referenced an
                 snmpEngineID that was not known to the SNMP engine.
                "
    ::= { usmStats 4 }

usmStatsWrongDigests OBJECT-TYPE
    SYNTAX       Counter32
    MAX-ACCESS   read-only
    STATUS       current

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产在线看一区| 日本 国产 欧美色综合| 午夜视频一区在线观看| 久久99蜜桃精品| 在线观看国产一区二区| 久久嫩草精品久久久久| 99riav久久精品riav| 久久精品99国产精品| 色综合天天综合网天天看片| 精品99一区二区| 首页国产欧美久久| 色素色在线综合| 中文字幕中文字幕一区二区| 久久爱www久久做| 欧美精品久久久久久久多人混战 | 中日韩av电影| 久久爱另类一区二区小说| 欧美精品aⅴ在线视频| 亚洲女女做受ⅹxx高潮| 国产精品1024| 精品久久一区二区| 久久成人久久爱| 欧美肥妇bbw| 日韩精品一二三区| 777午夜精品免费视频| 亚洲一级片在线观看| 91久久人澡人人添人人爽欧美 | 日韩一级欧美一级| 亚洲成人中文在线| 欧美在线观看视频在线| 亚洲成人第一页| 精品视频1区2区3区| 亚洲第一av色| 4438亚洲最大| 奇米777欧美一区二区| 91精品国产综合久久久久久久久久| 一区二区三区蜜桃| 欧美精品三级在线观看| 石原莉奈在线亚洲三区| 7777精品伊人久久久大香线蕉完整版 | 国产高清精品久久久久| 久久久久久久网| 国产成人午夜99999| 国产精品国产馆在线真实露脸| 99久久777色| 亚洲国产一区二区在线播放| 91麻豆精品国产91久久久| 六月婷婷色综合| 国产亚洲欧美中文| 一本大道久久a久久精二百| 亚洲综合图片区| 4438x亚洲最大成人网| 精彩视频一区二区三区| 中文字幕一区二区三区在线不卡| 91精品国产综合久久久蜜臀粉嫩| 精品综合免费视频观看| 久久久久久久久久久久久夜| 成人高清视频在线观看| 一区二区三区日韩精品视频| 91精品综合久久久久久| 国产精品77777| 综合久久久久久| 日韩欧美亚洲一区二区| 丁香一区二区三区| 亚洲不卡av一区二区三区| 亚洲精品一区二区三区影院| 成人免费观看男女羞羞视频| 亚洲午夜免费福利视频| 精品成人a区在线观看| 色综合久久天天| 精品亚洲欧美一区| 亚洲精品美腿丝袜| 久久久久久久综合日本| 欧美日韩国产美女| 国产suv精品一区二区6| 婷婷综合另类小说色区| 中文字幕不卡三区| 欧美一区二区三区四区五区| 99热国产精品| 国产精品1区二区.| 五月开心婷婷久久| 亚洲区小说区图片区qvod| 欧美一二三四在线| 欧美在线不卡视频| 成人深夜在线观看| 国产一区二区在线影院| 丝瓜av网站精品一区二区| 国产精品福利一区二区三区| 久久这里只有精品首页| 欧美日韩一区二区在线观看| 成人国产视频在线观看| 极品销魂美女一区二区三区| 性久久久久久久| 亚洲婷婷综合久久一本伊一区 | 99久久久久免费精品国产| 久久99精品国产.久久久久| 亚洲国产精品综合小说图片区| 久久美女艺术照精彩视频福利播放| 欧美日韩精品一区二区在线播放| 不卡av在线网| 成人激情午夜影院| 国产不卡视频在线播放| 精品一区二区综合| 九九**精品视频免费播放| 日本伊人午夜精品| 亚洲高清免费在线| 亚洲成人www| 三级精品在线观看| 亚洲成人av在线电影| 亚洲精品国产高清久久伦理二区| 国产精品第一页第二页第三页| 久久免费午夜影院| 久久综合国产精品| 精品国产乱码久久久久久1区2区| 欧美日韩成人综合| 欧美日韩免费一区二区三区 | 91精品国产综合久久福利| 日本韩国一区二区| 色婷婷久久久久swag精品| 成人app软件下载大全免费| 成人av网站在线| 99久久伊人久久99| 99精品久久久久久| www.一区二区| 欧美亚洲丝袜传媒另类| 欧美日韩在线一区二区| 91精品国产综合久久久蜜臀粉嫩| 51午夜精品国产| 久久这里只有精品视频网| 欧美国产精品一区二区三区| 国产精品国产三级国产普通话蜜臀| 亚洲免费观看高清完整版在线 | 在线精品视频小说1| 欧美色男人天堂| 欧美一区二区三区在线观看| 日韩一区二区免费视频| 久久免费偷拍视频| 亚洲免费av高清| 美脚の诱脚舐め脚责91| 成人激情av网| 欧美日高清视频| 久久无码av三级| 亚洲少妇中出一区| 日韩制服丝袜av| 国产激情视频一区二区在线观看| 91蜜桃免费观看视频| 88在线观看91蜜桃国自产| 国产亚洲一本大道中文在线| 一区二区三区**美女毛片| 久久精品噜噜噜成人88aⅴ| 成+人+亚洲+综合天堂| 欧美日本视频在线| 中文字幕不卡三区| 日韩二区在线观看| 99久久综合精品| 日韩精品一区二区三区三区免费| 国产精品传媒入口麻豆| 日韩av不卡一区二区| av电影在线观看完整版一区二区| 制服丝袜成人动漫| 日韩美女视频19| 久久国产尿小便嘘嘘| 日本福利一区二区| 日韩欧美的一区| 亚洲国产一区在线观看| 成人免费视频视频| 欧美不卡一区二区| 亚洲午夜电影网| 91亚洲国产成人精品一区二区三| 日韩午夜在线影院| 亚洲一区二三区| 国v精品久久久网| 欧美大肚乱孕交hd孕妇| 洋洋成人永久网站入口| 成人丝袜高跟foot| 精品国产伦一区二区三区免费| 亚洲一区二区三区四区在线免费观看| 国产精品系列在线播放| 韩国在线一区二区| av亚洲精华国产精华精华| 日韩久久久精品| 一区二区三区在线观看网站| 成人黄色小视频在线观看| 久久嫩草精品久久久久| 久久99精品国产.久久久久 | 五月天亚洲婷婷| 欧美亚洲愉拍一区二区| 亚洲人精品午夜| 成人精品国产一区二区4080| 国产亚洲一本大道中文在线| 国产毛片精品视频| 久久综合色8888| 激情文学综合插| 日韩精品中文字幕在线一区| 蜜臀av性久久久久av蜜臀妖精 | 在线视频欧美区| 一区二区三区免费网站| 在线免费精品视频| 一区2区3区在线看| 欧美性xxxxx极品少妇|