Last active
October 4, 2019 03:14
-
-
Save brchiu/6b3849d81063e5b873b756dfcd0caf48 to your computer and use it in GitHub Desktop.
gdb_thread_info.log
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@xilinx-zcu111-2019_1:~# gdb netopeer2-server | |
GNU gdb (GDB) 8.2 | |
Copyright (C) 2018 Free Software Foundation, Inc. | |
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> | |
This is free software: you are free to change and redistribute it. | |
There is NO WARRANTY, to the extent permitted by law. | |
Type "show copying" and "show warranty" for details. | |
This GDB was configured as "aarch64-xilinx-linux". | |
Type "show configuration" for configuration details. | |
For bug reporting instructions, please see: | |
<http://www.gnu.org/software/gdb/bugs/>. | |
Find the GDB manual and other documentation resources online at: | |
<http://www.gnu.org/software/gdb/documentation/>. | |
For help, type "help". | |
Type "apropos word" to search for commands related to "word"... | |
Reading symbols from netopeer2-server...(no debugging symbols found)...done. | |
(gdb) r -d -c MSG | |
Starting program: /usr/bin/netopeer2-server -d -c MSG | |
[Thread debugging using libthread_db enabled] | |
Using host libthread_db library "/lib/libthread_db.so.1". | |
[INF]: LY: Plugin "/usr/lib/libyang/extensions/metadata.so" successfully loaded. | |
[INF]: LY: Plugin "/usr/lib/libyang/extensions/yangdata.so" successfully loaded. | |
[INF]: LY: Plugin "/usr/lib/libyang/extensions/nacm.so" successfully loaded. | |
[INF]: LY: Plugin "/usr/lib/libyang/user_types/user_yang_types.so" successfully loaded. | |
[INF]: LY: Plugin "/usr/lib/libyang/user_types/user_inet_types.so" successfully loaded. | |
[INF]: LY: Reading module "ietf-yang-metadata". | |
[INF]: LY: Module "ietf-yang-metadata@2016-08-05" successfully parsed as implemented. | |
[INF]: LY: Reading module "yang". | |
[INF]: LY: Resolving "yang" unresolved schema nodes and their constraints... | |
[INF]: LY: All "yang" schema nodes and constraints resolved. | |
[INF]: LY: Module "yang@2017-02-20" successfully parsed as implemented. | |
[INF]: LY: Reading module "ietf-inet-types". | |
[INF]: LY: Resolving derived type "union" failed, it will be attempted later. | |
[INF]: LY: Resolving derived type "union" failed, it will be attempted later. | |
[INF]: LY: Resolving derived type "union" failed, it will be attempted later. | |
[INF]: LY: Resolving derived type "union" failed, it will be attempted later. | |
[INF]: LY: Resolving "ietf-inet-types" unresolved schema nodes and their constraints... | |
[INF]: LY: All "ietf-inet-types" schema nodes and constraints resolved. | |
[INF]: LY: Module "ietf-inet-types@2013-07-15" successfully parsed as implemented. | |
[INF]: LY: Reading module "ietf-yang-types". | |
[INF]: LY: Module "ietf-yang-types@2013-07-15" successfully parsed as implemented. | |
[INF]: LY: Reading module "ietf-datastores". | |
[INF]: LY: Module "ietf-datastores@2017-08-17" successfully parsed as implemented. | |
[INF]: LY: Reading module "ietf-yang-library". | |
[INF]: LY: Searching for "ietf-yang-types" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-yang-types" in /home/root. | |
[INF]: LY: Searching for "ietf-inet-types" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-inet-types" in /home/root. | |
[INF]: LY: Searching for "ietf-datastores" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-datastores" in /home/root. | |
[INF]: LY: Module "ietf-yang-library@2019-01-04" successfully parsed as implemented. | |
[INF]: LY: Resolving "sysrepo" unresolved schema nodes and their constraints... | |
[INF]: LY: All "sysrepo" schema nodes and constraints resolved. | |
[INF]: LY: Module "sysrepo@2019-09-25" successfully parsed as implemented. | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LY: Searching for "ietf-netconf-with-defaults" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-netconf" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-netconf" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-netconf-acm" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-netconf-acm" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-netconf-acm@2018-02-14" successfully parsed as imported. | |
[INF]: LY: Module "ietf-netconf@2013-09-29" successfully parsed as imported. | |
[INF]: LY: Resolving "ietf-netconf-with-defaults" unresolved schema nodes and their constraints... | |
[INF]: LY: All "ietf-netconf-with-defaults" schema nodes and constraints resolved. | |
[INF]: LY: Module "ietf-netconf-with-defaults@2011-06-01" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-netconf-notifications" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Resolving "ietf-netconf-notifications" unresolved schema nodes and their constraints... | |
[INF]: LY: All "ietf-netconf-notifications" schema nodes and constraints resolved. | |
[INF]: LY: Module "ietf-netconf-notifications@2012-02-06" successfully parsed as implemented. | |
[INF]: LY: Module "ietf-netconf-acm@2018-02-14" now implemented. | |
[INF]: LY: Searching for "ietf-netconf-monitoring" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-netconf-monitoring@2010-10-04" successfully parsed as implemented. | |
[INF]: LY: Searching for "nc-notifications" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "notifications" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "notifications" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "notifications@2008-07-14" successfully parsed as imported. | |
[INF]: LY: Module "nc-notifications@2008-07-14" successfully parsed as implemented. | |
[INF]: LY: Module "notifications@2008-07-14" now implemented. | |
[INF]: LY: Searching for "ietf-x509-cert-to-name" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-x509-cert-to-name@2014-12-10" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-crypto-types" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-crypto-types@2019-07-02" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-keystore" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-crypto-types" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-crypto-types" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Resolving "ietf-keystore" unresolved schema nodes and their constraints... | |
[INF]: LY: All "ietf-keystore" schema nodes and constraints resolved. | |
[INF]: LY: Module "ietf-keystore@2019-07-02" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-truststore" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-truststore@2019-07-02" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-tcp-common" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-tcp-common@2019-07-02" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-ssh-server" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-ssh-common" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-ssh-common@2019-07-02" successfully parsed as imported. | |
[INF]: LY: Searching for "ietf-keystore" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-keystore" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "iana-crypt-hash" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "iana-crypt-hash" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "iana-crypt-hash@2014-08-06" successfully parsed as imported. | |
[INF]: LY: Module "ietf-ssh-server@2019-07-02" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-tls-server" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-tls-common" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-tls-common@2019-07-02" successfully parsed as imported. | |
[INF]: LY: Searching for "ietf-truststore" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-truststore" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-tls-server@2019-07-02" successfully parsed as implemented. | |
[INF]: LY: Searching for "ietf-netconf-server" in /etc/sysrepo/yang. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-x509-cert-to-name" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-x509-cert-to-name" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-tcp-client" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-tcp-client" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Searching for "ietf-tcp-common" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-tcp-common" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-tcp-client@2019-07-02" successfully parsed as imported. | |
[INF]: LY: Searching for "ietf-tcp-server" in /etc/sysrepo/yang. | |
[INF]: LY: Searching for "ietf-tcp-server" in /home/root. | |
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file. | |
[INF]: LY: Module "ietf-tcp-server@2019-07-02" successfully parsed as imported. | |
[INF]: LY: Resolving "ietf-netconf-server" unresolved schema nodes and their constraints... | |
[INF]: LY: All "ietf-netconf-server" schema nodes and constraints resolved. | |
[INF]: LY: Module "ietf-netconf-server@2019-07-02" successfully parsed as implemented. | |
[New Thread 0x7fbe9911b0 (LWP 2449)] | |
[New Thread 0x7fbe1821b0 (LWP 2450)] | |
[Thread 0x7fbe1821b0 (LWP 2450) exited] | |
[ERR]: NP: Subscribing for providing "ietf-netconf-monitoring" state data failed (Invalid argument). | |
[ERR]: NP: Server data subscribe failed. | |
[New Thread 0x7fbe1821b0 (LWP 2451)] | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Listening on 0.0.0.0:830 for SSH connections. | |
[New Thread 0x7fbd9761b0 (LWP 2452)] | |
[New Thread 0x7fbd1751b0 (LWP 2453)] | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[New Thread 0x7fbc9741b0 (LWP 2454)] | |
[New Thread 0x7fb7fff1b0 (LWP 2455)] | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 2, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 2, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[INF]: LN: Accepted a connection on 0.0.0.0:830. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[2019/10/04 02:53:49.760324, 2] ssh_pki_import_privkey_base64: Trying to decode privkey passphrase=false | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[2019/10/04 02:53:49.779502, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller | |
[2019/10/04 02:53:49.781327, 2] ssh_server_connection_callback: SSH client banner: SSH-2.0-libssh_0.9.0 | |
[2019/10/04 02:53:49.782728, 2] ssh_analyze_banner: Analyzing banner: SSH-2.0-libssh_0.9.0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[2019/10/04 02:53:49.785127, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[2019/10/04 02:53:49.787830, 2] ssh_kex_select_methods: Negotiated curve25519-sha256,ssh-rsa,[email protected],[email protected],[email protected],[email protected],none,none,, | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 2 | |
[2019/10/04 02:53:49.791768, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 2, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 3, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[2019/10/04 02:53:49.856741, 2] ssh_packet_server_curve25519_init: SSH_MSG_KEX_ECDH_REPLY sent | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[2019/10/04 02:53:49.858939, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[2019/10/04 02:53:49.860255, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[2019/10/04 02:53:49.862572, 2] ssh_packet_server_curve25519_init: SSH_MSG_NEWKEYS sent | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[2019/10/04 02:53:49.865666, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller | |
[2019/10/04 02:53:49.868224, 2] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[2019/10/04 02:53:49.870524, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 2, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[INF]: LN: Received an SSH message "request-service" of subtype "ssh-userauth". | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[INF]: LN: Received an SSH message "request-auth" of subtype "none". | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[INF]: LN: Received an SSH message "request-auth" of subtype "interactive". | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[2019/10/04 02:53:50.899944, 2] ssh_message_auth_interactive_request: Warning: Got a keyboard-interactive response but it seems we didn't send the request. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[INF]: LN: Received an SSH message "request-auth" of subtype "interactive". | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 0 | |
[INF]: LN: User "root" authenticated. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[INF]: LN: Received an SSH message "request-channel-open" of subtype "session". | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[INF]: LN: Received an SSH message "request-channel" of subtype "subsystem". | |
[DBG]: LN: Session 1: sending message: | |
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:params:netconf:base:1.0</capability><capability>urn:ietf:params:netconf:base:1.1</capability><capability>urn:ietf:params:netconf:capability:writable-running:1.0</capability><capability>urn:ietf:params:netconf:capability:candidate:1.0</capability><capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capability><capability>urn:ietf:params:netconf:capability:validate:1.1</capability><capability>urn:ietf:params:netconf:capability:startup:1.0</capability><capability>urn:ietf:params:netconf:capability:url:1.0</capability><capability>urn:ietf:params:netconf:capability:xpath:1.0</capability><capability>urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode=explicit&also-supported=report-all,report-all-tagged,trim,explicit</capability><capability>urn:ietf:params:netconf:capability:notification:1.0</capability><capability>urn:ietf:params:netconf:capability:interleave:1.0</capability><capability> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang-metadata&revision=2016-08-05</capability><capability>urn:ietf:params:xml:ns:yang:1?module=yang&revision=2017-02-20</capability><capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&revision=2013-07-15</capability><capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-types&revision=2013-07-15</capability><capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=2019-01-04&module-set-id=28</capability><capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf-acm&revision=2018-02-14</capability><capability>urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&revision=2013-09-29&features=writable-running,candidate,rollback-on-error,validate,startup,url,xpath</capability><capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ietf-netconf-with-defaults&revision=2011-06-01</capability><capability> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 1 | |
[2019/10/04 02:53:52.023153, 2] grow_window: growing window (channel 43:43) to 1280000 bytes | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 2, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[2019/10/04 02:53:52.025142, 2] channel_rcv_change_window: Adding 1217017 bytes to channel (43:43) (from 61978 bytes) | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ietf-netconf-notifications&revision=2012-02-06</capability><capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf-netconf-monitoring&revision=2010-10-04</capability><capability>urn:ietf:params:xml:ns:netconf:notification:1.0?module=notifications&revision=2008-07-14</capability><capability>urn:ietf:params:xml:ns:netmod:notification?module=nc-notifications&revision=2008-07-14</capability><capability>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name?module=ietf-x509-cert-to-name&revision=2014-12-10</capability><capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-hash&revision=2014-08-06</capability></capabilities><session-id>1</session-id></hello> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
]]>]]> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: Session 1: received message: | |
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:params:netconf:base:1.0</capability><capability>urn:ietf:params:netconf:base:1.1</capability></capabilities></hello> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 2, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[INF]: NP: Generated new event (netconf-session-start). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 0, lenght 5 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 4 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-yang-library</identifier><version>2019-01-04</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 2, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-yang-library" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 3, head 4, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-yang-library { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-yang-library"; | |
prefix yanglib; | |
import ietf-yang-types { | |
prefix yang; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-inet-types { | |
prefix inet; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-datastores { | |
prefix ds; | |
reference | |
"RFC 8342: Network Management Datastore Architecture | |
(NMDA)"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <https://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Andy Bierman | |
<mailto:[email protected]> | |
Author: Martin Bjorklund | |
<mailto:[email protected]> | |
Author: Juergen Schoenwaelder | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
<mailto:[email protected]> | |
Author: Kent Watsen | |
<mailto:[email protected]> | |
Author: Robert Wilton | |
<mailto:[email protected]>"; | |
description | |
"This module provides information about the YANG modules, | |
datastores, and datastore schemas used by a network | |
management server. | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL | |
NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED', | |
'MAY', and 'OPTIONAL' in this document are to be interpreted as | |
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, | |
they appear in all capitals, as shown here. | |
Copyright (c) 2019 IETF Trust and the persons identified as | |
authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with or | |
without modification, is permitted pursuant to, and subject | |
to the license terms contained in, the Simplified BSD License | |
set forth in Se | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ction 4.c of the IETF Trust's Legal Provisions | |
Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC 8525; see | |
the RFC itself for full legal notices."; | |
revision 2019-01-04 { | |
description | |
"Added support for multiple datastores according to the | |
Network Management Datastore Architecture (NMDA)."; | |
reference | |
"RFC 8525: YANG Library"; | |
} | |
revision 2016-04-09 { | |
description | |
"Initial revision."; | |
reference | |
"RFC 7895: YANG Module Library"; | |
} | |
typedef revision-identifier { | |
type string { | |
pattern "\\d{4}-\\d{2}-\\d{2}"; | |
} | |
description | |
"Represents a specific date in YYYY-MM-DD format."; | |
} | |
grouping module-identification-leafs { | |
description | |
"Parameters for identifying YANG modules and submodules."; | |
leaf name { | |
type yang:yang-identifier; | |
mandatory true; | |
description | |
"The YANG module or submodule name."; | |
} | |
leaf revisi | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
on { | |
type revision-identifier; | |
description | |
"The YANG module or submodule revision date. If no revision | |
statement is present in the YANG module or submodule, this | |
leaf is not instantiated."; | |
} | |
} | |
grouping location-leaf-list { | |
description | |
"Common leaf-list parameter for the locations of modules and | |
submodules."; | |
leaf-list location { | |
type inet:uri; | |
description | |
"Contains a URL that represents the YANG schema | |
resource for this module or submodule. | |
This leaf will only be present if there is a URL | |
available for retrieval of the schema for this entry."; | |
} | |
} | |
grouping module-implementation-parameters { | |
description | |
"Parameters for describing the implementation of a module."; | |
leaf-list feature { | |
type yang:yang-identifier; | |
description | |
"List of all YANG feature names from this module that are | |
supported by the server, regardless whether they are defined | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 5, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
in the module or any included submodule."; | |
} | |
leaf-list deviation { | |
type leafref { | |
path "../../module/name"; | |
} | |
description | |
"List of all YANG deviation modules used by this server to | |
modify the conformance of the module associated with this | |
entry. Note that the same module can be used for deviations | |
for multiple modules, so the same entry MAY appear within | |
multiple 'module' entries. | |
This reference MUST NOT (directly or indirectly) | |
refer to the module being deviated. | |
Robust clients may want to make sure that they handle a | |
situation where a module deviates itself (directly or | |
indirectly) gracefully."; | |
} | |
} | |
grouping module-set-parameters { | |
description | |
"A set of parameters that describe a module set."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name of the module set."; | |
} | |
list module { | |
key "name"; | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
"An entry in this list represents a module implemented by the | |
server, as per Section 5.6.5 of RFC 7950, with a particular | |
set of supported features and deviations."; | |
reference | |
"RFC 7950: The YANG 1.1 Data Modeling Language"; | |
uses module-identification-leafs; | |
leaf namespace { | |
type inet:uri; | |
mandatory true; | |
description | |
"The XML namespace identifier for this module."; | |
} | |
uses location-leaf-list; | |
list submodule { | |
key "name"; | |
description | |
"Each entry represents one submodule within the | |
parent module."; | |
uses module-identification-leafs; | |
uses location-leaf-list; | |
} | |
uses module-implementation-parameters; | |
} | |
list import-only-module { | |
key "name revision"; | |
description | |
"An entry in this list indicates that the server imports | |
reusable definitions from the specified revision of the | |
module but does not implement any p | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 7, head 8, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 9, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
rotocol-accessible | |
objects from this revision. | |
Multiple entries for the same module name MAY exist. This | |
can occur if multiple modules import the same module but | |
specify different revision dates in the import statements."; | |
leaf name { | |
type yang:yang-identifier; | |
description | |
"The YANG module name."; | |
} | |
leaf revision { | |
type union { | |
type revision-identifier; | |
type string { | |
length "0"; | |
} | |
} | |
description | |
"The YANG module revision date. | |
A zero-length string is used if no revision statement | |
is present in the YANG module."; | |
} | |
leaf namespace { | |
type inet:uri; | |
mandatory true; | |
description | |
"The XML namespace identifier for this module."; | |
} | |
uses location-leaf-list; | |
list submodule { | |
key "name"; | |
description | |
"Each entry represents one submodule within the | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 9, head 10, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 11, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 12, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
parent module."; | |
uses module-identification-leafs; | |
uses location-leaf-list; | |
} | |
} | |
} | |
grouping yang-library-parameters { | |
description | |
"The YANG library data structure is represented as a grouping | |
so it can be reused in configuration or another monitoring | |
data structure."; | |
list module-set { | |
key "name"; | |
description | |
"A set of modules that may be used by one or more schemas. | |
A module set does not have to be referentially complete, | |
i.e., it may define modules that contain import statements | |
for other modules not included in the module set."; | |
uses module-set-parameters; | |
} | |
list schema { | |
key "name"; | |
description | |
"A datastore schema that may be used by one or more | |
datastores. | |
The schema must be valid and referentially complete, i.e., | |
it must contain modules to satisfy all used import | |
statements for all modules specified in the schema."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 11, head 12, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 13, head 12, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 13, head 14, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
leaf name { | |
type string; | |
description | |
"An arbitrary name of the schema."; | |
} | |
leaf-list module-set { | |
type leafref { | |
path "../../module-set/name"; | |
} | |
description | |
"A set of module-sets that are included in this schema. | |
If a non-import-only module appears in multiple module | |
sets, then the module revision and the associated features | |
and deviations must be identical."; | |
} | |
} | |
list datastore { | |
key "name"; | |
description | |
"A datastore supported by this server. | |
Each datastore indicates which schema it supports. | |
The server MUST instantiate one entry in this list per | |
specific datastore it supports. | |
Each datastore entry with the same datastore schema SHOULD | |
reference the same schema."; | |
leaf name { | |
type ds:datastore-ref; | |
description | |
"The identity of the datastore."; | |
} | |
leaf schema { | |
typ | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 14, head 9, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
e leafref { | |
path "../../schema/name"; | |
} | |
mandatory true; | |
description | |
"A reference to the schema supported by this datastore. | |
All non-import-only modules of the schema are implemented | |
with their associated features and deviations."; | |
} | |
} | |
} | |
grouping module-list { | |
status deprecated; | |
description | |
"The module data structure is represented as a grouping | |
so it can be reused in configuration or another monitoring | |
data structure."; | |
grouping common-leafs { | |
status deprecated; | |
description | |
"Common parameters for YANG modules and submodules."; | |
leaf name { | |
type yang:yang-identifier; | |
status deprecated; | |
description | |
"The YANG module or submodule name."; | |
} | |
leaf revision { | |
type union { | |
type revision-identifier; | |
type string { | |
length "0"; | |
} | |
} | |
status deprecated; | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
"The YANG module or submodule revision date. | |
A zero-length string is used if no revision statement | |
is present in the YANG module or submodule."; | |
} | |
} | |
grouping schema-leaf { | |
status deprecated; | |
description | |
"Common schema leaf parameter for modules and submodules."; | |
leaf schema { | |
type inet:uri; | |
status deprecated; | |
description | |
"Contains a URL that represents the YANG schema | |
resource for this module or submodule. | |
This leaf will only be present if there is a URL | |
available for retrieval of the schema for this entry."; | |
} | |
} | |
list module { | |
key "name revision"; | |
status deprecated; | |
description | |
"Each entry represents one revision of one module | |
currently supported by the server."; | |
uses common-leafs { | |
status deprecated; | |
} | |
uses schema-leaf { | |
status deprecated; | |
} | |
leaf namespace { | |
type inet:ur | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
i; | |
mandatory true; | |
status deprecated; | |
description | |
"The XML namespace identifier for this module."; | |
} | |
leaf-list feature { | |
type yang:yang-identifier; | |
status deprecated; | |
description | |
"List of YANG feature names from this module that are | |
supported by the server, regardless of whether they are | |
defined in the module or any included submodule."; | |
} | |
list deviation { | |
key "name revision"; | |
status deprecated; | |
description | |
"List of YANG deviation module names and revisions | |
used by this server to modify the conformance of | |
the module associated with this entry. Note that | |
the same module can be used for deviations for | |
multiple modules, so the same entry MAY appear | |
within multiple 'module' entries. | |
The deviation module MUST be present in the 'module' | |
list, with the same name and revision values. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 6, head 3, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
The 'conformance-type' value will be 'implement' for | |
the deviation module."; | |
uses common-leafs { | |
status deprecated; | |
} | |
} | |
leaf conformance-type { | |
type enumeration { | |
enum "implement" { | |
description | |
"Indicates that the server implements one or more | |
protocol-accessible objects defined in the YANG module | |
identified in this entry. This includes deviation | |
statements defined in the module. | |
For YANG version 1.1 modules, there is at most one | |
'module' entry with conformance type 'implement' for a | |
particular module name, since YANG 1.1 requires that | |
at most one revision of a module is implemented. | |
For YANG version 1 modules, there SHOULD NOT be more | |
than one 'module' entry for a particular module | |
name."; | |
} | |
enum "import" { | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
"Indicates that the server imports reusable definitions | |
from the specified revision of the module but does | |
not implement any protocol-accessible objects from | |
this revision. | |
Multiple 'module' entries for the same module name MAY | |
exist. This can occur if multiple modules import the | |
same module but specify different revision dates in | |
the import statements."; | |
} | |
} | |
mandatory true; | |
status deprecated; | |
description | |
"Indicates the type of conformance the server is claiming | |
for the YANG module identified by this entry."; | |
} | |
list submodule { | |
key "name revision"; | |
status deprecated; | |
description | |
"Each entry represents one submodule within the | |
parent module."; | |
uses common-leafs { | |
status deprecated; | |
} | |
uses schema-leaf { | |
status deprecated; | |
} | |
} | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
} | |
} | |
container yang-library { | |
config false; | |
description | |
"Container holding the entire YANG library of this server."; | |
uses yang-library-parameters; | |
leaf content-id { | |
type string; | |
mandatory true; | |
description | |
"A server-generated identifier of the contents of the | |
'/yang-library' tree. The server MUST change the value of | |
this leaf if the information represented by the | |
'/yang-library' tree, except '/yang-library/content-id', has | |
changed."; | |
} | |
} | |
container modules-state { | |
config false; | |
status deprecated; | |
description | |
"Contains YANG module monitoring information."; | |
leaf module-set-id { | |
type string; | |
mandatory true; | |
status deprecated; | |
description | |
"Contains a server-specific identifier representing | |
the current set of modules and submodules. The | |
server MUST change the value of this leaf if the | |
information represented by the 'module' list insta | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 7, head 8, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 9, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
nces | |
has changed."; | |
} | |
uses module-list { | |
status deprecated; | |
} | |
} | |
notification yang-library-update { | |
description | |
"Generated when any YANG library information on the | |
server has changed."; | |
leaf content-id { | |
type leafref { | |
path "/yanglib:yang-library/yanglib:content-id"; | |
} | |
mandatory true; | |
description | |
"Contains the YANG library content identifier for the updated | |
YANG library at the time the notification is generated."; | |
} | |
} | |
notification yang-library-change { | |
status deprecated; | |
description | |
"Generated when the set of modules and submodules supported | |
by the server has changed."; | |
leaf module-set-id { | |
type leafref { | |
path "/yanglib:modules-state/yanglib:module-set-id"; | |
} | |
mandatory true; | |
status deprecated; | |
description | |
"Contains the module-set-id value representing the | |
set of modules and submodules supported at the server | |
at t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 9, head 10, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#72 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 11, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
he time the notification is generated."; | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 12, head 11, lenght 2 | |
[INF]: NP: Session 1: thread 0 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 11, head 12, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 13, head 12, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-datastores</identifier><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 13, head 14, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-datastores" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 15, head 14, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 14, head 15, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 16, head 15, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 15, head 16, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 16, head 11, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-datastores { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-datastores"; | |
prefix ds; | |
organization | |
"IETF Network Modeling (NETMOD) Working Group"; | |
contact | |
"WG Web: <https://datatracker.ietf.org/wg/netmod/> | |
WG List: <mailto:[email protected]> | |
Author: Martin Bjorklund | |
<mailto:[email protected]> | |
Author: Juergen Schoenwaelder | |
<mailto:[email protected]> | |
Author: Phil Shafer | |
<mailto:[email protected]> | |
Author: Kent Watsen | |
<mailto:[email protected]> | |
Author: Rob Wilton | |
<[email protected]>"; | |
description | |
"This YANG module defines two sets of identities for datastores. | |
The first identifies the datastores themselves, the second | |
identifies datastore | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 12, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
properties. | |
Copyright (c) 2017 IETF Trust and the persons identified as | |
authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with or | |
without modification, is permitted pursuant to, and subject to | |
the license terms contained in, the Simplified BSD License set | |
forth in Section 4.c of the IETF Trust's Legal Provisions | |
Relating to IETF Documents | |
(http://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(http://www.rfc-editor.org/info/rfcxxxx); see the RFC itself | |
for full legal notices."; | |
revision 2017-08-17 { | |
description | |
"Initial revision."; | |
reference | |
"RFC XXXX: Network Management Datastore Architecture"; | |
} | |
identity datastore { | |
description | |
"Abstract base identity for datastore identities."; | |
} | |
identity conventional { | |
base datastore; | |
description | |
"Abstract base identity for conventional configuration | |
datastores."; | |
} | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#847 | |
[DBG]: LN: Session 1: sending message: | |
identity running { | |
base conventional; | |
description | |
"The running configuration datastore."; | |
} | |
identity candidate { | |
base conventional; | |
description | |
"The candidate configuration datastore."; | |
} | |
identity startup { | |
base conventional; | |
description | |
"The startup configuration datastore."; | |
} | |
identity intended { | |
base conventional; | |
description | |
"The intended configuration datastore."; | |
} | |
identity dynamic { | |
base datastore; | |
description | |
"Abstract base identity for dynamic configuration datastores."; | |
} | |
identity operational { | |
base datastore; | |
description | |
"The operational state datastore."; | |
} | |
typedef datastore-ref { | |
type identityref { | |
base datastore; | |
} | |
description | |
"A datastore identity reference."; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[INF]: NP: Session 1: thread 4 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3"><get xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><filter type="xpath" xmlns:yanglib="urn:ietf:params:xml:ns:yang:ietf-yang-library" select="/yanglib:*"/></get></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 6, head 5, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 6, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 3, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 4, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 6, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 3, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 3, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 0, lenght 0 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 0, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3"><data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><yang-library xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-library"><module-set><name>complete</name><import-only-module><name>ietf-yang-metadata</name><revision>2016-08-05</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-metadata</namespace></import-only-module><module><name>yang</name><revision>2017-02-20</revision><namespace>urn:ietf:params:xml:ns:yang:1</namespace></module><import-only-module><name>ietf-inet-types</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-inet-types</namespace></import-only-module><import-only-module><name>ietf-yang-types</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-types</namespace></import-only-module><import-only-module><name>ietf-datastores</name><revision>2017-08-17</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-datastores</namespace></import-only-module><module> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<name>ietf-yang-library</name><revision>2019-01-04</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-library</namespace></module><module><name>sysrepo</name><revision>2019-09-25</revision><namespace>http://www.sysrepo.org/yang/sysrepo</namespace></module><module><name>ietf-netconf-acm</name><revision>2018-02-14</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-acm</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-netconf</name><revision>2013-09-29</revision><namespace>urn:ietf:params:xml:ns:netconf:base:1.0</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>writable-running</feature><feature>candidate</feature><feature>rollback-on-error</feature><feature>validate</feature><feature>startup</feature><feature>url</feature><feature>xpath</feature></module><module><name>ietf-netconf-with-defaults</name><revision>2011-06-01</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-w | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ith-defaults</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-netconf-notifications</name><revision>2012-02-06</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-netconf-monitoring</name><revision>2010-10-04</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>notifications</name><revision>2008-07-14</revision><namespace>urn:ietf:params:xml:ns:netconf:notification:1.0</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>nc-notifications</name><revision>2008-07-14</revision><namespace>urn:ietf:params:xml:ns:netmod:notification</namespace><location>file:///etc/sysrepo/yang/nc-notifications@2008 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1021 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
-07-14.yang</location></module><module><name>ietf-x509-cert-to-name</name><revision>2014-12-10</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-crypto-types</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-crypto-types</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-keystore</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-keystore</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>keystore-supported</feature></module><module><name>ietf-truststore</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-truststore</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>truststore-supported</feature><feature>x509-certificates | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1019 | |
[DBG]: LN: Session 1: sending message: | |
</feature></module><module><name>ietf-tcp-common</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-common</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>keepalives-supported</feature></module><import-only-module><name>ietf-ssh-common</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-common</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><import-only-module><name>iana-crypt-hash</name><revision>2014-08-06</revision><namespace>urn:ietf:params:xml:ns:yang:iana-crypt-hash</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><module><name>ietf-ssh-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>local-client-auth-supported</feature> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 2, head 3, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
</module><import-only-module><name>ietf-tls-common</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-common</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><module><name>ietf-tls-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>local-client-auth-supported</feature></module><import-only-module><name>ietf-tcp-client</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-client</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><import-only-module><name>ietf-tcp-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><module><name>ietf-ne | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 5, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
tconf-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>ssh-listen</feature><feature>tls-listen</feature><feature>ssh-call-home</feature><feature>tls-call-home</feature></module></module-set><content-id>28</content-id></yang-library><modules-state xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-library"><module><name>ietf-yang-metadata</name><revision>2016-08-05</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-metadata</namespace><conformance-type>import</conformance-type></module><module><name>yang</name><revision>2017-02-20</revision><namespace>urn:ietf:params:xml:ns:yang:1</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-inet-types</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-inet-types</namespace><conformance-type>import</conformance-type></module><module><name>ietf-yang-types | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1022 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-types</namespace><conformance-type>import</conformance-type></module><module><name>ietf-datastores</name><revision>2017-08-17</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-datastores</namespace><conformance-type>import</conformance-type></module><module><name>ietf-yang-library</name><revision>2019-01-04</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-library</namespace><conformance-type>implement</conformance-type></module><module><name>sysrepo</name><revision>2019-09-25</revision><namespace>http://www.sysrepo.org/yang/sysrepo</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-acm</name><revision>2018-02-14</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-acm</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf</name><revision>2013-09-29 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1021 | |
[DBG]: LN: Session 1: sending message: | |
</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:netconf:base:1.0</namespace><feature>writable-running</feature><feature>candidate</feature><feature>rollback-on-error</feature><feature>validate</feature><feature>startup</feature><feature>url</feature><feature>xpath</feature><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-with-defaults</name><revision>2011-06-01</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-notifications</name><revision>2012-02-06</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-monitoring | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 6, head 7, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
</name><revision>2010-10-04</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring</namespace><conformance-type>implement</conformance-type></module><module><name>notifications</name><revision>2008-07-14</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:netconf:notification:1.0</namespace><conformance-type>implement</conformance-type></module><module><name>nc-notifications</name><revision>2008-07-14</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:netmod:notification</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-x509-cert-to-name</name><revision>2014-12-10</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name</namespace><conformance-type>implemen | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
t</conformance-type></module><module><name>ietf-crypto-types</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-crypto-types</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-keystore</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-keystore</namespace><feature>keystore-supported</feature><conformance-type>implement</conformance-type></module><module><name>ietf-truststore</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-truststore</namespace><feature>truststore-supported</feature><feature>x509-certificates</feature><conformance-type>implement</conformance-type></module><module><name>ietf-tcp-common</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/ | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1023 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-common</namespace><feature>keepalives-supported</feature><conformance-type>implement</conformance-type></module><module><name>ietf-ssh-common</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-common</namespace><conformance-type>import</conformance-type></module><module><name>iana-crypt-hash</name><revision>2014-08-06</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:iana-crypt-hash</namespace><conformance-type>import</conformance-type></module><module><name>ietf-ssh-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-server</namespace><feature>local-client-auth-supported</feature><conformance-type>implement</conformance-type></module> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 9, head 10, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 11, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1017 | |
[DBG]: LN: Session 1: sending message: | |
<module><name>ietf-tls-common</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-common</namespace><conformance-type>import</conformance-type></module><module><name>ietf-tls-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-server</namespace><feature>local-client-auth-supported</feature><conformance-type>implement</conformance-type></module><module><name>ietf-tcp-client</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-client</namespace><conformance-type>import</conformance-type></module><module><name>ietf-tcp-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-server | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#527 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 12, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
</namespace><conformance-type>import</conformance-type></module><module><name>ietf-netconf-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-server</namespace><feature>ssh-listen</feature><feature>tls-listen</feature><feature>ssh-call-home</feature><feature>tls-call-home</feature><conformance-type>implement</conformance-type></module><module-set-id>28</module-set-id></modules-state></data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 11, head 12, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 13, head 12, lenght 2 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 12, head 13, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 13, head 14, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 15, head 14, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>sysrepo</identifier><version>2019-09-25</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 14, head 15, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 16, head 15, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 15, head 16, lenght 1 | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "sysrepo" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 16, head 11, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 12, lenght 0 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module sysrepo { | |
yang-version 1.1; | |
namespace "http://www.sysrepo.org/yang/sysrepo"; | |
prefix sr; | |
import ietf-yang-types { | |
prefix yang; | |
} | |
import ietf-yang-metadata { | |
prefix md; | |
revision-date 2016-08-05; | |
} | |
organization | |
"CESNET"; | |
contact | |
"Author: Michal Vasko | |
<[email protected]>"; | |
description | |
"Sysrepo YANG datastore internal attributes and information."; | |
revision 2019-09-25 { | |
description | |
"Added initial startup data for newly installed modules."; | |
} | |
revision 2019-09-17 { | |
description | |
"Added list of scheduled installed modules."; | |
} | |
revision 2019-07-10 { | |
description | |
"Initial revision."; | |
} | |
md:annotation "orig-key" { | |
type string; | |
description | |
"List keys that were originally preceding the list node instance in the configuration."; | |
} | |
md:annotation "orig-value" | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
{ | |
type string; | |
description | |
"Leaf-list value that was originally prceding the leaf-list node instance in the configuration."; | |
} | |
md:annotation "orig-dflt" { | |
type empty; | |
description | |
"Present if the node was originally a default node."; | |
} | |
typedef module-ref { | |
type leafref { | |
path "/sysrepo-modules/module/name"; | |
} | |
description | |
"Reference to a module."; | |
} | |
grouping module-info-grp { | |
leaf name { | |
type string; | |
description | |
"Module name."; | |
} | |
leaf revision { | |
type string; | |
description | |
"Module revision."; | |
} | |
leaf-list enabled-feature { | |
type string; | |
description | |
"List of all the enabled features."; | |
} | |
} | |
grouping deps-grp { | |
leaf-list module { | |
type module-ref; | |
description | |
"Module that is being dependent on."; | |
} | |
list inst-id { | |
key "xpath"; | |
leaf xpath { | |
type yang:xpath1.0; | |
description | |
"XPath identifying the no | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
de with the dependency."; | |
} | |
leaf default-module { | |
type module-ref; | |
description | |
"Module dependency in case the default value is being used."; | |
} | |
} | |
} | |
container sysrepo-modules { | |
config false; | |
description | |
"All installed Sysrepo modules."; | |
list module { | |
key "name"; | |
description | |
"Sysrepo module."; | |
uses module-info-grp; | |
leaf replay-support { | |
type uint64; | |
description | |
"Present only if the module supports replay. Means the earliest stored notification if any present. | |
Otherwise the time the replay support was switched on."; | |
} | |
choice changed-module { | |
description | |
"This module is scheduled for a change."; | |
leaf removed { | |
type empty; | |
description | |
"Module was removed."; | |
} | |
leaf updated-yang { | |
type string; | |
description | |
"Module was updated with a newer revision. Content is t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
he whole new YANG module."; | |
} | |
case feature-changes { | |
list changed-feature { | |
key "name"; | |
description | |
"Module features are scheduled for a change."; | |
leaf name { | |
type string; | |
description | |
"Changed feature name."; | |
} | |
leaf change { | |
type enumeration { | |
enum "enable" { | |
description | |
"Feature will be enabled."; | |
} | |
enum "disable" { | |
description | |
"Feature will be disabled."; | |
} | |
} | |
mandatory true; | |
description | |
"Feature change nature."; | |
} | |
} | |
} | |
} | |
container data-deps { | |
description | |
"Module data dependencies on other modules."; | |
uses deps-grp; | |
} | |
list op-deps { | |
key "xpath"; | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
"Module operation (RPCs, Actions, Notifications) dependencies on other modules."; | |
leaf xpath { | |
type yang:xpath1.0; | |
description | |
"XPath identifying the operation."; | |
} | |
container in { | |
description | |
"Operation input or notification dependencies."; | |
uses deps-grp; | |
} | |
container out { | |
description | |
"Operation output dependencies."; | |
uses deps-grp; | |
} | |
} | |
leaf-list inverse-data-deps { | |
type module-ref; | |
description | |
"List of modules that depend on this module."; | |
} | |
} | |
list installed-module { | |
key "name"; | |
description | |
"Sysrepo module scheduled to be installed."; | |
uses module-info-grp; | |
leaf module-yang { | |
type string; | |
mandatory true; | |
description | |
"Content is the whole new YANG module."; | |
} | |
leaf startup-data { | |
type string; | |
description | |
" | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#104 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
Initial startup data to be set for the module, in JSON format."; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[INF]: NP: Session 1: thread 1 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 10, head 7, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 11, head 7, lenght 5 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 7, head 8, lenght 4 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-x509-cert-to-name</identifier><version>2014-12-10</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 8, head 9, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 10, lenght 2 | |
[INF]: LN: Schema "ietf-x509-cert-to-name" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 11, head 6, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 7, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-x509-cert-to-name { | |
namespace "urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name"; | |
prefix x509c2n; | |
import ietf-yang-types { | |
prefix yang; | |
} | |
organization | |
"IETF NETMOD (NETCONF Data Modeling Language) Working Group"; | |
contact | |
"WG Web: <http://tools.ietf.org/wg/netmod/> | |
WG List: <mailto:[email protected]> | |
WG Chair: Thomas Nadeau | |
<mailto:[email protected]> | |
WG Chair: Juergen Schoenwaelder | |
<mailto:[email protected]> | |
Editor: Martin Bjorklund | |
<mailto:[email protected]> | |
Editor: Juergen Schoenwaelder | |
<mailto:[email protected]>"; | |
description | |
"This module contains a collection of YANG definitions for | |
extracting a name from an X.509 certificate. | |
The algorithm used | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
to extract a name from an X.509 certificate | |
was first defined in RFC 6353. | |
Copyright (c) 2014 IETF Trust and the persons identified as | |
authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with or | |
without modification, is permitted pursuant to, and subject | |
to the license terms contained in, the Simplified BSD License | |
set forth in Section 4.c of the IETF Trust's Legal Provisions | |
Relating to IETF Documents | |
(http://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC 7407; see | |
the RFC itself for full legal notices."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model for | |
the Simple Network Management Protocol (SNMP)"; | |
revision 2014-12-10 { | |
description | |
"Initial revision."; | |
reference | |
"RFC 7407: A YANG Data Model for SNMP Configuration"; | |
} | |
identity cert-to-name { | |
description | |
"Base identity for algorithms to derive a name from | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
a | |
certificate."; | |
} | |
identity specified { | |
base cert-to-name; | |
description | |
"Directly specifies the name to be used for the certificate. | |
The value of the leaf 'name' in the cert-to-name list is | |
used."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSpecified"; | |
} | |
identity san-rfc822-name { | |
base cert-to-name; | |
description | |
"Maps a subjectAltName's rfc822Name to a name. The local part | |
of the rfc822Name is passed unaltered, but the host-part of | |
the name must be passed in lowercase. For example, the | |
rfc822Name field [email protected] is mapped to name | |
[email protected]."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANRFC822Name"; | |
} | |
identity san-dns-name { | |
base cert | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
-to-name; | |
description | |
"Maps a subjectAltName's dNSName to a name after first | |
converting it to all lowercase (RFC 5280 does not specify | |
converting to lowercase, so this involves an extra step). | |
This mapping results in a 1:1 correspondence between | |
subjectAltName dNSName values and the name values."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANDNSName"; | |
} | |
identity san-ip-address { | |
base cert-to-name; | |
description | |
"Maps a subjectAltName's iPAddress to a name by | |
transforming the binary-encoded address as follows: | |
1) for IPv4, the value is converted into a | |
decimal-dotted quad address (e.g., '192.0.2.1'). | |
2) for IPv6 addresses, the value is converted into a | |
32-character, all-lowercase hexadecimal string | |
without any colon separators. | |
This mapping results in a 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
:1 correspondence between | |
subjectAltName iPAddress values and the name values."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANIpAddress"; | |
} | |
identity san-any { | |
base cert-to-name; | |
description | |
"Maps any of the following fields using the corresponding | |
mapping algorithms: | |
+------------+-----------------+ | |
| Type | Algorithm | | |
|------------+-----------------| | |
| rfc822Name | san-rfc822-name | | |
| dNSName | san-dns-name | | |
| iPAddress | san-ip-address | | |
+------------+-----------------+ | |
The first matching subjectAltName value found in the | |
certificate of the above types MUST be used when deriving | |
the name. The mapping algorithm specified in the | |
'Algorithm' column MUST be used to derive the name. | |
This mapping results in a 1:1 correspondence | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
between | |
subjectAltName values and name values. The three sub-mapping | |
algorithms produced by this combined algorithm cannot produce | |
conflicting results between themselves."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANAny"; | |
} | |
identity common-name { | |
base cert-to-name; | |
description | |
"Maps a certificate's CommonName to a name after converting | |
it to a UTF-8 encoding. The usage of CommonNames is | |
deprecated, and users are encouraged to use subjectAltName | |
mapping methods instead. This mapping results in a 1:1 | |
correspondence between certificate CommonName values and name | |
values."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertCommonName"; | |
} | |
typedef tls-fingerprint { | |
type ya | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 6, head 7, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 8, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ng:hex-string { | |
pattern "([0-9a-fA-F]){2}(:([0-9a-fA-F]){2}){0,254}"; | |
} | |
description | |
"A fingerprint value that can be used to uniquely reference | |
other data of potentially arbitrary length. | |
A tls-fingerprint value is composed of a 1-octet hashing | |
algorithm identifier followed by the fingerprint value. The | |
first octet value identifying the hashing algorithm is taken | |
from the IANA 'TLS HashAlgorithm Registry' (RFC 5246). The | |
remaining octets are filled using the results of the hashing | |
algorithm."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.SnmpTLSFingerprint"; | |
} | |
grouping cert-to-name { | |
description | |
"Defines nodes for mapping certificates to names. Modules | |
that use this grouping should describe how the resulting | |
name is used."; | |
list cert-to-name { | |
key "id"; | |
description | |
"Thi | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
s list defines how certificates are mapped to names. | |
The name is derived by considering each cert-to-name | |
list entry in order. The cert-to-name entry's fingerprint | |
determines whether the list entry is a match: | |
1) If the cert-to-name list entry's fingerprint value | |
matches that of the presented certificate, then consider | |
the list entry a successful match. | |
2) If the cert-to-name list entry's fingerprint value | |
matches that of a locally held copy of a trusted CA | |
certificate, and that CA certificate was part of the CA | |
certificate chain to the presented certificate, then | |
consider the list entry a successful match. | |
Once a matching cert-to-name list entry has been found, the | |
map-type is used to determine how the name associated with | |
the certificate should be determined. See the map-type | |
leaf's description for details on determining the name value. | |
If it | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 12, head 9, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
is impossible to determine a name from the cert-to-name | |
list entry's data combined with the data presented in the | |
certificate, then additional cert-to-name list entries MUST | |
be searched to look for another potential match. | |
Security administrators are encouraged to make use of | |
certificates with subjectAltName fields that can be mapped to | |
names so that a single root CA certificate can allow all | |
child certificates' subjectAltName fields to map directly to | |
a name via a 1:1 transformation."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNEntry"; | |
leaf id { | |
type uint32; | |
description | |
"The id specifies the order in which the entries in the | |
cert-to-name list are searched. Entries with lower | |
numbers are searched first."; | |
reference | |
"RFC 63 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 9, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
53: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNID"; | |
} | |
leaf fingerprint { | |
type tls-fingerprint; | |
mandatory true; | |
description | |
"Specifies a value with which the fingerprint of the | |
full certificate presented by the peer is compared. If | |
the fingerprint of the full certificate presented by the | |
peer does not match the fingerprint configured, then the | |
entry is skipped, and the search for a match continues."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNFingerprint"; | |
} | |
leaf map-type { | |
type identityref { | |
base cert-to-name; | |
} | |
mandatory true; | |
description | |
"Specifies the algorithm u | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#955 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
sed to map the certificate | |
presented by the peer to a name. | |
Mappings that need additional configuration objects should | |
use the 'when' statement to make them conditional based on | |
the map-type."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNMapType"; | |
} | |
leaf name { | |
when "../map-type = 'x509c2n:specified'"; | |
type string; | |
mandatory true; | |
description | |
"Directly specifies the NETCONF username when the | |
map-type is 'specified'."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNData"; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 14, head 12, lenght 3 | |
[INF]: NP: Session 1: thread 3 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="6"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-crypto-types</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 14, head 15, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 16, head 15, lenght 2 | |
[INF]: LN: Schema "ietf-crypto-types" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 17, head 15, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 15, head 16, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 16, head 17, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 18, head 17, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 17, head 18, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 18, head 13, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 1, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="6"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-crypto-types { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-crypto-types"; | |
prefix ct; | |
import ietf-yang-types { | |
prefix yang; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]> | |
Author: Wang Haiguang <[email protected]>"; | |
description | |
"This module defines common YANG types for cryptographic | |
applications. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights rese | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 17, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
rved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: Common YANG Data Types for Cryptography"; | |
} | |
typedef hash-algorithm-t { | |
type union { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Hash algorithm is NULL."; | |
} | |
enum "sha1" { | |
value 1; | |
status obsolete; | |
description | |
"The SHA1 algorithm."; | |
reference | |
"RFC 3174: US Secure Hash Algorithms 1 (SHA1)."; | |
} | |
enum "sha-224" { | |
value 2; | |
description | |
"The SHA-224 algorithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "sha-256" { | |
value 3; | |
description | |
"The SHA-256 algorithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "sha-384" { | |
value 4; | |
description | |
"The SHA-384 algorithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "sha-512" { | |
value 5; | |
description | |
"The SHA-512 alg | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
orithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "shake-128" { | |
value 6; | |
description | |
"The SHA3 algorithm with 128-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-224" { | |
value 7; | |
description | |
"The SHA3 algorithm with 224-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-256" { | |
value 8; | |
description | |
"The SHA3 algorithm with 256-bits output."; | |
reference | |
"National In | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
stitute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-384" { | |
value 9; | |
description | |
"The SHA3 algorithm with 384-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-512" { | |
value 10; | |
description | |
"The SHA3 algorithm with 384-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
} | |
} | |
default "0"; | |
descriptio | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
n | |
"The uint16 filed shall be set by individual protocol families | |
according to the hash algorithm value assigned by IANA. The | |
setting is optional and by default is 0. The enumeration | |
filed is set to the selected hash algorithm."; | |
} | |
typedef asymmetric-key-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Asymetric key algorithm is NULL."; | |
} | |
enum "rsa1024" { | |
value 1; | |
description | |
"The RSA algorithm using a 1024-bit key."; | |
reference | |
"RFC 8017: PKCS #1: RSA Cryptography | |
Specifications Version 2.2."; | |
} | |
enum "rsa2048" { | |
value 2; | |
description | |
"The RSA algorithm using a 2048-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa3072" { | |
value 3; | |
d | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 7, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 8, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
escription | |
"The RSA algorithm using a 3072-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa4096" { | |
value 4; | |
description | |
"The RSA algorithm using a 4096-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa7680" { | |
value 5; | |
description | |
"The RSA algorithm using a 7680-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa15360" { | |
value 6; | |
description | |
"The RSA algorithm using a 15360-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "secp192r1" { | |
value 7; | |
description | |
"The asymmetric algorithm | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
using a NIST P192 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp224r1" { | |
value 8; | |
description | |
"The asymmetric algorithm using a NIST P224 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp256r1" { | |
value 9; | |
description | |
"The asymmetric algorithm using a NIST P256 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp384r1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
" { | |
value 10; | |
description | |
"The asymmetric algorithm using a NIST P384 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp521r1" { | |
value 11; | |
description | |
"The asymmetric algorithm using a NIST P521 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "x25519" { | |
value 12; | |
description | |
"The asymmetric algorithm using a x.25519 Curve."; | |
reference | |
"RFC 7748: | |
Elliptic Curves for Security."; | |
} | |
enum "x448" { | |
value 13; | |
description | |
"The | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 12, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
asymmetric algorithm using a x.448 Curve."; | |
reference | |
"RFC 7748: | |
Elliptic Curves for Security."; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the asymmetric key algorithm value | |
assigned by IANA. The setting is optional and by default | |
is 0. The enumeration filed is set to the selected | |
asymmetric key algorithm."; | |
} | |
typedef mac-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"mac algorithm is NULL."; | |
} | |
enum "hmac-sha1" { | |
value 1; | |
description | |
"Generating MAC using SHA1 hash function"; | |
reference | |
"RFC 3174: US Secure Hash Algorithm 1 (SHA1)"; | |
} | |
enum "hmac-sha1-96" { | |
value 2; | |
description | |
"Generating MAC using SHA1 hash function"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
reference | |
"RFC 2404: The Use of HMAC-SHA-1-96 within ESP and AH"; | |
} | |
enum "hmac-sha2-224" { | |
value 3; | |
description | |
"Generating MAC using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-256" { | |
value 4; | |
description | |
"Generating MAC using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-256-128" { | |
value 5; | |
description | |
"Generating a 256 bits MAC using SHA2 hash function and | |
truncate it to 128 bits"; | |
reference | |
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, | |
and HMAC-SHA-512 with IPsec"; | |
} | |
enum "hmac-sha2-384" { | |
value 6; | |
description | |
"Generating a 384 bits MAC | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 13, head 14, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 15, head 14, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 14, head 15, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-384-192" { | |
value 7; | |
description | |
"Generating a 384 bits MAC using SHA2 hash function and | |
truncate it to 192 bits"; | |
reference | |
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, | |
and HMAC-SHA-512 with IPsec"; | |
} | |
enum "hmac-sha2-512" { | |
value 8; | |
description | |
"Generating a 512 bits MAC using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-512-256" { | |
value 9; | |
description | |
"Generating a 512 bits MAC using SHA2 hash function and | |
truncate it to 256 bits"; | |
reference | |
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, | |
and HMAC-SHA-512 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 16, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 17, head 15, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
with IPsec"; | |
} | |
enum "aes-128-gmac" { | |
value 10; | |
description | |
"Generating 128-bit MAC using the Advanced Encryption | |
Standard (AES) Galois Message Authentication Code | |
(GMAC) as a mechanism to provide data origin | |
authentication."; | |
reference | |
"RFC 4543: | |
The Use of Galois Message Authentication Code (GMAC) | |
in IPsec ESP and AH"; | |
} | |
enum "aes-192-gmac" { | |
value 11; | |
description | |
"Generating 192-bit MAC using the Advanced Encryption | |
Standard (AES) Galois Message Authentication Code | |
(GMAC) as a mechanism to provide data origin | |
authentication."; | |
reference | |
"RFC 4543: | |
The Use of Galois Message Authentication Code (GMAC) | |
in IPsec ESP and AH"; | |
} | |
enum "aes-256-gmac" { | |
value 12; | |
description | |
"Generating 256-bit | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 18, head 15, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 15, head 16, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
MAC using the Advanced Encryption | |
Standard (AES) Galois Message Authentication Code | |
(GMAC) as a mechanism to provide data origin | |
authentication."; | |
reference | |
"RFC 4543: | |
The Use of Galois Message Authentication Code (GMAC) | |
in IPsec ESP and AH"; | |
} | |
enum "aes-cmac-96" { | |
value 13; | |
description | |
"Generating 96-bit MAC using Advanced Encryption | |
Standard (AES) Cipher-based Message Authentication | |
Code (CMAC)"; | |
reference | |
"RFC 4494: | |
The AES-CMAC Algorithm and its Use with IPsec"; | |
} | |
enum "aes-cmac-128" { | |
value 14; | |
description | |
"Generating 128-bit MAC using Advanced Encryption | |
Standard (AES) Cipher-based Message Authentication | |
Code (CMAC)"; | |
reference | |
"RFC 4494: | |
The AES-CMAC Algorithm and its Use with IPsec"; | |
} | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 19, head 17, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 17, head 18, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
enum "sha1-des3-kd" { | |
value 15; | |
description | |
"Generating MAC using triple DES encryption function"; | |
reference | |
"RFC 3961: | |
Encryption and Checksum Specifications for Kerberos | |
5"; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the mac algorithm value assigned by | |
IANA. The setting is optional and by default is 0. The | |
enumeration filed is set to the selected mac algorithm."; | |
} | |
typedef encryption-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Encryption algorithm is NULL."; | |
} | |
enum "aes-128-cbc" { | |
value 1; | |
description | |
"Encrypt message with AES algorithm in CBC mode with | |
a key length of 128 bits."; | |
reference | |
"RFC 3565: Use of t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 18, head 19, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 20, head 19, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 21, head 19, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
he Advanced Encryption Standard (AES) | |
Encryption Algorithm in Cryptographic Message Syntax | |
(CMS)"; | |
} | |
enum "aes-192-cbc" { | |
value 2; | |
description | |
"Encrypt message with AES algorithm in CBC mode with | |
a key length of 192 bits"; | |
reference | |
"RFC 3565: Use of the Advanced Encryption Standard (AES) | |
Encryption Algorithm in Cryptographic Message Syntax | |
(CMS)"; | |
} | |
enum "aes-256-cbc" { | |
value 3; | |
description | |
"Encrypt message with AES algorithm in CBC mode with | |
a key length of 256 bits"; | |
reference | |
"RFC 3565: Use of the Advanced Encryption Standard (AES) | |
Encryption Algorithm in Cryptographic Message Syntax | |
(CMS)"; | |
} | |
enum "aes-128-ctr" { | |
value 4; | |
description | |
"Encrypt message with AES algorithm in CTR mode with | |
a key length of 128 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 19, head 20, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 22, head 20, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 20, head 21, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
bits"; | |
reference | |
"RFC 3686: | |
Using Advanced Encryption Standard (AES) Counter | |
Mode with IPsec Encapsulating Security Payload | |
(ESP)"; | |
} | |
enum "aes-192-ctr" { | |
value 5; | |
description | |
"Encrypt message with AES algorithm in CTR mode with | |
a key length of 192 bits"; | |
reference | |
"RFC 3686: | |
Using Advanced Encryption Standard (AES) Counter | |
Mode with IPsec Encapsulating Security Payload | |
(ESP)"; | |
} | |
enum "aes-256-ctr" { | |
value 6; | |
description | |
"Encrypt message with AES algorithm in CTR mode with | |
a key length of 256 bits"; | |
reference | |
"RFC 3686: | |
Using Advanced Encryption Standard (AES) Counter | |
Mode with IPsec Encapsulating Security Payload | |
(ESP)"; | |
} | |
enum "des3-cbc-sha1-kd" { | |
value 7; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 21, head 22, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 23, head 22, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 22, head 23, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Encrypt message with 3DES algorithm in CBC mode | |
with sha1 function for key derivation"; | |
reference | |
"RFC 3961: | |
Encryption and Checksum Specifications for | |
Kerberos 5"; | |
} | |
enum "rc4-hmac" { | |
value 8; | |
description | |
"Encrypt message with rc4 algorithm"; | |
reference | |
"RFC 4757: | |
The RC4-HMAC Kerberos Encryption Types Used by | |
Microsoft Windows"; | |
} | |
enum "rc4-hmac-exp" { | |
value 9; | |
description | |
"Encrypt message with rc4 algorithm that is exportable"; | |
reference | |
"RFC 4757: | |
The RC4-HMAC Kerberos Encryption Types Used by | |
Microsoft Windows"; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the encryption algorithm value | |
assigned by IANA. The set | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 24, head 23, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 25, head 23, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 26, head 23, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
ting is optional and by default | |
is 0. The enumeration filed is set to the selected | |
encryption algorithm."; | |
} | |
typedef encryption-and-mac-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Encryption and MAC algorithm is NULL."; | |
reference | |
"None"; | |
} | |
enum "aes-128-ccm" { | |
value 1; | |
description | |
"Encrypt message with AES algorithm in CCM | |
mode with a key length of 128 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4309: Using Advanced Encryption Standard | |
(AES) CCM Mode with IPsec Encapsulating Security | |
Payload (ESP)"; | |
} | |
enum "aes-192-ccm" { | |
value 2; | |
description | |
"Encrypt message with AES algorithm in CCM | |
mode with a key length of 192 bits; it can | |
also be used for generatin | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 23, head 24, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
g MAC"; | |
reference | |
"RFC 4309: Using Advanced Encryption Standard | |
(AES) CCM Mode with IPsec Encapsulating Security | |
Payload (ESP)"; | |
} | |
enum "aes-256-ccm" { | |
value 3; | |
description | |
"Encrypt message with AES algorithm in CCM | |
mode with a key length of 256 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4309: Using Advanced Encryption Standard | |
(AES) CCM Mode with IPsec Encapsulating Security | |
Payload (ESP)"; | |
} | |
enum "aes-128-gcm" { | |
value 4; | |
description | |
"Encrypt message with AES algorithm in GCM | |
mode with a key length of 128 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4106: The Use of Galois/Counter Mode (GCM) | |
in IPsec Encapsulating Security Payload (ESP)"; | |
} | |
enum "aes-192-gcm" { | |
value 5; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 24, head 25, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 27, head 25, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 25, head 26, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Encrypt message with AES algorithm in GCM | |
mode with a key length of 192 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4106: The Use of Galois/Counter Mode (GCM) | |
in IPsec Encapsulating Security Payload (ESP)"; | |
} | |
enum "aes-256-gcm" { | |
value 6; | |
description | |
"Encrypt message with AES algorithm in GCM | |
mode with a key length of 256 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4106: The Use of Galois/Counter Mode (GCM) | |
in IPsec Encapsulating Security Payload (ESP)"; | |
} | |
enum "chacha20-poly1305" { | |
value 7; | |
description | |
"Encrypt message with chacha20 algorithm and generate | |
MAC with POLY1305; it can also be used for generating | |
MAC"; | |
reference | |
"RFC 8439: ChaCha20 and Poly1305 for IETF Protocols"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 26, head 27, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 28, head 27, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the encryption and mac algorithm value | |
assigned by IANA. The setting is optional and by default is | |
0. The enumeration filed is set to the selected encryption | |
and mac algorithm."; | |
} | |
typedef signature-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Signature algorithm is NULL"; | |
} | |
enum "dsa-sha1" { | |
value 1; | |
description | |
"The signature algorithm using DSA algorithm with SHA1 | |
hash algorithm"; | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
enum "rsassa-pkcs1-sha1" { | |
value 2; | |
description | |
"The signature algorithm using RSASSA-PKCS1-v1_5 with | |
the SHA1 hash algorithm."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 29, head 27, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 27, head 28, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 30, head 28, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
enum "rsassa-pkcs1-sha256" { | |
value 3; | |
description | |
"The signature algorithm using RSASSA-PKCS1-v1_5 with | |
the SHA256 hash algorithm."; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 in the | |
Secure Shell (SSH) Protocol | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pkcs1-sha384" { | |
value 4; | |
description | |
"The signature algorithm using RSASSA-PKCS1-v1_5 with | |
the SHA384 hash algorithm."; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pkcs1-sha512" { | |
value 5; | |
description | |
"The signature algorithm using RS | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 28, head 29, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 31, head 29, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 29, head 30, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ASSA-PKCS1-v1_5 with | |
the SHA512 hash algorithm."; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 in the | |
Secure Shell (SSH) Protocol | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-rsae-sha256" { | |
value 6; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA256 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-rsae-sha384" { | |
value 7; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA384 hash algorithm. If | |
the | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 30, head 31, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 32, head 31, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-rsae-sha512" { | |
value 8; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA512 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-pss-sha256" { | |
value 9; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA256 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 33, head 31, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 31, head 32, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 34, head 32, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-pss-sha384" { | |
value 10; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA384 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-pss-sha512" { | |
value 11; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA512 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Prot | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 32, head 33, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 35, head 33, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ocol | |
Version 1.3"; | |
} | |
enum "ecdsa-secp256r1-sha256" { | |
value 12; | |
description | |
"The signature algorithm using ECDSA with curve name | |
secp256r1 and SHA256 hash algorithm."; | |
reference | |
"RFC 5656: | |
Elliptic Curve Algorithm Integration in the Secure | |
Shell Transport Layer | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ecdsa-secp384r1-sha384" { | |
value 13; | |
description | |
"The signature algorithm using ECDSA with curve name | |
secp384r1 and SHA384 hash algorithm."; | |
reference | |
"RFC 5656: | |
Elliptic Curve Algorithm Integration in the Secure | |
Shell Transport Layer | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ecdsa-secp521r1-sha512" { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 33, head 34, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 36, head 34, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 34, head 35, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
value 14; | |
description | |
"The signature algorithm using ECDSA with curve name | |
secp521r1 and SHA512 hash algorithm."; | |
reference | |
"RFC 5656: | |
Elliptic Curve Algorithm Integration in the Secure | |
Shell Transport Layer | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ed25519" { | |
value 15; | |
description | |
"The signature algorithm using EdDSA with curve x25519"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed25519-cts" { | |
value 16; | |
description | |
"The signature algorithm using EdDSA with curve x25519 | |
with phflag = 0"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed25519-ph" { | |
value 17; | |
des | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 35, head 36, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 37, head 36, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 38, head 36, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 36, head 37, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
cription | |
"The signature algorithm using EdDSA with curve x25519 | |
with phflag = 1"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed25519-sha512" { | |
value 18; | |
description | |
"The signature algorithm using EdDSA with curve x25519 | |
and SHA-512 function"; | |
reference | |
"RFC 8419: | |
Use of Edwards-Curve Digital Signature Algorithm | |
(EdDSA) Signatures in the Cryptographic Message | |
Syntax (CMS)"; | |
} | |
enum "ed448" { | |
value 19; | |
description | |
"The signature algorithm using EdDSA with curve x448"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed448-ph" { | |
value 20; | |
description | |
"The signature algorithm using EdDSA with curve x448 | |
and with PH | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 37, head 38, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 39, head 38, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
being SHAKE256(x, 64) and phflag being 1"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed448-shake256" { | |
value 21; | |
description | |
"The signature algorithm using EdDSA with curve x448 | |
and SHAKE-256 function"; | |
reference | |
"RFC 8419: | |
Use of Edwards-Curve Digital Signature Algorithm | |
(EdDSA) Signatures in the Cryptographic Message | |
Syntax (CMS)"; | |
} | |
enum "ed448-shake256-len" { | |
value 22; | |
description | |
"The signature algorithm using EdDSA with curve x448 | |
and SHAKE-256 function and a customized hash output"; | |
reference | |
"RFC 8419: | |
Use of Edwards-Curve Digital Signature Algorithm | |
(EdDSA) Signatures in the Cryptographic Message | |
Syntax (CMS)"; | |
} | |
enum "rsa-sha2-256" { | |
value 23; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 40, head 38, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 38, head 39, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 41, head 39, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"The signature algorithm using RSA with SHA2 function | |
for SSH protocol"; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 | |
in the Secure Shell (SSH) Protocol"; | |
} | |
enum "rsa-sha2-512" { | |
value 24; | |
description | |
"The signature algorithm using RSA with SHA2 function | |
for SSH protocol"; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 | |
in the Secure Shell (SSH) Protocol"; | |
} | |
enum "eccsi" { | |
value 25; | |
description | |
"The signature algorithm using ECCSI signature as | |
defined in RFC 6507."; | |
reference | |
"RFC 6507: | |
Elliptic Curve-Based Certificateless Signatures | |
for Identity-based Encryption (ECCSI)"; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by ind | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 39, head 40, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 42, head 40, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ividual protocol | |
families according to the signature algorithm value | |
assigned by IANA. The setting is optional and by default | |
is 0. The enumeration filed is set to the selected | |
signature algorithm."; | |
} | |
typedef key-exchange-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Key exchange algorithm is NULL."; | |
} | |
enum "psk-only" { | |
value 1; | |
description | |
"Using Pre-shared key for authentication and key | |
exchange"; | |
reference | |
"RFC 4279: | |
Pre-Shared Key cipher suites for Transport Layer | |
Security (TLS)"; | |
} | |
enum "dhe-ffdhe2048" { | |
value 2; | |
description | |
"Ephemeral Diffie Hellman key exchange with 2048 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 40, head 41, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 43, head 41, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe3072" { | |
value 3; | |
description | |
"Ephemeral Diffie Hellman key exchange with 3072 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe4096" { | |
value 4; | |
description | |
"Ephemeral Diffie Hellman key exchange with 4096 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe6144" { | |
value 5; | |
description | |
"Ephemeral Diffie Hellman key exchange with 6144 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellma | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 41, head 42, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 44, head 42, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 42, head 43, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
n Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe8192" { | |
value 6; | |
description | |
"Ephemeral Diffie Hellman key exchange with 8192 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "psk-dhe-ffdhe2048" { | |
value 7; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE2048"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe3072" { | |
value 8; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE30 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 43, head 44, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 45, head 44, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 44, head 45, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 46, head 45, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
72"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe4096" { | |
value 9; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE4096"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe6144" { | |
value 10; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE6144"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe8192" { | |
value 11; | |
description | |
"Key exchange using pre-shared key with Diffie-H | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ellman | |
key generation mechanism, where the DH group is | |
FFDHE8192"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ecdhe-secp256r1" { | |
value 12; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve secp256r1"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "ecdhe-secp384r1" { | |
value 13; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve secp384r1"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
en | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 45, head 46, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 47, head 46, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 48, head 46, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 46, head 47, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
um "ecdhe-secp521r1" { | |
value 14; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve secp521r1"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "ecdhe-x25519" { | |
value 15; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve x25519"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "ecdhe-x448" { | |
value 16; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve x448"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (E | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 47, head 48, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 49, head 48, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 50, head 48, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
CC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "psk-ecdhe-secp256r1" { | |
value 17; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve secp256r1"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-secp384r1" { | |
value 18; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve secp384r1"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-secp521r1" { | |
value 19; | |
description | |
"Key exchange using pre-shared key with elliptic | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 48, head 49, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 51, head 49, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve secp521r1"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-x25519" { | |
value 20; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve x25519"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-x448" { | |
value 21; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve x448"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "diffie-hellman-group14-sha1" { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 49, head 50, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 52, head 50, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
value 22; | |
description | |
"Using DH group14 and SHA1 for key exchange"; | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
enum "diffie-hellman-group14-sha256" { | |
value 23; | |
description | |
"Using DH group14 and SHA-256 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group15-sha512" { | |
value 24; | |
description | |
"Using DH group15 and SHA-512 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group16-sha512" { | |
value 25; | |
description | |
"Using DH group16 and SHA-512 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 50, head 51, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 53, head 51, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group17-sha512" { | |
value 26; | |
description | |
"Using DH group17 and SHA-512 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group18-sha512" { | |
value 27; | |
description | |
"Using DH group18 and SHA-512 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "ecdh-sha2-secp256r1" { | |
value 28; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange ove | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 51, head 52, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 54, head 52, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
r | |
curve ecp256r1 and using SHA2 for MAC generation"; | |
reference | |
"RFC 6239: | |
Suite B Cryptographic Suites for Secure Shell (SSH)"; | |
} | |
enum "ecdh-sha2-secp384r1" { | |
value 29; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve ecp384r1 and using SHA2 for MAC generation"; | |
reference | |
"RFC 6239: | |
Suite B Cryptographic Suites for Secure Shell (SSH)"; | |
} | |
enum "ecdh-x25519-x9.63-sha256" { | |
value 30; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using ANSI x9.63 with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-x9.63-sha384" { | |
valu | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 52, head 53, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 55, head 53, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
e 31; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using ANSI x9.63 with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-x9.63-sha512" { | |
value 32; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using ANSI x9.63 with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-hkdf-sha256" { | |
value 33; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and usi | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 53, head 54, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 56, head 54, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ng HKDF with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-hkdf-sha384" { | |
value 34; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using HKDF with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-hkdf-sha512" { | |
value 35; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using HKDF with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 54, head 55, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 57, head 55, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 55, head 56, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-x9.63-sha256" { | |
value 36; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using ANSI x9.63 with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-x9.63-sha384" { | |
value 37; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using ANSI x9.63 with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 56, head 57, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 58, head 57, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 59, head 57, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
48-x9.63-sha512" { | |
value 38; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using ANSI x9.63 with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-hkdf-sha256" { | |
value 39; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using HKDF with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-hkdf-sha384" { | |
value 40; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
cur | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 57, head 58, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 60, head 58, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 58, head 59, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ve x.448 and using HKDF with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-hkdf-sha512" { | |
value 41; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using HKDF with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "rsaes-oaep" { | |
value 42; | |
description | |
"RSAES-OAEP combines the RSAEP and RSADP primitives with | |
the EME-OAEP encoding method"; | |
reference | |
"RFC 8017: | |
PKCS #1: | |
RSA Cryptography Specifications Version 2.2."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 59, head 60, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 61, head 60, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 62, head 60, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
} | |
enum "rsaes-pkcs1-v1_5" { | |
value 43; | |
description | |
"RSAES-PKCS1-v1_5 combines the RSAEP and RSADP | |
primitives with the EME-PKCS1-v1_5 encoding method"; | |
reference | |
"RFC 8017: | |
PKCS #1: | |
RSA Cryptography Specifications Version 2.2."; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the key exchange algorithm value | |
assigned by IANA. The setting is optional and by default | |
is 0. The enumeration filed is set to the selected key | |
exchange algorithm."; | |
} | |
typedef x509 { | |
type binary; | |
description | |
"A Certificate structure, as specified in RFC 5280, | |
encoded using ASN.1 distinguished encoding rules (DER), | |
as specified in ITU-T X.690."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 60, head 61, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 63, head 61, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 61, head 62, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
(CRL) Profile | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
typedef crl { | |
type binary; | |
description | |
"A CertificateList structure, as specified in RFC 5280, | |
encoded using ASN.1 distinguished encoding rules (DER), | |
as specified in ITU-T X.690."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List (CRL) Profile | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
typedef cms { | |
type binary; | |
description | |
"A ContentInfo structure, as specified in RFC 5652, | |
encoded using ASN.1 distinguished encoding rules (DER), | |
as specified in ITU- | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 62, head 63, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 64, head 63, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 65, head 63, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
T X.690."; | |
reference | |
"RFC 5652: | |
Cryptographic Message Syntax (CMS) | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
typedef data-content-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
data content type, as described by Section 4 in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef signed-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
signed-data content type, as described by Section 5 in | |
RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef enveloped-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
enveloped-data content type, as described by | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 63, head 64, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 66, head 64, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
Section 6 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef digested-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
digested-data content type, as described by Section 7 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef encrypted-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
encrypted-data content type, as described by Section 8 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef authenticated-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
authenticated-data content type, as described by Section 9 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef ssh-host-key { | |
type binary; | |
description | |
"The | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 64, head 65, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
binary public key data for this SSH key, as | |
specified by RFC 4253, Section 6.6, i.e.: | |
string certificate or public key format | |
identifier | |
byte[n] key/certificate data."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer | |
Protocol"; | |
} | |
typedef trust-anchor-cert-x509 { | |
type x509; | |
description | |
"A Certificate structure that MUST encode a self-signed | |
root certificate."; | |
} | |
typedef end-entity-cert-x509 { | |
type x509; | |
description | |
"A Certificate structure that MUST encode a certificate | |
that is neither self-signed nor having Basic constraint | |
CA true."; | |
} | |
typedef trust-anchor-cert-cms { | |
type signed-data-cms; | |
description | |
"A CMS SignedData structure that MUST contain the chain of | |
X.509 certificates needed to authenticate the certificate | |
presented by a client or end-entity. | |
The CMS MUST contain only a single chain of certificates. | |
The cli | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 67, head 65, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 65, head 66, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 68, head 66, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ent or end-entity certificate MUST only authenticate | |
to last intermediate CA certificate listed in the chain. | |
In all cases, the chain MUST include a self-signed root | |
certificate. In the case where the root certificate is | |
itself the issuer of the client or end-entity certificate, | |
only one certificate is present. | |
This CMS structure MAY (as applicable where this type is | |
used) also contain suitably fresh (as defined by local | |
policy) revocation objects with which the device can | |
verify the revocation status of the certificates. | |
This CMS encodes the degenerate form of the SignedData | |
structure that is commonly used to disseminate X.509 | |
certificates and revocation objects (RFC 5280)."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List (CRL) Profile."; | |
} | |
typedef end-entity-cert-cms { | |
type signed-data-cms; | |
description | |
"A CMS SignedD | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 66, head 67, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ata structure that MUST contain the end | |
entity certificate itself, and MAY contain any number | |
of intermediate certificates leading up to a trust | |
anchor certificate. The trust anchor certificate | |
MAY be included as well. | |
The CMS MUST contain a single end entity certificate. | |
The CMS MUST NOT contain any spurious certificates. | |
This CMS structure MAY (as applicable where this type is | |
used) also contain suitably fresh (as defined by local | |
policy) revocation objects with which the device can | |
verify the revocation status of the certificates. | |
This CMS encodes the degenerate form of the SignedData | |
structure that is commonly used to disseminate X.509 | |
certificates and revocation objects (RFC 5280)."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List (CRL) Profile."; | |
} | |
grouping symmetric-key-grouping { | |
description | |
"A symmetric key | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 69, head 67, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 67, head 68, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
and algorithm."; | |
leaf algorithm { | |
type encryption-algorithm-t; | |
mandatory true; | |
description | |
"The algorithm to be used when generating the key."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
choice key-type { | |
mandatory true; | |
description | |
"Choice between key types."; | |
leaf key { | |
nacm:default-deny-all; | |
type binary; | |
description | |
"The binary value of the key. The interpretation of | |
the value is defined by 'algorithm'. For example, | |
FIXME."; | |
reference | |
"RFC XXXX: FIXME"; | |
} | |
leaf hidden-key { | |
nacm:default-deny-write; | |
type empty; | |
description | |
"A permanently hidden key. How such keys are created | |
is outside the scope of this module."; | |
} | |
} | |
} | |
grouping public-key-grouping { | |
description | |
"A public key and its associated algorithm."; | |
leaf algorithm { | |
nacm:default-deny-w | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 68, head 69, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 70, head 69, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 71, head 69, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
rite; | |
type asymmetric-key-algorithm-t; | |
mandatory true; | |
description | |
"Identifies the key's algorithm."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
leaf public-key { | |
nacm:default-deny-write; | |
type binary; | |
mandatory true; | |
description | |
"The binary value of the public key. The interpretation | |
of the value is defined by 'algorithm'. For example, | |
a DSA key is an integer, an RSA key is represented as | |
RSAPublicKey per RFC 8017, and an ECC key is represented | |
using the 'publicKey' described in RFC 5915."; | |
reference | |
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1: | |
RSA Cryptography Specifications Version 2.2. | |
RFC 5915: Elliptic Curve Private Key Structure."; | |
} | |
} | |
grouping asymmetric-key-pair-grouping { | |
description | |
"A private key and its associated public key and algorithm."; | |
uses public-key-grouping; | |
choice priva | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 69, head 70, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 72, head 70, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 70, head 71, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
te-key-type { | |
mandatory true; | |
description | |
"Choice between key types."; | |
leaf private-key { | |
nacm:default-deny-all; | |
type binary; | |
description | |
"The value of the binary key. The key's value is | |
interpreted by the 'algorithm'. For example, a DSA key | |
is an integer, an RSA key is represented as RSAPrivateKey | |
as defined in RFC 8017, and an ECC key is represented as | |
ECPrivateKey as defined in RFC 5915."; | |
reference | |
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1: | |
RSA Cryptography Specifications Version 2.2. | |
RFC 5915: Elliptic Curve Private Key Structure."; | |
} | |
leaf hidden-private-key { | |
nacm:default-deny-write; | |
type empty; | |
description | |
"A permanently hidden key. How such keys are created | |
is outside the scope of this module."; | |
} | |
} | |
} | |
grouping trust-anchor-cert-grouping { | |
description | |
"A | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 71, head 72, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 73, head 72, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 74, head 72, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 72, head 73, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
trust anchor certificate, and a notification for when | |
it is about to (or already has) expire."; | |
leaf cert { | |
nacm:default-deny-write; | |
type trust-anchor-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once a day thereafter until the issue is resolved."; | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the certificate."; | |
} | |
} | |
} | |
grouping trust-anchor-c | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 73, head 74, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 75, head 74, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 76, head 74, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
erts-grouping { | |
description | |
"A list of trust anchor certificates, and a notification | |
for when one is about to (or already has) expire."; | |
leaf-list cert { | |
nacm:default-deny-write; | |
type trust-anchor-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once a day thereafter until the issue is resolved."; | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the cert | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 74, head 75, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 75, head 76, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
ificate."; | |
} | |
} | |
} | |
grouping end-entity-cert-grouping { | |
description | |
"An end entity certificate, and a notification for when | |
it is about to (or already has) expire. Implementations | |
SHOULD assert that, where used, the end entity certificate | |
contains the expected public key."; | |
leaf cert { | |
nacm:default-deny-write; | |
type end-entity-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once a day thereafter until the issue is resolved."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 77, head 76, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 76, head 77, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the certificate."; | |
} | |
} | |
} | |
grouping end-entity-certs-grouping { | |
description | |
"A list of end entity certificates, and a notification for | |
when one is about to (or already has) expire."; | |
leaf-list cert { | |
nacm:default-deny-write; | |
type end-entity-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 78, head 77, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 79, head 77, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 77, head 78, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
a day thereafter until the issue is resolved."; | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the certificate."; | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-cert-grouping { | |
description | |
"A private/public key pair and an associated certificate. | |
Implementations SHOULD assert that certificates contain | |
the matching public key."; | |
uses asymmetric-key-pair-grouping; | |
uses end-entity-cert-grouping; | |
action generate-certificate-signing-request { | |
nacm:default-deny-all; | |
description | |
"Generates a certificate signing request structure for | |
the associated asymmetric key using the passed subject | |
and attribute values. The specified assertions need | |
to be appropriate for the certificate's use. For | |
example, an entity certificate for a TLS server | |
SHOULD have values that enable clients to satisfy | |
RFC 6125 pro | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 80, head 78, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 81, head 78, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
cessing."; | |
input { | |
leaf subject { | |
type binary; | |
mandatory true; | |
description | |
"The 'subject' field per the CertificationRequestInfo | |
structure as specified by RFC 2986, Section 4.1 | |
encoded using the ASN.1 distinguished encoding | |
rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
leaf attributes { | |
type binary; | |
description | |
"The 'attributes' field from the structure | |
CertificationRequestInfo as specified by RFC 2986, | |
Section 4.1 encoded using the ASN.1 distingu | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 78, head 79, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ished | |
encoding rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
output { | |
leaf certificate-signing-request { | |
type binary; | |
mandatory true; | |
description | |
"A CertificationRequest structure as specified by | |
RFC 2986, Section 4.2 encoded using the ASN.1 | |
distinguished encoding rules (DER), as specified | |
in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 79, head 80, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 82, head 80, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 80, head 81, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-certs-grouping { | |
description | |
"A private/public key pair and associated certificates. | |
Implementations SHOULD assert that certificates contain | |
the matching public key."; | |
uses asymmetric-key-pair-grouping; | |
container certificates { | |
nacm:default-deny-write; | |
description | |
"Certificates associated with this asymmetric key. | |
More than one certificate supports, for instance, | |
a TPM-protected asymmetric key that has both IDevID | |
and LDevID certificates associated."; | |
list certificate { | |
key "name"; | |
description | |
"A certificate for this asymmetric key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 81, head 82, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 83, head 82, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 84, head 82, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
for the certificate. If the name | |
matches the name of a certificate that exists | |
independently in <operational> (i.e., an IDevID), | |
then the 'cert' node MUST NOT be configured."; | |
} | |
uses end-entity-cert-grouping; | |
} | |
} | |
action generate-certificate-signing-request { | |
nacm:default-deny-all; | |
description | |
"Generates a certificate signing request structure for | |
the associated asymmetric key using the passed subject | |
and attribute values. The specified assertions need | |
to be appropriate for the certificate's use. For | |
example, an entity certificate for a TLS server | |
SHOULD have values that enable clients to satisfy | |
RFC 6125 processing."; | |
input { | |
leaf subject { | |
type binary; | |
mandatory true; | |
description | |
"The 'subject' field per the CertificationRequestInfo | |
structure as specified by RFC 2986, Section 4.1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 82, head 83, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 85, head 83, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
encoded using the ASN.1 distinguished encoding | |
rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
leaf attributes { | |
type binary; | |
description | |
"The 'attributes' field from the structure | |
CertificationRequestInfo as specified by RFC 2986, | |
Section 4.1 encoded using the ASN.1 distinguished | |
encoding rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 83, head 84, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 86, head 84, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1016 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 84, head 85, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
output { | |
leaf certificate-signing-request { | |
type binary; | |
mandatory true; | |
description | |
"A CertificationRequest structure as specified by | |
RFC 2986, Section 4.2 encoded using the ASN.1 | |
distinguished encoding rules (DER), as specified | |
in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
} | |
} | |
} | |
</data> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 85, head 86, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 87, head 86, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 88, head 86, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#12 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 86, head 87, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
</rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 87, head 88, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 89, head 88, lenght 2 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 88, head 89, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 90, head 89, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 89, head 90, lenght 1 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="7"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-keystore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 91, head 90, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 90, head 91, lenght 1 | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-keystore" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 92, head 91, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 93, head 91, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 91, head 92, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 92, head 93, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 93, head 88, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="7"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-keystore { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-keystore"; | |
prefix ks; | |
import ietf-crypto-types { | |
prefix ct; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]>"; | |
description | |
"This module defines a keystore to centralize management | |
of security credentials. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and bin | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC VVVV: A YANG Data Model for a Keystore"; | |
} | |
feature keystore-supported { | |
description | |
"The 'keystore-supported' feature indicates that the | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
server | |
supports the keystore."; | |
} | |
feature local-definitions-supported { | |
description | |
"The 'local-definitions-supported' feature indicates that the | |
server supports locally-defined keys."; | |
} | |
feature key-generation { | |
description | |
"Indicates that the server supports the actions related to | |
the life cycling keys in <operational>. To be used by | |
configuration, keys in <operational> must be copied to | |
<running>."; | |
} | |
typedef asymmetric-key-ref { | |
type leafref { | |
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name"; | |
} | |
description | |
"This typedef enables modules to easily define a reference | |
to an asymmetric key stored in the keystore."; | |
} | |
grouping key-reference-type-grouping { | |
description | |
"A reusable grouping for a choice for the type of key | |
referenced in the keystore."; | |
choice key-type { | |
mandatory true; | |
description | |
"A choice between a reference to a s | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 4, head 1, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
ymmetric or asymmetric | |
key in the keystore."; | |
leaf symmetric-key-ref { | |
if-feature "keystore-supported"; | |
type leafref { | |
path "/ks:keystore/ks:symmetric-keys/ks:symmetric-key/ks:name"; | |
} | |
description | |
"Identifies a symmetric key used to encrypt this key."; | |
} | |
leaf asymmetric-key-ref { | |
if-feature "keystore-supported"; | |
type leafref { | |
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name"; | |
} | |
description | |
"Identifies an asymmetric key used to encrypt this key."; | |
} | |
} | |
} | |
grouping encrypted-value-grouping { | |
description | |
"A reusable grouping for a value that has been encrypted by | |
a symmetric or asymmetric key in the keystore."; | |
uses key-reference-type-grouping; | |
leaf value { | |
type binary; | |
description | |
"The private key, encrypted using the specified symmetric | |
or asymmetric key."; | |
} | |
} | |
grouping symmetric-key-group | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ing { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:symmetric-key-grouping { | |
augment "key-type" { | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-key { | |
description | |
"A container for the encrypted symmetric key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-grouping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:asymmetric-key-pair-grouping { | |
augment "private-key-type" { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-private-key { | |
description | |
"A container for the encrypted asymmetric private | |
key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-cert-grouping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:asymmetric-key-pair-with-cert-grouping { | |
augment "private-key-type" { | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-private-key { | |
description | |
"A container for the encrypted asymmetric private | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-certs-grouping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:asymmetric-key-pair-with-certs-grouping { | |
augment "private-key-type" { | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-private-key { | |
description | |
"A container for the encrypted asymmetric private | |
key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-certificate-ref-grouping { | |
description | |
"This grouping defines a reference to a specific certificate | |
associated with an asymmetric k | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ey stored in the keystore."; | |
leaf asymmetric-key { | |
type asymmetric-key-ref; | |
must "../certificate"; | |
description | |
"A reference to an asymmetric key in the keystore."; | |
} | |
leaf certificate { | |
type leafref { | |
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key[ks:name = current()/../asymmetric-key]/ks:certificates/ks:certificate/ks:name"; | |
} | |
must "../asymmetric-key"; | |
description | |
"A reference to a specific certificate of the | |
asymmetric key in the keystore."; | |
} | |
} | |
grouping local-or-keystore-asymmetric-key-grouping { | |
description | |
"A grouping that expands to allow the asymmetric key to be | |
either stored locally, within the using data model, or be | |
a reference to an asymmetric key stored in the keystore."; | |
choice local-or-keystore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the keystore."; | |
case local { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local key definition."; | |
uses asymmetric-key-pair-grouping; | |
} | |
} | |
case keystore { | |
if-feature "keystore-supported"; | |
leaf keystore-reference { | |
type asymmetric-key-ref; | |
description | |
"A reference to an asymmetric key that exists in | |
the keystore. The intent is to reference just the | |
asymmetric key, not any certificates that may also | |
be associated with the asymmetric key."; | |
} | |
} | |
} | |
} | |
grouping local-or-keystore-asymmetric-key-with-certs-grouping { | |
description | |
"A grouping that expands to allow an asymmetric key and its | |
associated certificates to be either stored locally, within | |
the using data model, or be a reference to an asymmetric key | |
(and its associated certificates) stored in the keystore."; | |
choice local-or-key | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 8, head 5, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
store { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the keystore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local key definition."; | |
uses asymmetric-key-pair-with-certs-grouping; | |
} | |
} | |
case keystore { | |
if-feature "keystore-supported"; | |
leaf keystore-reference { | |
type asymmetric-key-ref; | |
description | |
"A reference to an asymmetric-key (and all of its | |
associated certificates) in the keystore."; | |
} | |
} | |
} | |
} | |
grouping local-or-keystore-end-entity-cert-with-key-grouping { | |
description | |
"A grouping that expands to allow an end-entity certificate | |
(and its associated private key) to be either stored locally, | |
within the using data model, or be a reference to a specific | |
certificate in t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
he keystore."; | |
choice local-or-keystore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the keystore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local key definition."; | |
uses asymmetric-key-pair-with-cert-grouping; | |
} | |
} | |
case keystore { | |
if-feature "keystore-supported"; | |
container keystore-reference { | |
description | |
"A reference to a specific certificate (and its | |
associated private key) in the keystore."; | |
uses asymmetric-key-certificate-ref-grouping; | |
} | |
} | |
} | |
} | |
grouping keystore-grouping { | |
description | |
"Grouping definition enables use in other contexts. If ever | |
done, implementations SHOULD augment new 'case' statements | |
into local-or-keystore 'choice' statements to supply leafref | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 10, head 7, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
s | |
to the new location."; | |
container asymmetric-keys { | |
description | |
"A list of asymmetric keys."; | |
list asymmetric-key { | |
key "name"; | |
description | |
"An asymmetric key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the asymmetric key."; | |
} | |
uses ks:asymmetric-key-pair-with-certs-grouping; | |
} | |
} | |
container symmetric-keys { | |
description | |
"A list of symmetric keys."; | |
list symmetric-key { | |
key "name"; | |
description | |
"A symmetric key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the symmetric key."; | |
} | |
uses ks:symmetric-key-grouping; | |
} | |
} | |
} | |
container keystore { | |
nacm:default-deny-write; | |
description | |
"The keystore contains a list of keys."; | |
uses keystore-grouping; | |
} | |
rpc generate-symmetric-key { | |
description | |
"Requests the device to | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 7, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
generate an symmetric key using | |
the specified key algorithm, optionally encrypted using | |
a key in the keystore. The output is this RPC can be | |
used as input to a subsequent configuration request."; | |
input { | |
leaf algorithm { | |
type ct:encryption-algorithm-t; | |
mandatory true; | |
description | |
"The algorithm to be used when generating the key."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
container encrypt-with { | |
presence "Indicates that the key should be encrypted using | |
the specified symmetric or asymmetric key. If not | |
specified, then the private key is not encrypted | |
when returned."; | |
description | |
"A container for the 'key-type' choice."; | |
uses key-reference-type-grouping; | |
} | |
} | |
output { | |
uses ks:symmetric-key-grouping; | |
} | |
} | |
rpc generate-asymmetric-key { | |
description | |
"Requests the device to generate an asymmetric | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#931 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
key using | |
the specified key algorithm, optionally encrypted using | |
a key in the keystore. The output is this RPC can be | |
used as input to a subsequent configuration request."; | |
input { | |
leaf algorithm { | |
type ct:asymmetric-key-algorithm-t; | |
mandatory true; | |
description | |
"The algorithm to be used when generating the key."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
container encrypt-with { | |
presence "Indicates that the key should be encrypted using | |
the specified symmetric or asymmetric key. If not | |
specified, then the private key is not encrypted | |
when returned."; | |
description | |
"A container for the 'key-type' choice."; | |
uses key-reference-type-grouping; | |
} | |
} | |
output { | |
uses ks:asymmetric-key-pair-grouping; | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 12, head 10, lenght 3 | |
[INF]: NP: Session 1: thread 3 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 13, head 10, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 10, head 11, lenght 3 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="8"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-crypto-types</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 14, head 12, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-crypto-types" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 13, head 14, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 15, head 14, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 14, head 15, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 15, head 10, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 11, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 12, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="8"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-crypto-types { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-crypto-types"; | |
prefix ct; | |
import ietf-yang-types { | |
prefix yang; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]> | |
Author: Wang Haiguang <[email protected]>"; | |
description | |
"This module defines common YANG types for cryptographic | |
applications. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights rese | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
rved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: Common YANG Data Types for Cryptography"; | |
} | |
typedef hash-algorithm-t { | |
type union { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 5, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Hash algorithm is NULL."; | |
} | |
enum "sha1" { | |
value 1; | |
status obsolete; | |
description | |
"The SHA1 algorithm."; | |
reference | |
"RFC 3174: US Secure Hash Algorithms 1 (SHA1)."; | |
} | |
enum "sha-224" { | |
value 2; | |
description | |
"The SHA-224 algorithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "sha-256" { | |
value 3; | |
description | |
"The SHA-256 algorithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "sha-384" { | |
value 4; | |
description | |
"The SHA-384 algorithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "sha-512" { | |
value 5; | |
description | |
"The SHA-512 alg | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
orithm."; | |
reference | |
"RFC 6234: US Secure Hash Algorithms."; | |
} | |
enum "shake-128" { | |
value 6; | |
description | |
"The SHA3 algorithm with 128-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-224" { | |
value 7; | |
description | |
"The SHA3 algorithm with 224-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-256" { | |
value 8; | |
description | |
"The SHA3 algorithm with 256-bits output."; | |
reference | |
"National In | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
stitute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-384" { | |
value 9; | |
description | |
"The SHA3 algorithm with 384-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
enum "shake-512" { | |
value 10; | |
description | |
"The SHA3 algorithm with 384-bits output."; | |
reference | |
"National Institute of Standards and Technology, | |
SHA-3 Standard: Permutation-Based Hash and | |
Extendable-Output Functions, FIPS PUB 202, DOI | |
10.6028/NIST.FIPS.202, August 2015."; | |
} | |
} | |
} | |
default "0"; | |
descriptio | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
n | |
"The uint16 filed shall be set by individual protocol families | |
according to the hash algorithm value assigned by IANA. The | |
setting is optional and by default is 0. The enumeration | |
filed is set to the selected hash algorithm."; | |
} | |
typedef asymmetric-key-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Asymetric key algorithm is NULL."; | |
} | |
enum "rsa1024" { | |
value 1; | |
description | |
"The RSA algorithm using a 1024-bit key."; | |
reference | |
"RFC 8017: PKCS #1: RSA Cryptography | |
Specifications Version 2.2."; | |
} | |
enum "rsa2048" { | |
value 2; | |
description | |
"The RSA algorithm using a 2048-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa3072" { | |
value 3; | |
d | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
escription | |
"The RSA algorithm using a 3072-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa4096" { | |
value 4; | |
description | |
"The RSA algorithm using a 4096-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa7680" { | |
value 5; | |
description | |
"The RSA algorithm using a 7680-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "rsa15360" { | |
value 6; | |
description | |
"The RSA algorithm using a 15360-bit key."; | |
reference | |
"RFC 8017: | |
PKCS #1: RSA Cryptography Specifications Version 2.2."; | |
} | |
enum "secp192r1" { | |
value 7; | |
description | |
"The asymmetric algorithm | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 9, head 10, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 11, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
using a NIST P192 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp224r1" { | |
value 8; | |
description | |
"The asymmetric algorithm using a NIST P224 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp256r1" { | |
value 9; | |
description | |
"The asymmetric algorithm using a NIST P256 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp384r1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 13, head 10, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
" { | |
value 10; | |
description | |
"The asymmetric algorithm using a NIST P384 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "secp521r1" { | |
value 11; | |
description | |
"The asymmetric algorithm using a NIST P521 Curve."; | |
reference | |
"RFC 6090: | |
Fundamental Elliptic Curve Cryptography Algorithms. | |
RFC 5480: | |
Elliptic Curve Cryptography Subject Public Key | |
Information."; | |
} | |
enum "x25519" { | |
value 12; | |
description | |
"The asymmetric algorithm using a x.25519 Curve."; | |
reference | |
"RFC 7748: | |
Elliptic Curves for Security."; | |
} | |
enum "x448" { | |
value 13; | |
description | |
"The | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 10, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
asymmetric algorithm using a x.448 Curve."; | |
reference | |
"RFC 7748: | |
Elliptic Curves for Security."; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the asymmetric key algorithm value | |
assigned by IANA. The setting is optional and by default | |
is 0. The enumeration filed is set to the selected | |
asymmetric key algorithm."; | |
} | |
typedef mac-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"mac algorithm is NULL."; | |
} | |
enum "hmac-sha1" { | |
value 1; | |
description | |
"Generating MAC using SHA1 hash function"; | |
reference | |
"RFC 3174: US Secure Hash Algorithm 1 (SHA1)"; | |
} | |
enum "hmac-sha1-96" { | |
value 2; | |
description | |
"Generating MAC using SHA1 hash function"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
reference | |
"RFC 2404: The Use of HMAC-SHA-1-96 within ESP and AH"; | |
} | |
enum "hmac-sha2-224" { | |
value 3; | |
description | |
"Generating MAC using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-256" { | |
value 4; | |
description | |
"Generating MAC using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-256-128" { | |
value 5; | |
description | |
"Generating a 256 bits MAC using SHA2 hash function and | |
truncate it to 128 bits"; | |
reference | |
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, | |
and HMAC-SHA-512 with IPsec"; | |
} | |
enum "hmac-sha2-384" { | |
value 6; | |
description | |
"Generating a 384 bits MAC | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-384-192" { | |
value 7; | |
description | |
"Generating a 384 bits MAC using SHA2 hash function and | |
truncate it to 192 bits"; | |
reference | |
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, | |
and HMAC-SHA-512 with IPsec"; | |
} | |
enum "hmac-sha2-512" { | |
value 8; | |
description | |
"Generating a 512 bits MAC using SHA2 hash function"; | |
reference | |
"RFC 6234: US Secure Hash Algorithms | |
(SHA and SHA-based HMAC and HKDF)"; | |
} | |
enum "hmac-sha2-512-256" { | |
value 9; | |
description | |
"Generating a 512 bits MAC using SHA2 hash function and | |
truncate it to 256 bits"; | |
reference | |
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, | |
and HMAC-SHA-512 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 16, head 14, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
with IPsec"; | |
} | |
enum "aes-128-gmac" { | |
value 10; | |
description | |
"Generating 128-bit MAC using the Advanced Encryption | |
Standard (AES) Galois Message Authentication Code | |
(GMAC) as a mechanism to provide data origin | |
authentication."; | |
reference | |
"RFC 4543: | |
The Use of Galois Message Authentication Code (GMAC) | |
in IPsec ESP and AH"; | |
} | |
enum "aes-192-gmac" { | |
value 11; | |
description | |
"Generating 192-bit MAC using the Advanced Encryption | |
Standard (AES) Galois Message Authentication Code | |
(GMAC) as a mechanism to provide data origin | |
authentication."; | |
reference | |
"RFC 4543: | |
The Use of Galois Message Authentication Code (GMAC) | |
in IPsec ESP and AH"; | |
} | |
enum "aes-256-gmac" { | |
value 12; | |
description | |
"Generating 256-bit | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 14, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 17, head 15, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
MAC using the Advanced Encryption | |
Standard (AES) Galois Message Authentication Code | |
(GMAC) as a mechanism to provide data origin | |
authentication."; | |
reference | |
"RFC 4543: | |
The Use of Galois Message Authentication Code (GMAC) | |
in IPsec ESP and AH"; | |
} | |
enum "aes-cmac-96" { | |
value 13; | |
description | |
"Generating 96-bit MAC using Advanced Encryption | |
Standard (AES) Cipher-based Message Authentication | |
Code (CMAC)"; | |
reference | |
"RFC 4494: | |
The AES-CMAC Algorithm and its Use with IPsec"; | |
} | |
enum "aes-cmac-128" { | |
value 14; | |
description | |
"Generating 128-bit MAC using Advanced Encryption | |
Standard (AES) Cipher-based Message Authentication | |
Code (CMAC)"; | |
reference | |
"RFC 4494: | |
The AES-CMAC Algorithm and its Use with IPsec"; | |
} | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 15, head 16, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 18, head 16, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
enum "sha1-des3-kd" { | |
value 15; | |
description | |
"Generating MAC using triple DES encryption function"; | |
reference | |
"RFC 3961: | |
Encryption and Checksum Specifications for Kerberos | |
5"; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the mac algorithm value assigned by | |
IANA. The setting is optional and by default is 0. The | |
enumeration filed is set to the selected mac algorithm."; | |
} | |
typedef encryption-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Encryption algorithm is NULL."; | |
} | |
enum "aes-128-cbc" { | |
value 1; | |
description | |
"Encrypt message with AES algorithm in CBC mode with | |
a key length of 128 bits."; | |
reference | |
"RFC 3565: Use of t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 19, head 17, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
he Advanced Encryption Standard (AES) | |
Encryption Algorithm in Cryptographic Message Syntax | |
(CMS)"; | |
} | |
enum "aes-192-cbc" { | |
value 2; | |
description | |
"Encrypt message with AES algorithm in CBC mode with | |
a key length of 192 bits"; | |
reference | |
"RFC 3565: Use of the Advanced Encryption Standard (AES) | |
Encryption Algorithm in Cryptographic Message Syntax | |
(CMS)"; | |
} | |
enum "aes-256-cbc" { | |
value 3; | |
description | |
"Encrypt message with AES algorithm in CBC mode with | |
a key length of 256 bits"; | |
reference | |
"RFC 3565: Use of the Advanced Encryption Standard (AES) | |
Encryption Algorithm in Cryptographic Message Syntax | |
(CMS)"; | |
} | |
enum "aes-128-ctr" { | |
value 4; | |
description | |
"Encrypt message with AES algorithm in CTR mode with | |
a key length of 128 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 17, head 18, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 20, head 18, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
bits"; | |
reference | |
"RFC 3686: | |
Using Advanced Encryption Standard (AES) Counter | |
Mode with IPsec Encapsulating Security Payload | |
(ESP)"; | |
} | |
enum "aes-192-ctr" { | |
value 5; | |
description | |
"Encrypt message with AES algorithm in CTR mode with | |
a key length of 192 bits"; | |
reference | |
"RFC 3686: | |
Using Advanced Encryption Standard (AES) Counter | |
Mode with IPsec Encapsulating Security Payload | |
(ESP)"; | |
} | |
enum "aes-256-ctr" { | |
value 6; | |
description | |
"Encrypt message with AES algorithm in CTR mode with | |
a key length of 256 bits"; | |
reference | |
"RFC 3686: | |
Using Advanced Encryption Standard (AES) Counter | |
Mode with IPsec Encapsulating Security Payload | |
(ESP)"; | |
} | |
enum "des3-cbc-sha1-kd" { | |
value 7; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 18, head 19, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 21, head 19, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Encrypt message with 3DES algorithm in CBC mode | |
with sha1 function for key derivation"; | |
reference | |
"RFC 3961: | |
Encryption and Checksum Specifications for | |
Kerberos 5"; | |
} | |
enum "rc4-hmac" { | |
value 8; | |
description | |
"Encrypt message with rc4 algorithm"; | |
reference | |
"RFC 4757: | |
The RC4-HMAC Kerberos Encryption Types Used by | |
Microsoft Windows"; | |
} | |
enum "rc4-hmac-exp" { | |
value 9; | |
description | |
"Encrypt message with rc4 algorithm that is exportable"; | |
reference | |
"RFC 4757: | |
The RC4-HMAC Kerberos Encryption Types Used by | |
Microsoft Windows"; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the encryption algorithm value | |
assigned by IANA. The set | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 19, head 20, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ting is optional and by default | |
is 0. The enumeration filed is set to the selected | |
encryption algorithm."; | |
} | |
typedef encryption-and-mac-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Encryption and MAC algorithm is NULL."; | |
reference | |
"None"; | |
} | |
enum "aes-128-ccm" { | |
value 1; | |
description | |
"Encrypt message with AES algorithm in CCM | |
mode with a key length of 128 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4309: Using Advanced Encryption Standard | |
(AES) CCM Mode with IPsec Encapsulating Security | |
Payload (ESP)"; | |
} | |
enum "aes-192-ccm" { | |
value 2; | |
description | |
"Encrypt message with AES algorithm in CCM | |
mode with a key length of 192 bits; it can | |
also be used for generatin | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 22, head 20, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 20, head 21, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
g MAC"; | |
reference | |
"RFC 4309: Using Advanced Encryption Standard | |
(AES) CCM Mode with IPsec Encapsulating Security | |
Payload (ESP)"; | |
} | |
enum "aes-256-ccm" { | |
value 3; | |
description | |
"Encrypt message with AES algorithm in CCM | |
mode with a key length of 256 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4309: Using Advanced Encryption Standard | |
(AES) CCM Mode with IPsec Encapsulating Security | |
Payload (ESP)"; | |
} | |
enum "aes-128-gcm" { | |
value 4; | |
description | |
"Encrypt message with AES algorithm in GCM | |
mode with a key length of 128 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4106: The Use of Galois/Counter Mode (GCM) | |
in IPsec Encapsulating Security Payload (ESP)"; | |
} | |
enum "aes-192-gcm" { | |
value 5; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 21, head 22, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 23, head 22, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Encrypt message with AES algorithm in GCM | |
mode with a key length of 192 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4106: The Use of Galois/Counter Mode (GCM) | |
in IPsec Encapsulating Security Payload (ESP)"; | |
} | |
enum "aes-256-gcm" { | |
value 6; | |
description | |
"Encrypt message with AES algorithm in GCM | |
mode with a key length of 256 bits; it can | |
also be used for generating MAC"; | |
reference | |
"RFC 4106: The Use of Galois/Counter Mode (GCM) | |
in IPsec Encapsulating Security Payload (ESP)"; | |
} | |
enum "chacha20-poly1305" { | |
value 7; | |
description | |
"Encrypt message with chacha20 algorithm and generate | |
MAC with POLY1305; it can also be used for generating | |
MAC"; | |
reference | |
"RFC 8439: ChaCha20 and Poly1305 for IETF Protocols"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 24, head 22, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 22, head 23, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the encryption and mac algorithm value | |
assigned by IANA. The setting is optional and by default is | |
0. The enumeration filed is set to the selected encryption | |
and mac algorithm."; | |
} | |
typedef signature-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Signature algorithm is NULL"; | |
} | |
enum "dsa-sha1" { | |
value 1; | |
description | |
"The signature algorithm using DSA algorithm with SHA1 | |
hash algorithm"; | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
enum "rsassa-pkcs1-sha1" { | |
value 2; | |
description | |
"The signature algorithm using RSASSA-PKCS1-v1_5 with | |
the SHA1 hash algorithm."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 25, head 23, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 26, head 23, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
enum "rsassa-pkcs1-sha256" { | |
value 3; | |
description | |
"The signature algorithm using RSASSA-PKCS1-v1_5 with | |
the SHA256 hash algorithm."; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 in the | |
Secure Shell (SSH) Protocol | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pkcs1-sha384" { | |
value 4; | |
description | |
"The signature algorithm using RSASSA-PKCS1-v1_5 with | |
the SHA384 hash algorithm."; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pkcs1-sha512" { | |
value 5; | |
description | |
"The signature algorithm using RS | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 23, head 24, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ASSA-PKCS1-v1_5 with | |
the SHA512 hash algorithm."; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 in the | |
Secure Shell (SSH) Protocol | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-rsae-sha256" { | |
value 6; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA256 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-rsae-sha384" { | |
value 7; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA384 hash algorithm. If | |
the | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 24, head 25, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 25, head 26, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 27, head 26, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 26, head 27, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-rsae-sha512" { | |
value 8; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA512 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-pss-sha256" { | |
value 9; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA256 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 28, head 27, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 27, head 28, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 29, head 28, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 30, head 28, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 28, head 29, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 29, head 30, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-pss-sha384" { | |
value 10; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA384 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "rsassa-pss-pss-sha512" { | |
value 11; | |
description | |
"The signature algorithm using RSASSA-PSS with mask | |
generation function 1 and SHA512 hash algorithm. If | |
the public key is carried in an X.509 certificate, | |
it MUST use the rsaEncryption OID"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Prot | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 31, head 30, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 30, head 31, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 32, head 31, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 33, head 31, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 31, head 32, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ocol | |
Version 1.3"; | |
} | |
enum "ecdsa-secp256r1-sha256" { | |
value 12; | |
description | |
"The signature algorithm using ECDSA with curve name | |
secp256r1 and SHA256 hash algorithm."; | |
reference | |
"RFC 5656: | |
Elliptic Curve Algorithm Integration in the Secure | |
Shell Transport Layer | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ecdsa-secp384r1-sha384" { | |
value 13; | |
description | |
"The signature algorithm using ECDSA with curve name | |
secp384r1 and SHA384 hash algorithm."; | |
reference | |
"RFC 5656: | |
Elliptic Curve Algorithm Integration in the Secure | |
Shell Transport Layer | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ecdsa-secp521r1-sha512" { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 32, head 33, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 34, head 33, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 35, head 33, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 33, head 34, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 34, head 35, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 35, head 30, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
value 14; | |
description | |
"The signature algorithm using ECDSA with curve name | |
secp521r1 and SHA512 hash algorithm."; | |
reference | |
"RFC 5656: | |
Elliptic Curve Algorithm Integration in the Secure | |
Shell Transport Layer | |
RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ed25519" { | |
value 15; | |
description | |
"The signature algorithm using EdDSA with curve x25519"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed25519-cts" { | |
value 16; | |
description | |
"The signature algorithm using EdDSA with curve x25519 | |
with phflag = 0"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed25519-ph" { | |
value 17; | |
des | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
cription | |
"The signature algorithm using EdDSA with curve x25519 | |
with phflag = 1"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed25519-sha512" { | |
value 18; | |
description | |
"The signature algorithm using EdDSA with curve x25519 | |
and SHA-512 function"; | |
reference | |
"RFC 8419: | |
Use of Edwards-Curve Digital Signature Algorithm | |
(EdDSA) Signatures in the Cryptographic Message | |
Syntax (CMS)"; | |
} | |
enum "ed448" { | |
value 19; | |
description | |
"The signature algorithm using EdDSA with curve x448"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed448-ph" { | |
value 20; | |
description | |
"The signature algorithm using EdDSA with curve x448 | |
and with PH | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
being SHAKE256(x, 64) and phflag being 1"; | |
reference | |
"RFC 8032: | |
Edwards-Curve Digital Signature Algorithm (EdDSA)"; | |
} | |
enum "ed448-shake256" { | |
value 21; | |
description | |
"The signature algorithm using EdDSA with curve x448 | |
and SHAKE-256 function"; | |
reference | |
"RFC 8419: | |
Use of Edwards-Curve Digital Signature Algorithm | |
(EdDSA) Signatures in the Cryptographic Message | |
Syntax (CMS)"; | |
} | |
enum "ed448-shake256-len" { | |
value 22; | |
description | |
"The signature algorithm using EdDSA with curve x448 | |
and SHAKE-256 function and a customized hash output"; | |
reference | |
"RFC 8419: | |
Use of Edwards-Curve Digital Signature Algorithm | |
(EdDSA) Signatures in the Cryptographic Message | |
Syntax (CMS)"; | |
} | |
enum "rsa-sha2-256" { | |
value 23; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"The signature algorithm using RSA with SHA2 function | |
for SSH protocol"; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 | |
in the Secure Shell (SSH) Protocol"; | |
} | |
enum "rsa-sha2-512" { | |
value 24; | |
description | |
"The signature algorithm using RSA with SHA2 function | |
for SSH protocol"; | |
reference | |
"RFC 8332: | |
Use of RSA Keys with SHA-256 and SHA-512 | |
in the Secure Shell (SSH) Protocol"; | |
} | |
enum "eccsi" { | |
value 25; | |
description | |
"The signature algorithm using ECCSI signature as | |
defined in RFC 6507."; | |
reference | |
"RFC 6507: | |
Elliptic Curve-Based Certificateless Signatures | |
for Identity-based Encryption (ECCSI)"; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by ind | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ividual protocol | |
families according to the signature algorithm value | |
assigned by IANA. The setting is optional and by default | |
is 0. The enumeration filed is set to the selected | |
signature algorithm."; | |
} | |
typedef key-exchange-algorithm-t { | |
type union { | |
type uint16; | |
type enumeration { | |
enum "NONE" { | |
value 0; | |
description | |
"Key exchange algorithm is NULL."; | |
} | |
enum "psk-only" { | |
value 1; | |
description | |
"Using Pre-shared key for authentication and key | |
exchange"; | |
reference | |
"RFC 4279: | |
Pre-Shared Key cipher suites for Transport Layer | |
Security (TLS)"; | |
} | |
enum "dhe-ffdhe2048" { | |
value 2; | |
description | |
"Ephemeral Diffie Hellman key exchange with 2048 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe3072" { | |
value 3; | |
description | |
"Ephemeral Diffie Hellman key exchange with 3072 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe4096" { | |
value 4; | |
description | |
"Ephemeral Diffie Hellman key exchange with 4096 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe6144" { | |
value 5; | |
description | |
"Ephemeral Diffie Hellman key exchange with 6144 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellma | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
n Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "dhe-ffdhe8192" { | |
value 6; | |
description | |
"Ephemeral Diffie Hellman key exchange with 8192 bit | |
finite field"; | |
reference | |
"RFC 7919: | |
Negotiated Finite Field Diffie-Hellman Ephemeral | |
Parameters for Transport Layer Security (TLS)"; | |
} | |
enum "psk-dhe-ffdhe2048" { | |
value 7; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE2048"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe3072" { | |
value 8; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE30 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
72"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe4096" { | |
value 9; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE4096"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe6144" { | |
value 10; | |
description | |
"Key exchange using pre-shared key with Diffie-Hellman | |
key generation mechanism, where the DH group is | |
FFDHE6144"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-dhe-ffdhe8192" { | |
value 11; | |
description | |
"Key exchange using pre-shared key with Diffie-H | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ellman | |
key generation mechanism, where the DH group is | |
FFDHE8192"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "ecdhe-secp256r1" { | |
value 12; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve secp256r1"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "ecdhe-secp384r1" { | |
value 13; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve secp384r1"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
en | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
um "ecdhe-secp521r1" { | |
value 14; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve secp521r1"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "ecdhe-x25519" { | |
value 15; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve x25519"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "ecdhe-x448" { | |
value 16; | |
description | |
"Ephemeral Diffie Hellman key exchange with elliptic | |
group over curve x448"; | |
reference | |
"RFC 8422: | |
Elliptic Curve Cryptography (E | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
CC) Cipher Suites | |
for Transport Layer Security (TLS) Versions 1.2 | |
and Earlier"; | |
} | |
enum "psk-ecdhe-secp256r1" { | |
value 17; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve secp256r1"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-secp384r1" { | |
value 18; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve secp384r1"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-secp521r1" { | |
value 19; | |
description | |
"Key exchange using pre-shared key with elliptic | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve secp521r1"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-x25519" { | |
value 20; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve x25519"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "psk-ecdhe-x448" { | |
value 21; | |
description | |
"Key exchange using pre-shared key with elliptic | |
group-based Ephemeral Diffie Hellman key exchange | |
over curve x448"; | |
reference | |
"RFC 8446: | |
The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
enum "diffie-hellman-group14-sha1" { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 12, head 13, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
value 22; | |
description | |
"Using DH group14 and SHA1 for key exchange"; | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
enum "diffie-hellman-group14-sha256" { | |
value 23; | |
description | |
"Using DH group14 and SHA-256 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group15-sha512" { | |
value 24; | |
description | |
"Using DH group15 and SHA-512 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group16-sha512" { | |
value 25; | |
description | |
"Using DH group16 and SHA-512 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 16, head 14, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group17-sha512" { | |
value 26; | |
description | |
"Using DH group17 and SHA-512 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "diffie-hellman-group18-sha512" { | |
value 27; | |
description | |
"Using DH group18 and SHA-512 for key exchange"; | |
reference | |
"RFC 8268: | |
More Modular Exponentiation (MODP) Diffie-Hellman (DH) | |
Key Exchange (KEX) Groups for Secure Shell (SSH)"; | |
} | |
enum "ecdh-sha2-secp256r1" { | |
value 28; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange ove | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 14, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 17, head 15, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
r | |
curve ecp256r1 and using SHA2 for MAC generation"; | |
reference | |
"RFC 6239: | |
Suite B Cryptographic Suites for Secure Shell (SSH)"; | |
} | |
enum "ecdh-sha2-secp384r1" { | |
value 29; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve ecp384r1 and using SHA2 for MAC generation"; | |
reference | |
"RFC 6239: | |
Suite B Cryptographic Suites for Secure Shell (SSH)"; | |
} | |
enum "ecdh-x25519-x9.63-sha256" { | |
value 30; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using ANSI x9.63 with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-x9.63-sha384" { | |
valu | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 15, head 16, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 18, head 16, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
e 31; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using ANSI x9.63 with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-x9.63-sha512" { | |
value 32; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using ANSI x9.63 with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-hkdf-sha256" { | |
value 33; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and usi | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 19, head 17, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 17, head 18, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ng HKDF with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-hkdf-sha384" { | |
value 34; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using HKDF with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x25519-hkdf-sha512" { | |
value 35; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.25519 and using HKDF with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 18, head 19, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 19, head 14, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-x9.63-sha256" { | |
value 36; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using ANSI x9.63 with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-x9.63-sha384" { | |
value 37; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using ANSI x9.63 with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
48-x9.63-sha512" { | |
value 38; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using ANSI x9.63 with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-hkdf-sha256" { | |
value 39; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using HKDF with SHA256 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-hkdf-sha384" { | |
value 40; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
cur | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ve x.448 and using HKDF with SHA384 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "ecdh-x448-hkdf-sha512" { | |
value 41; | |
description | |
"Elliptic curve-based Diffie Hellman key exchange over | |
curve x.448 and using HKDF with SHA512 as KDF"; | |
reference | |
"RFC 8418: | |
Use of the Elliptic Curve Diffie-Hellman Key Agreement | |
Algorithm with X25519 and X448 in the Cryptographic | |
Message Syntax (CMS)"; | |
} | |
enum "rsaes-oaep" { | |
value 42; | |
description | |
"RSAES-OAEP combines the RSAEP and RSADP primitives with | |
the EME-OAEP encoding method"; | |
reference | |
"RFC 8017: | |
PKCS #1: | |
RSA Cryptography Specifications Version 2.2."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
} | |
enum "rsaes-pkcs1-v1_5" { | |
value 43; | |
description | |
"RSAES-PKCS1-v1_5 combines the RSAEP and RSADP | |
primitives with the EME-PKCS1-v1_5 encoding method"; | |
reference | |
"RFC 8017: | |
PKCS #1: | |
RSA Cryptography Specifications Version 2.2."; | |
} | |
} | |
} | |
default "0"; | |
description | |
"The uint16 filed shall be set by individual protocol | |
families according to the key exchange algorithm value | |
assigned by IANA. The setting is optional and by default | |
is 0. The enumeration filed is set to the selected key | |
exchange algorithm."; | |
} | |
typedef x509 { | |
type binary; | |
description | |
"A Certificate structure, as specified in RFC 5280, | |
encoded using ASN.1 distinguished encoding rules (DER), | |
as specified in ITU-T X.690."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 4, head 19, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
(CRL) Profile | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
typedef crl { | |
type binary; | |
description | |
"A CertificateList structure, as specified in RFC 5280, | |
encoded using ASN.1 distinguished encoding rules (DER), | |
as specified in ITU-T X.690."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List (CRL) Profile | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
typedef cms { | |
type binary; | |
description | |
"A ContentInfo structure, as specified in RFC 5652, | |
encoded using ASN.1 distinguished encoding rules (DER), | |
as specified in ITU- | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
T X.690."; | |
reference | |
"RFC 5652: | |
Cryptographic Message Syntax (CMS) | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
typedef data-content-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
data content type, as described by Section 4 in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef signed-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
signed-data content type, as described by Section 5 in | |
RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef enveloped-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
enveloped-data content type, as described by | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
Section 6 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef digested-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
digested-data content type, as described by Section 7 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef encrypted-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
encrypted-data content type, as described by Section 8 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef authenticated-data-cms { | |
type cms; | |
description | |
"A CMS structure whose top-most content type MUST be the | |
authenticated-data content type, as described by Section 9 | |
in RFC 5652."; | |
reference | |
"RFC 5652: Cryptographic Message Syntax (CMS)"; | |
} | |
typedef ssh-host-key { | |
type binary; | |
description | |
"The | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
binary public key data for this SSH key, as | |
specified by RFC 4253, Section 6.6, i.e.: | |
string certificate or public key format | |
identifier | |
byte[n] key/certificate data."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer | |
Protocol"; | |
} | |
typedef trust-anchor-cert-x509 { | |
type x509; | |
description | |
"A Certificate structure that MUST encode a self-signed | |
root certificate."; | |
} | |
typedef end-entity-cert-x509 { | |
type x509; | |
description | |
"A Certificate structure that MUST encode a certificate | |
that is neither self-signed nor having Basic constraint | |
CA true."; | |
} | |
typedef trust-anchor-cert-cms { | |
type signed-data-cms; | |
description | |
"A CMS SignedData structure that MUST contain the chain of | |
X.509 certificates needed to authenticate the certificate | |
presented by a client or end-entity. | |
The CMS MUST contain only a single chain of certificates. | |
The cli | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 6, head 7, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ent or end-entity certificate MUST only authenticate | |
to last intermediate CA certificate listed in the chain. | |
In all cases, the chain MUST include a self-signed root | |
certificate. In the case where the root certificate is | |
itself the issuer of the client or end-entity certificate, | |
only one certificate is present. | |
This CMS structure MAY (as applicable where this type is | |
used) also contain suitably fresh (as defined by local | |
policy) revocation objects with which the device can | |
verify the revocation status of the certificates. | |
This CMS encodes the degenerate form of the SignedData | |
structure that is commonly used to disseminate X.509 | |
certificates and revocation objects (RFC 5280)."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List (CRL) Profile."; | |
} | |
typedef end-entity-cert-cms { | |
type signed-data-cms; | |
description | |
"A CMS SignedD | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 10, head 7, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 7, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ata structure that MUST contain the end | |
entity certificate itself, and MAY contain any number | |
of intermediate certificates leading up to a trust | |
anchor certificate. The trust anchor certificate | |
MAY be included as well. | |
The CMS MUST contain a single end entity certificate. | |
The CMS MUST NOT contain any spurious certificates. | |
This CMS structure MAY (as applicable where this type is | |
used) also contain suitably fresh (as defined by local | |
policy) revocation objects with which the device can | |
verify the revocation status of the certificates. | |
This CMS encodes the degenerate form of the SignedData | |
structure that is commonly used to disseminate X.509 | |
certificates and revocation objects (RFC 5280)."; | |
reference | |
"RFC 5280: | |
Internet X.509 Public Key Infrastructure Certificate | |
and Certificate Revocation List (CRL) Profile."; | |
} | |
grouping symmetric-key-grouping { | |
description | |
"A symmetric key | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 10, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 11, head 10, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
and algorithm."; | |
leaf algorithm { | |
type encryption-algorithm-t; | |
mandatory true; | |
description | |
"The algorithm to be used when generating the key."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
choice key-type { | |
mandatory true; | |
description | |
"Choice between key types."; | |
leaf key { | |
nacm:default-deny-all; | |
type binary; | |
description | |
"The binary value of the key. The interpretation of | |
the value is defined by 'algorithm'. For example, | |
FIXME."; | |
reference | |
"RFC XXXX: FIXME"; | |
} | |
leaf hidden-key { | |
nacm:default-deny-write; | |
type empty; | |
description | |
"A permanently hidden key. How such keys are created | |
is outside the scope of this module."; | |
} | |
} | |
} | |
grouping public-key-grouping { | |
description | |
"A public key and its associated algorithm."; | |
leaf algorithm { | |
nacm:default-deny-w | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
rite; | |
type asymmetric-key-algorithm-t; | |
mandatory true; | |
description | |
"Identifies the key's algorithm."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
leaf public-key { | |
nacm:default-deny-write; | |
type binary; | |
mandatory true; | |
description | |
"The binary value of the public key. The interpretation | |
of the value is defined by 'algorithm'. For example, | |
a DSA key is an integer, an RSA key is represented as | |
RSAPublicKey per RFC 8017, and an ECC key is represented | |
using the 'publicKey' described in RFC 5915."; | |
reference | |
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1: | |
RSA Cryptography Specifications Version 2.2. | |
RFC 5915: Elliptic Curve Private Key Structure."; | |
} | |
} | |
grouping asymmetric-key-pair-grouping { | |
description | |
"A private key and its associated public key and algorithm."; | |
uses public-key-grouping; | |
choice priva | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
te-key-type { | |
mandatory true; | |
description | |
"Choice between key types."; | |
leaf private-key { | |
nacm:default-deny-all; | |
type binary; | |
description | |
"The value of the binary key. The key's value is | |
interpreted by the 'algorithm'. For example, a DSA key | |
is an integer, an RSA key is represented as RSAPrivateKey | |
as defined in RFC 8017, and an ECC key is represented as | |
ECPrivateKey as defined in RFC 5915."; | |
reference | |
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1: | |
RSA Cryptography Specifications Version 2.2. | |
RFC 5915: Elliptic Curve Private Key Structure."; | |
} | |
leaf hidden-private-key { | |
nacm:default-deny-write; | |
type empty; | |
description | |
"A permanently hidden key. How such keys are created | |
is outside the scope of this module."; | |
} | |
} | |
} | |
grouping trust-anchor-cert-grouping { | |
description | |
"A | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
trust anchor certificate, and a notification for when | |
it is about to (or already has) expire."; | |
leaf cert { | |
nacm:default-deny-write; | |
type trust-anchor-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once a day thereafter until the issue is resolved."; | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the certificate."; | |
} | |
} | |
} | |
grouping trust-anchor-c | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 14, head 15, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 16, head 15, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 17, head 15, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 15, head 16, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
erts-grouping { | |
description | |
"A list of trust anchor certificates, and a notification | |
for when one is about to (or already has) expire."; | |
leaf-list cert { | |
nacm:default-deny-write; | |
type trust-anchor-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once a day thereafter until the issue is resolved."; | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the cert | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 16, head 17, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 18, head 17, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 17, head 18, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
ificate."; | |
} | |
} | |
} | |
grouping end-entity-cert-grouping { | |
description | |
"An end entity certificate, and a notification for when | |
it is about to (or already has) expire. Implementations | |
SHOULD assert that, where used, the end entity certificate | |
contains the expected public key."; | |
leaf cert { | |
nacm:default-deny-write; | |
type end-entity-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once a day thereafter until the issue is resolved."; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 19, head 18, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 20, head 18, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 21, head 18, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 18, head 19, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the certificate."; | |
} | |
} | |
} | |
grouping end-entity-certs-grouping { | |
description | |
"A list of end entity certificates, and a notification for | |
when one is about to (or already has) expire."; | |
leaf-list cert { | |
nacm:default-deny-write; | |
type end-entity-cert-cms; | |
description | |
"The binary certificate data for this certificate."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
notification certificate-expiration { | |
description | |
"A notification indicating that the configured certificate | |
is either about to expire or has already expired. When to | |
send notifications is an implementation specific decision, | |
but it is RECOMMENDED that a notification be sent once a | |
month for 3 months, then once a week for four weeks, and | |
then once | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 19, head 20, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 22, head 20, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
a day thereafter until the issue is resolved."; | |
leaf expiration-date { | |
type yang:date-and-time; | |
mandatory true; | |
description | |
"Identifies the expiration date on the certificate."; | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-cert-grouping { | |
description | |
"A private/public key pair and an associated certificate. | |
Implementations SHOULD assert that certificates contain | |
the matching public key."; | |
uses asymmetric-key-pair-grouping; | |
uses end-entity-cert-grouping; | |
action generate-certificate-signing-request { | |
nacm:default-deny-all; | |
description | |
"Generates a certificate signing request structure for | |
the associated asymmetric key using the passed subject | |
and attribute values. The specified assertions need | |
to be appropriate for the certificate's use. For | |
example, an entity certificate for a TLS server | |
SHOULD have values that enable clients to satisfy | |
RFC 6125 pro | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 20, head 21, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 23, head 21, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 21, head 22, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
cessing."; | |
input { | |
leaf subject { | |
type binary; | |
mandatory true; | |
description | |
"The 'subject' field per the CertificationRequestInfo | |
structure as specified by RFC 2986, Section 4.1 | |
encoded using the ASN.1 distinguished encoding | |
rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
leaf attributes { | |
type binary; | |
description | |
"The 'attributes' field from the structure | |
CertificationRequestInfo as specified by RFC 2986, | |
Section 4.1 encoded using the ASN.1 distingu | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 22, head 23, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 24, head 23, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 25, head 23, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ished | |
encoding rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
output { | |
leaf certificate-signing-request { | |
type binary; | |
mandatory true; | |
description | |
"A CertificationRequest structure as specified by | |
RFC 2986, Section 4.2 encoded using the ASN.1 | |
distinguished encoding rules (DER), as specified | |
in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 23, head 24, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 26, head 24, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-certs-grouping { | |
description | |
"A private/public key pair and associated certificates. | |
Implementations SHOULD assert that certificates contain | |
the matching public key."; | |
uses asymmetric-key-pair-grouping; | |
container certificates { | |
nacm:default-deny-write; | |
description | |
"Certificates associated with this asymmetric key. | |
More than one certificate supports, for instance, | |
a TPM-protected asymmetric key that has both IDevID | |
and LDevID certificates associated."; | |
list certificate { | |
key "name"; | |
description | |
"A certificate for this asymmetric key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 24, head 25, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 25, head 26, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 27, head 26, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
for the certificate. If the name | |
matches the name of a certificate that exists | |
independently in <operational> (i.e., an IDevID), | |
then the 'cert' node MUST NOT be configured."; | |
} | |
uses end-entity-cert-grouping; | |
} | |
} | |
action generate-certificate-signing-request { | |
nacm:default-deny-all; | |
description | |
"Generates a certificate signing request structure for | |
the associated asymmetric key using the passed subject | |
and attribute values. The specified assertions need | |
to be appropriate for the certificate's use. For | |
example, an entity certificate for a TLS server | |
SHOULD have values that enable clients to satisfy | |
RFC 6125 processing."; | |
input { | |
leaf subject { | |
type binary; | |
mandatory true; | |
description | |
"The 'subject' field per the CertificationRequestInfo | |
structure as specified by RFC 2986, Section 4.1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 26, head 27, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 28, head 27, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 29, head 27, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 27, head 28, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
encoded using the ASN.1 distinguished encoding | |
rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
leaf attributes { | |
type binary; | |
description | |
"The 'attributes' field from the structure | |
CertificationRequestInfo as specified by RFC 2986, | |
Section 4.1 encoded using the ASN.1 distinguished | |
encoding rules (DER), as specified in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 30, head 28, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 31, head 28, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1016 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 28, head 29, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
output { | |
leaf certificate-signing-request { | |
type binary; | |
mandatory true; | |
description | |
"A CertificationRequest structure as specified by | |
RFC 2986, Section 4.2 encoded using the ASN.1 | |
distinguished encoding rules (DER), as specified | |
in ITU-T X.690."; | |
reference | |
"RFC 2986: | |
PKCS #10: Certification Request Syntax | |
Specification Version 1.7. | |
ITU-T X.690: | |
Information technology - ASN.1 encoding rules: | |
Specification of Basic Encoding Rules (BER), | |
Canonical Encoding Rules (CER) and Distinguished | |
Encoding Rules (DER)."; | |
} | |
} | |
} | |
} | |
} | |
</data> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 29, head 30, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#12 | |
[DBG]: LN: Session 1: sending message: | |
</rpc-reply> | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 32, head 30, lenght 3 | |
[INF]: NP: Session 1: thread 1 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 33, head 30, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 30, head 31, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 31, head 32, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="9"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-truststore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 32, head 33, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 34, head 33, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-truststore" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 33, head 34, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 34, head 29, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 0, head 0, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="9"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-truststore { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-truststore"; | |
prefix ts; | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
import ietf-crypto-types { | |
prefix ct; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]>"; | |
description | |
"This module defines a truststore to centralize management | |
of trust anchors including both X.509 certificates and | |
SSH host keys. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: A YANG Data Model for a Truststore"; | |
} | |
feature truststore-supported { | |
descriptio | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
n | |
"The 'truststore-supported' feature indicates that the | |
server supports the truststore."; | |
} | |
feature local-definitions-supported { | |
description | |
"The 'local-definitions-supported' feature indicates that | |
the server supports locally-defined trust anchors."; | |
} | |
feature x509-certificates { | |
description | |
"The 'x509-certificates' feature indicates that the server | |
implements the /truststore/certificates subtree."; | |
} | |
feature ssh-host-keys { | |
description | |
"The 'ssh-host-keys' feature indicates that the server | |
implements the /truststore/host-keys subtree."; | |
} | |
typedef certificates-ref { | |
type leafref { | |
path "/ts:truststore/ts:certificates/ts:name"; | |
} | |
description | |
"This typedef enables modules to easily define a reference | |
to a set of certificates defined in the truststore."; | |
} | |
typedef host-keys-ref { | |
type leafref { | |
path "/ts:truststore/ts:host-keys/ts:name"; | |
} | |
description | |
"This typedef e | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 5, head 2, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
nables modules to easily define a reference | |
to a set of host keys defined in the truststore."; | |
} | |
grouping local-or-truststore-certs-grouping { | |
description | |
"A grouping that expands to allow trust anchors to be | |
either stored locally, within the using data model, or be | |
a reference to trust anchors stored in the truststore."; | |
choice local-or-truststore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the truststore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local trust anchor definitions. | |
A list is defined so as to be symmetric with the | |
truststore definition."; | |
uses ct:trust-anchor-certs-grouping; | |
} | |
} | |
case truststore { | |
if-feature "truststore-supported"; | |
if-feature "x509-certificates"; | |
leaf tru | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 2, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ststore-reference { | |
type certificates-ref; | |
description | |
"A reference to a set of trust anchors that exists | |
in the truststore."; | |
} | |
} | |
} | |
} | |
grouping local-or-truststore-host-keys-grouping { | |
description | |
"A grouping that expands to allow trust anchors to be | |
either stored locally, within the using data model, or be | |
a reference to trust anchors stored in the truststore."; | |
choice local-or-truststore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the truststore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local trust anchor definitions. | |
A list is defined so as to be symmetric with the | |
truststore definition."; | |
leaf-list host-key { | |
nacm:default-deny-write; | |
type ct:ssh | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 6, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
-host-key; | |
description | |
"The binary data for this host key."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
uses ct:trust-anchor-certs-grouping; | |
} | |
} | |
case truststore { | |
if-feature "truststore-supported"; | |
if-feature "ssh-host-keys"; | |
leaf truststore-reference { | |
type host-keys-ref; | |
description | |
"A reference to a set of trust anchors that exists | |
in the truststore."; | |
} | |
} | |
} | |
} | |
grouping truststore-grouping { | |
description | |
"Grouping definition enables use in other contexts. If ever | |
done, implementations SHOULD augment new 'case' statements | |
into local-or-keystore 'choice' statements to supply leafrefs | |
to the new location."; | |
list certificates { | |
if-feature "x509-certificates"; | |
key "name"; | |
description | |
"A list of certificates. These certificates can be | |
used | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
by a server to authenticate clients, or by a client | |
to authenticate servers. Each list of certificates | |
SHOULD be specific to a purpose, as the list as a whole | |
may be referenced by other modules. For instance, a | |
RESTCONF server's configuration might use a specific list | |
of certificates for when authenticating RESTCONF | |
client connections."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this list of certificates."; | |
} | |
leaf description { | |
type string; | |
description | |
"An arbitrary description for this list of | |
certificates."; | |
} | |
list certificate { | |
key "name"; | |
description | |
"A certificate."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this certificate. The | |
name must be unique across all lists of | |
certificates (not just this list) so that leafrefs | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 9, head 6, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 6, head 7, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
from another module can resolve to unique values."; | |
} | |
uses ct:trust-anchor-cert-grouping { | |
refine "cert" { | |
mandatory true; | |
} | |
} | |
} | |
} | |
list host-keys { | |
if-feature "ssh-host-keys"; | |
key "name"; | |
description | |
"A list of host keys. These host-keys can | |
be used by clients to authenticate SSH servers. Each | |
list of host keys SHOULD be specific to a purpose, | |
so the list as a whole may be referenced by other modules. | |
For instance, a NETCONF client's configuration might | |
point to a specific list of host keys for when | |
authenticating specific SSH servers."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this list of SSH | |
host keys."; | |
} | |
leaf description { | |
type string; | |
description | |
"An arbitrary description for this list of SSH | |
host keys."; | |
} | |
list host-key { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 8, head 9, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 10, head 9, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#859 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
key "name"; | |
description | |
"A host key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this host-key. Must be | |
unique across all lists of host-keys (not just | |
this list) so that a leafref to it from another module | |
can resolve to unique values."; | |
} | |
leaf host-key { | |
type ct:ssh-host-key; | |
mandatory true; | |
description | |
"The binary public key data for this host key."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
} | |
} | |
} | |
container truststore { | |
nacm:default-deny-write; | |
description | |
"The truststore contains sets of X.509 certificates and | |
SSH host keys."; | |
uses truststore-grouping; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 12, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[INF]: NP: Session 1: thread 0 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 14, head 11, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 11, head 12, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="10"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 13, head 14, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-tcp-common" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 14, head 9, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="10"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-common { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-common"; | |
prefix tcpcmn; | |
organization | |
"IETF NETCONF (Network Configuration) Working Group and the | |
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
<http://datatracker.ietf.org/wg/tcpm/> | |
WG List: <mailto:[email protected]> | |
<mailto:[email protected]> | |
Authors: Kent Watsen <mailto:[email protected]> | |
Michael Scharf | |
<mailto:[email protected]>"; | |
description | |
"This module defines reusable groupings for TCP commons that | |
can be used as a basis for specific TCP common instances. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
feature keepalives-s | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
upported { | |
description | |
"Indicates that keepalives are supported."; | |
} | |
grouping tcp-common-grouping { | |
description | |
"A reusable grouping for configuring TCP parameters common | |
to TCP connections as well as the operating system as a | |
whole."; | |
container keepalives { | |
if-feature "keepalives-supported"; | |
presence "Indicates that keepalives are enabled."; | |
description | |
"Configures the keep-alive policy, to proactively test the | |
aliveness of the TCP peer. An unresponsive TCP peer is | |
dropped after approximately (idle-time * 60) + (max-probes | |
* probe-interval) seconds."; | |
leaf idle-time { | |
type uint16 { | |
range "1..max"; | |
} | |
units "seconds"; | |
mandatory true; | |
description | |
"Sets the amount of time after which if no data has been | |
received from the TCP peer, a TCP-level probe message | |
will be sent to test the aliveness of the TCP peer."; | |
} | |
leaf m | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#751 | |
[DBG]: LN: Session 1: sending message: | |
ax-probes { | |
type uint16 { | |
range "1..max"; | |
} | |
mandatory true; | |
description | |
"Sets the maximum number of sequential keep-alive probes | |
that can fail to obtain a response from the TCP peer | |
before assuming the TCP peer is no longer alive."; | |
} | |
leaf probe-interval { | |
type uint16 { | |
range "1..max"; | |
} | |
units "seconds"; | |
mandatory true; | |
description | |
"Sets the time interval between failed probes."; | |
} | |
} | |
} | |
grouping tcp-connection-grouping { | |
description | |
"A reusable grouping for configuring TCP parameters common | |
to TCP connections."; | |
uses tcp-common-grouping; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 4, lenght 3 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="11"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-ssh-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 8, head 6, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-ssh-server" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 9, head 6, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 7, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 7, head 8, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 8, head 9, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="11"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-ssh-server { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-ssh-server"; | |
prefix sshs; | |
import ietf-ssh-common { | |
prefix sshcmn; | |
revision-date 2019-07-02; | |
reference | |
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers"; | |
} | |
import ietf-keystore { | |
prefix ks; | |
reference | |
"RFC ZZZZ: A YANG Data Model for a Keystore"; | |
} | |
import iana-crypt-hash { | |
prefix ianach; | |
reference | |
"RFC 7317: A YANG Data Model for System Management"; | |
} | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:kent+ietf@ | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 9, head 4, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
watsen.net> | |
Author: Gary Wu <mailto:[email protected]>"; | |
description | |
"This module defines reusable groupings for SSH servers that | |
can be used as a basis for specific SSH server instances. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be int | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
erpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers"; | |
} | |
feature ssh-server-transport-params-config { | |
description | |
"SSH transport layer parameters are configurable on an SSH | |
server."; | |
} | |
feature ssh-server-keepalives { | |
description | |
"Per socket SSH keepalive parameters are configurable for | |
SSH servers on the server implementing this feature."; | |
} | |
feature local-client-auth-supported { | |
description | |
"Indicates that the SSH server supports local configuration | |
of client credentials."; | |
} | |
feature external-client-auth-supported { | |
description | |
"Indicates that the SSH server supports external configuration | |
of client credentials."; | |
} | |
grouping ssh-server-grouping { | |
description | |
"A reusable grouping for configu | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 5, head 2, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ring a SSH server without | |
any consideration for how underlying TCP sessions are | |
established. | |
Note that this grouping uses fairly typical descendent | |
node names such that a stack of 'uses' statements will | |
have name conflicts. It is intended that the consuming | |
data model will resolve the issue (e.g., by wrapping | |
the 'uses' statement in a container called | |
'ssh-server-parameters'). This model purposely does | |
not do this itself so as to provide maximum flexibility | |
to consuming models."; | |
container server-identity { | |
nacm:default-deny-write; | |
description | |
"The list of host-keys the SSH server will present when | |
establishing a SSH connection."; | |
list host-key { | |
key "name"; | |
min-elements 1; | |
ordered-by user; | |
description | |
"An ordered list of host keys the SSH server will use to | |
construct its ordered list of algorithms, when sending | |
its SSH_MSG_KEXINIT mess | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
age, as defined in Section 7.1 | |
of RFC 4253."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer | |
Protocol"; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this host-key"; | |
} | |
choice host-key-type { | |
mandatory true; | |
description | |
"The type of host key being specified"; | |
container public-key { | |
description | |
"A locally-defined or referenced asymmetric key pair | |
to be used for the SSH server's host key."; | |
reference | |
"RFC ZZZZ: YANG Data Model for a Centralized | |
Keystore Mechanism"; | |
uses ks:local-or-keystore-asymmetric-key-grouping; | |
} | |
container certificate { | |
if-feature "sshcmn:ssh-x509-certs"; | |
description | |
"A locally-defined or referenced end-entity | |
certificate to be used for the SSH | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
server's | |
host key."; | |
reference | |
"RFC ZZZZ: YANG Data Model for a Centralized | |
Keystore Mechanism"; | |
uses ks:local-or-keystore-end-entity-cert-with-key-grouping; | |
} | |
} | |
} | |
} | |
container client-authentication { | |
nacm:default-deny-write; | |
description | |
"Specifies if SSH client authentication is required or | |
optional, and specifies if the SSH client authentication | |
credentials are configured locally or externally."; | |
container supported-authentication-methods { | |
description | |
"Indicates which authentication methods the server | |
supports."; | |
leaf publickey { | |
type empty; | |
description | |
"Indicates that the 'publickey' method is supported. | |
Note that RFC 6187 X.509v3 Certificates for SSH uses | |
the 'publickey' method name."; | |
reference | |
"RFC 4252: The Secure Shell (SSH) Authenti | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
cation | |
Protocol. | |
RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication."; | |
} | |
leaf passsword { | |
type empty; | |
description | |
"Indicates that the 'password' method is supported."; | |
reference | |
"RFC 4252: The Secure Shell (SSH) Authentication | |
Protocol."; | |
} | |
leaf hostbased { | |
type empty; | |
description | |
"Indicates that the 'hostbased' method is supported."; | |
reference | |
"RFC 4252: The Secure Shell (SSH) Authentication | |
Protocol."; | |
} | |
leaf none { | |
type empty; | |
description | |
"Indicates that the 'none' method is supported."; | |
reference | |
"RFC 4252: The Secure Shell (SSH) Authentication | |
Protocol."; | |
} | |
leaf-list other { | |
type string; | |
description | |
"Indicates | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
a supported method name not defined by | |
RFC 4253."; | |
reference | |
"RFC 4252: The Secure Shell (SSH) Authentication | |
Protocol."; | |
} | |
} | |
choice local-or-external { | |
mandatory true; | |
description | |
"Indicates if the client credentials are configured | |
locally or externally."; | |
case local { | |
if-feature "local-client-auth-supported"; | |
description | |
"Client credentials are configured locally."; | |
container users { | |
description | |
"A list of locally configured users."; | |
list user { | |
key "name"; | |
description | |
"The list of local users configured on this device."; | |
leaf name { | |
type string; | |
description | |
"The user name string identifying this entry."; | |
} | |
leaf password { | |
type ianach:crypt-hash; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"The password for this entry."; | |
} | |
list authorized-key { | |
key "name"; | |
description | |
"A list of public SSH keys for this user. These | |
keys are allowed for SSH authentication, as | |
described in RFC 4253."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer | |
Protocol"; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the SSH key."; | |
} | |
leaf algorithm { | |
type string; | |
mandatory true; | |
description | |
"The public key algorithm name for this SSH key. | |
Valid values are the values in the IANA 'Secure | |
Shell (SSH) Protocol Parameters' registry, | |
Public Key Algorithm | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 12, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
Names."; | |
reference | |
"IANA 'Secure Shell (SSH) Protocol Parameters' | |
registry, Public Key Algorithm Names"; | |
} | |
leaf key-data { | |
type binary; | |
mandatory true; | |
description | |
"The binary public key data for this SSH key, as | |
specified by RFC 4253, Section 6.6, i.e.: | |
string certificate or public key format | |
identifier | |
byte[n] key/certificate data."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer | |
Protocol"; | |
} | |
} | |
} | |
} | |
} | |
case external { | |
if-feature "external-client-auth-supported"; | |
description | |
"Client credentials are configured externally, such | |
as via RADIUS, RFC 7317, | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 12, head 13, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
or another mechanism."; | |
leaf client-auth-defined-elsewhere { | |
type empty; | |
description | |
"Indicates that client credentials are configured | |
elsewhere."; | |
} | |
} | |
} | |
} | |
container transport-params { | |
nacm:default-deny-write; | |
if-feature "ssh-server-transport-params-config"; | |
description | |
"Configurable parameters of the SSH transport layer."; | |
uses sshcmn:transport-params-grouping; | |
} | |
container keepalives { | |
nacm:default-deny-write; | |
if-feature "ssh-server-keepalives"; | |
presence "Indicates that keepalives are enabled."; | |
description | |
"Configures the keep-alive policy, to proactively test | |
the aliveness of the SSL client. An unresponsive SSL | |
client is dropped after approximately max-wait * | |
max-attempts seconds."; | |
leaf max-wait { | |
type uint16 { | |
range "1..max"; | |
} | |
units "seconds"; | |
default "30"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 16, head 14, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#578 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 14, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Sets the amount of time in seconds after which | |
if no data has been received from the SSL client, | |
a SSL-level message will be sent to test the | |
aliveness of the SSL client."; | |
} | |
leaf max-attempts { | |
type uint8; | |
default "3"; | |
description | |
"Sets the maximum number of sequential keep-alive | |
messages that can fail to obtain a response from | |
the SSL client before assuming the SSL client is | |
no longer alive."; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 15, head 16, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 17, head 16, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 18, head 16, lenght 3 | |
[INF]: NP: Session 1: thread 4 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 19, head 17, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 17, head 18, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="12"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-ssh-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 18, head 19, lenght 1 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 20, head 19, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 19, head 20, lenght 1 | |
[INF]: LN: Schema "ietf-ssh-common" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 21, head 20, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 20, head 21, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 21, head 16, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="12"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-ssh-common { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-ssh-common"; | |
prefix sshcmn; | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]> | |
Author: Gary Wu <mailto:[email protected]>"; | |
description | |
"This module defines a common features, identities, and | |
groupings for Secure Shell (SSH). | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 3, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers"; | |
} | |
feature ssh-ecc { | |
description | |
"Elliptic Curve Cryptography is supported for SSH."; | |
reference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
feature ssh-x509-certs { | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 21, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
"X.509v3 certificates are supported for SSH per RFC 6187."; | |
reference | |
"RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication"; | |
} | |
feature ssh-dh-group-exchange { | |
description | |
"Diffie-Hellman Group Exchange is supported for SSH."; | |
reference | |
"RFC 4419: Diffie-Hellman Group Exchange for the | |
Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
feature ssh-ctr { | |
description | |
"SDCTR encryption mode is supported for SSH."; | |
reference | |
"RFC 4344: The Secure Shell (SSH) Transport Layer | |
Encryption Modes"; | |
} | |
feature ssh-sha2 { | |
description | |
"The SHA2 family of cryptographic hash functions is | |
supported for SSH."; | |
reference | |
"FIPS PUB 180-4: Secure Hash Standard (SHS)"; | |
} | |
identity public-key-alg-base { | |
description | |
"Base identity used to identify public key algorithms."; | |
} | |
identity ssh-dss { | |
base public-key-alg-base; | |
description | |
"Digital Signature | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 3, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
Algorithm using SHA-1 as the | |
hashing algorithm."; | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity ssh-rsa { | |
base public-key-alg-base; | |
description | |
"RSASSA-PKCS1-v1_5 signature scheme using SHA-1 as the | |
hashing algorithm."; | |
reference | |
"RFC 4253: | |
The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity ecdsa-sha2-nistp256 { | |
if-feature "ssh-ecc and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"Elliptic Curve Digital Signature Algorithm (ECDSA) using the | |
nistp256 curve and the SHA2 family of hashing algorithms."; | |
reference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
identity ecdsa-sha2-nistp384 { | |
if-feature "ssh-ecc and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"Elliptic Curve Digital Signature Algorithm (ECDSA) using the | |
nistp384 curve and the SHA2 family of hashing a | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
lgorithms."; | |
reference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
identity ecdsa-sha2-nistp521 { | |
if-feature "ssh-ecc and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"Elliptic Curve Digital Signature Algorithm (ECDSA) using the | |
nistp521 curve and the SHA2 family of hashing algorithms."; | |
reference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
identity x509v3-ssh-rsa { | |
if-feature "ssh-x509-certs"; | |
base public-key-alg-base; | |
description | |
"RSASSA-PKCS1-v1_5 signature scheme using a public key stored | |
in an X.509v3 certificate and using SHA-1 as the hashing | |
algorithm."; | |
reference | |
"RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication"; | |
} | |
identity x509v3-rsa2048-sha256 { | |
if-feature "ssh-x509-certs and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"R | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
SASSA-PKCS1-v1_5 signature scheme using a public key stored | |
in an X.509v3 certificate and using SHA-256 as the hashing | |
algorithm. RSA keys conveyed using this format MUST have a | |
modulus of at least 2048 bits."; | |
reference | |
"RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication"; | |
} | |
identity x509v3-ecdsa-sha2-nistp256 { | |
if-feature "ssh-ecc and ssh-x509-certs and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"Elliptic Curve Digital Signature Algorithm (ECDSA) | |
using the nistp256 curve with a public key stored in | |
an X.509v3 certificate and using the SHA2 family of | |
hashing algorithms."; | |
reference | |
"RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication"; | |
} | |
identity x509v3-ecdsa-sha2-nistp384 { | |
if-feature "ssh-ecc and ssh-x509-certs and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"Elliptic Curve Digital Signature Algorithm (ECDSA) | |
using the nistp3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
84 curve with a public key stored in | |
an X.509v3 certificate and using the SHA2 family of | |
hashing algorithms."; | |
reference | |
"RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication"; | |
} | |
identity x509v3-ecdsa-sha2-nistp521 { | |
if-feature "ssh-ecc and ssh-x509-certs and ssh-sha2"; | |
base public-key-alg-base; | |
description | |
"Elliptic Curve Digital Signature Algorithm (ECDSA) | |
using the nistp521 curve with a public key stored in | |
an X.509v3 certificate and using the SHA2 family of | |
hashing algorithms."; | |
reference | |
"RFC 6187: X.509v3 Certificates for Secure Shell | |
Authentication"; | |
} | |
identity key-exchange-alg-base { | |
description | |
"Base identity used to identify key exchange algorithms."; | |
} | |
identity diffie-hellman-group14-sha1 { | |
base key-exchange-alg-base; | |
description | |
"Diffie-Hellman key exchange with SHA-1 as HASH and | |
Oakley Group 14 (2048-bit MODP Group)."; | |
reference | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 7, head 8, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 9, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity diffie-hellman-group-exchange-sha1 { | |
if-feature "ssh-dh-group-exchange"; | |
base key-exchange-alg-base; | |
description | |
"Diffie-Hellman Group and Key Exchange with SHA-1 as HASH."; | |
reference | |
"RFC 4419: Diffie-Hellman Group Exchange for the | |
Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity diffie-hellman-group-exchange-sha256 { | |
if-feature "ssh-dh-group-exchange and ssh-sha2"; | |
base key-exchange-alg-base; | |
description | |
"Diffie-Hellman Group and Key Exchange with SHA-256 as HASH."; | |
reference | |
"RFC 4419: Diffie-Hellman Group Exchange for the | |
Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity ecdh-sha2-nistp256 { | |
if-feature "ssh-ecc and ssh-sha2"; | |
base key-exchange-alg-base; | |
description | |
"Elliptic Curve Diffie-Hellman (ECDH) key exchange using the | |
nistp256 curve and the SHA2 family of hashing algorithms."; | |
r | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
eference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
identity ecdh-sha2-nistp384 { | |
if-feature "ssh-ecc and ssh-sha2"; | |
base key-exchange-alg-base; | |
description | |
"Elliptic Curve Diffie-Hellman (ECDH) key exchange using the | |
nistp384 curve and the SHA2 family of hashing algorithms."; | |
reference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
identity ecdh-sha2-nistp521 { | |
if-feature "ssh-ecc and ssh-sha2"; | |
base key-exchange-alg-base; | |
description | |
"Elliptic Curve Diffie-Hellman (ECDH) key exchange using the | |
nistp521 curve and the SHA2 family of hashing algorithms."; | |
reference | |
"RFC 5656: Elliptic Curve Algorithm Integration in the | |
Secure Shell Transport Layer"; | |
} | |
identity encryption-alg-base { | |
description | |
"Base identity used to identify encryption algorithms."; | |
} | |
identity triple-des- | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
cbc { | |
base encryption-alg-base; | |
description | |
"Three-key 3DES in CBC mode."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity aes128-cbc { | |
base encryption-alg-base; | |
description | |
"AES in CBC mode, with a 128-bit key."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity aes192-cbc { | |
base encryption-alg-base; | |
description | |
"AES in CBC mode, with a 192-bit key."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity aes256-cbc { | |
base encryption-alg-base; | |
description | |
"AES in CBC mode, with a 256-bit key."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity aes128-ctr { | |
if-feature "ssh-ctr"; | |
base encryption-alg-base; | |
description | |
"AES in SDCTR mode, with 128-bit key."; | |
reference | |
"RFC 4344: The Secure Shell (SSH) Transport Layer Encryption | |
Mod | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
es"; | |
} | |
identity aes192-ctr { | |
if-feature "ssh-ctr"; | |
base encryption-alg-base; | |
description | |
"AES in SDCTR mode, with 192-bit key."; | |
reference | |
"RFC 4344: The Secure Shell (SSH) Transport Layer Encryption | |
Modes"; | |
} | |
identity aes256-ctr { | |
if-feature "ssh-ctr"; | |
base encryption-alg-base; | |
description | |
"AES in SDCTR mode, with 256-bit key."; | |
reference | |
"RFC 4344: The Secure Shell (SSH) Transport Layer Encryption | |
Modes"; | |
} | |
identity mac-alg-base { | |
description | |
"Base identity used to identify message authentication | |
code (MAC) algorithms."; | |
} | |
identity hmac-sha1 { | |
base mac-alg-base; | |
description | |
"HMAC-SHA1"; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity hmac-sha2-256 { | |
if-feature "ssh-sha2"; | |
base mac-alg-base; | |
description | |
"HMAC-SHA2-256"; | |
reference | |
"RFC 6668: SHA-2 Data Integrity Verification for the | |
Sec | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ure Shell (SSH) Transport Layer Protocol"; | |
} | |
identity hmac-sha2-512 { | |
if-feature "ssh-sha2"; | |
base mac-alg-base; | |
description | |
"HMAC-SHA2-512"; | |
reference | |
"RFC 6668: SHA-2 Data Integrity Verification for the | |
Secure Shell (SSH) Transport Layer Protocol"; | |
} | |
grouping transport-params-grouping { | |
description | |
"A reusable grouping for SSH transport parameters."; | |
reference | |
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol"; | |
container host-key { | |
description | |
"Parameters regarding host key."; | |
leaf-list host-key-alg { | |
type identityref { | |
base public-key-alg-base; | |
} | |
ordered-by user; | |
description | |
"Acceptable host key algorithms in order of descending | |
preference. The configured host key algorithms should | |
be compatible with the algorithm used by the configured | |
private key. Please see Section 5 of RFC XXXX for | |
valid combinations. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 13, head 14, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 15, head 14, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 16, head 14, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 14, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
If this leaf-list is not configured (has zero elements) | |
the acceptable host key algorithms are implementation- | |
defined."; | |
reference | |
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers"; | |
} | |
} | |
container key-exchange { | |
description | |
"Parameters regarding key exchange."; | |
leaf-list key-exchange-alg { | |
type identityref { | |
base key-exchange-alg-base; | |
} | |
ordered-by user; | |
description | |
"Acceptable key exchange algorithms in order of descending | |
preference. | |
If this leaf-list is not configured (has zero elements) | |
the acceptable key exchange algorithms are implementation | |
defined."; | |
} | |
} | |
container encryption { | |
description | |
"Parameters regarding encryption."; | |
leaf-list encryption-alg { | |
type identityref { | |
base encryption-alg-base; | |
} | |
ordered-by user; | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 15, head 16, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 17, head 16, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 18, head 16, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#767 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 17, head 18, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
"Acceptable encryption algorithms in order of descending | |
preference. | |
If this leaf-list is not configured (has zero elements) | |
the acceptable encryption algorithms are implementation | |
defined."; | |
} | |
} | |
container mac { | |
description | |
"Parameters regarding message authentication code (MAC)."; | |
leaf-list mac-alg { | |
type identityref { | |
base mac-alg-base; | |
} | |
ordered-by user; | |
description | |
"Acceptable MAC algorithms in order of descending | |
preference. | |
If this leaf-list is not configured (has zero elements) | |
the acceptable MAC algorithms are implementation- | |
defined."; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 18, head 13, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 2, head 0, lenght 3 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="13"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-keystore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-keystore" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 3, head 4, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 4, head 18, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="13"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-keystore { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-keystore"; | |
prefix ks; | |
import ietf-crypto-types { | |
prefix ct; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]>"; | |
description | |
"This module defines a keystore to centralize management | |
of security credentials. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and bi | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
nary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC VVVV: A YANG Data Model for a Keystore"; | |
} | |
feature keystore-supported { | |
description | |
"The 'keystore-supported' feature indicates that th | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
e server | |
supports the keystore."; | |
} | |
feature local-definitions-supported { | |
description | |
"The 'local-definitions-supported' feature indicates that the | |
server supports locally-defined keys."; | |
} | |
feature key-generation { | |
description | |
"Indicates that the server supports the actions related to | |
the life cycling keys in <operational>. To be used by | |
configuration, keys in <operational> must be copied to | |
<running>."; | |
} | |
typedef asymmetric-key-ref { | |
type leafref { | |
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name"; | |
} | |
description | |
"This typedef enables modules to easily define a reference | |
to an asymmetric key stored in the keystore."; | |
} | |
grouping key-reference-type-grouping { | |
description | |
"A reusable grouping for a choice for the type of key | |
referenced in the keystore."; | |
choice key-type { | |
mandatory true; | |
description | |
"A choice between a reference to a | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
symmetric or asymmetric | |
key in the keystore."; | |
leaf symmetric-key-ref { | |
if-feature "keystore-supported"; | |
type leafref { | |
path "/ks:keystore/ks:symmetric-keys/ks:symmetric-key/ks:name"; | |
} | |
description | |
"Identifies a symmetric key used to encrypt this key."; | |
} | |
leaf asymmetric-key-ref { | |
if-feature "keystore-supported"; | |
type leafref { | |
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name"; | |
} | |
description | |
"Identifies an asymmetric key used to encrypt this key."; | |
} | |
} | |
} | |
grouping encrypted-value-grouping { | |
description | |
"A reusable grouping for a value that has been encrypted by | |
a symmetric or asymmetric key in the keystore."; | |
uses key-reference-type-grouping; | |
leaf value { | |
type binary; | |
description | |
"The private key, encrypted using the specified symmetric | |
or asymmetric key."; | |
} | |
} | |
grouping symmetric-key-grou | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:symmetric-key-grouping { | |
augment "key-type" { | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-key { | |
description | |
"A container for the encrypted symmetric key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-grouping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:asymmetric-key-pair-grouping { | |
augment "private-key-type" { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-private-key { | |
description | |
"A container for the encrypted asymmetric private | |
key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-cert-grouping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:asymmetric-key-pair-with-cert-grouping { | |
augment "private-key-type" { | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-private-key { | |
description | |
"A container for the encrypted asymmetric private | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 6, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-pair-with-certs-grouping { | |
description | |
"This grouping is identical to the one in ietf-crypt-types | |
except that it adds a couple case statements enabling the | |
key value to be encrypted by a symmetric or an asymmetric | |
key known to the keystore."; | |
uses ct:asymmetric-key-pair-with-certs-grouping { | |
augment "private-key-type" { | |
description | |
"Augments a new 'case' statement into the 'choice' | |
statement defined by the ietf-crypto-types module."; | |
container encrypted-private-key { | |
description | |
"A container for the encrypted asymmetric private | |
key value."; | |
uses encrypted-value-grouping; | |
} | |
} | |
} | |
} | |
grouping asymmetric-key-certificate-ref-grouping { | |
description | |
"This grouping defines a reference to a specific certificate | |
associated with an asymmetric | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 6, head 7, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
key stored in the keystore."; | |
leaf asymmetric-key { | |
type asymmetric-key-ref; | |
must "../certificate"; | |
description | |
"A reference to an asymmetric key in the keystore."; | |
} | |
leaf certificate { | |
type leafref { | |
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key[ks:name = current()/../asymmetric-key]/ks:certificates/ks:certificate/ks:name"; | |
} | |
must "../asymmetric-key"; | |
description | |
"A reference to a specific certificate of the | |
asymmetric key in the keystore."; | |
} | |
} | |
grouping local-or-keystore-asymmetric-key-grouping { | |
description | |
"A grouping that expands to allow the asymmetric key to be | |
either stored locally, within the using data model, or be | |
a reference to an asymmetric key stored in the keystore."; | |
choice local-or-keystore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the keystore."; | |
case local { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local key definition."; | |
uses asymmetric-key-pair-grouping; | |
} | |
} | |
case keystore { | |
if-feature "keystore-supported"; | |
leaf keystore-reference { | |
type asymmetric-key-ref; | |
description | |
"A reference to an asymmetric key that exists in | |
the keystore. The intent is to reference just the | |
asymmetric key, not any certificates that may also | |
be associated with the asymmetric key."; | |
} | |
} | |
} | |
} | |
grouping local-or-keystore-asymmetric-key-with-certs-grouping { | |
description | |
"A grouping that expands to allow an asymmetric key and its | |
associated certificates to be either stored locally, within | |
the using data model, or be a reference to an asymmetric key | |
(and its associated certificates) stored in the keystore."; | |
choice local-or-ke | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ystore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the keystore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local key definition."; | |
uses asymmetric-key-pair-with-certs-grouping; | |
} | |
} | |
case keystore { | |
if-feature "keystore-supported"; | |
leaf keystore-reference { | |
type asymmetric-key-ref; | |
description | |
"A reference to an asymmetric-key (and all of its | |
associated certificates) in the keystore."; | |
} | |
} | |
} | |
} | |
grouping local-or-keystore-end-entity-cert-with-key-grouping { | |
description | |
"A grouping that expands to allow an end-entity certificate | |
(and its associated private key) to be either stored locally, | |
within the using data model, or be a reference to a specific | |
certificate in | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
the keystore."; | |
choice local-or-keystore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the keystore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local key definition."; | |
uses asymmetric-key-pair-with-cert-grouping; | |
} | |
} | |
case keystore { | |
if-feature "keystore-supported"; | |
container keystore-reference { | |
description | |
"A reference to a specific certificate (and its | |
associated private key) in the keystore."; | |
uses asymmetric-key-certificate-ref-grouping; | |
} | |
} | |
} | |
} | |
grouping keystore-grouping { | |
description | |
"Grouping definition enables use in other contexts. If ever | |
done, implementations SHOULD augment new 'case' statements | |
into local-or-keystore 'choice' statements to supply leafre | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 11, head 12, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 13, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
fs | |
to the new location."; | |
container asymmetric-keys { | |
description | |
"A list of asymmetric keys."; | |
list asymmetric-key { | |
key "name"; | |
description | |
"An asymmetric key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the asymmetric key."; | |
} | |
uses ks:asymmetric-key-pair-with-certs-grouping; | |
} | |
} | |
container symmetric-keys { | |
description | |
"A list of symmetric keys."; | |
list symmetric-key { | |
key "name"; | |
description | |
"A symmetric key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the symmetric key."; | |
} | |
uses ks:symmetric-key-grouping; | |
} | |
} | |
} | |
container keystore { | |
nacm:default-deny-write; | |
description | |
"The keystore contains a list of keys."; | |
uses keystore-grouping; | |
} | |
rpc generate-symmetric-key { | |
description | |
"Requests the device to | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
generate an symmetric key using | |
the specified key algorithm, optionally encrypted using | |
a key in the keystore. The output is this RPC can be | |
used as input to a subsequent configuration request."; | |
input { | |
leaf algorithm { | |
type ct:encryption-algorithm-t; | |
mandatory true; | |
description | |
"The algorithm to be used when generating the key."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
container encrypt-with { | |
presence "Indicates that the key should be encrypted using | |
the specified symmetric or asymmetric key. If not | |
specified, then the private key is not encrypted | |
when returned."; | |
description | |
"A container for the 'key-type' choice."; | |
uses key-reference-type-grouping; | |
} | |
} | |
output { | |
uses ks:symmetric-key-grouping; | |
} | |
} | |
rpc generate-asymmetric-key { | |
description | |
"Requests the device to generate an asymmetric | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 16, head 14, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#932 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 14, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
key using | |
the specified key algorithm, optionally encrypted using | |
a key in the keystore. The output is this RPC can be | |
used as input to a subsequent configuration request."; | |
input { | |
leaf algorithm { | |
type ct:asymmetric-key-algorithm-t; | |
mandatory true; | |
description | |
"The algorithm to be used when generating the key."; | |
reference | |
"RFC CCCC: Common YANG Data Types for Cryptography"; | |
} | |
container encrypt-with { | |
presence "Indicates that the key should be encrypted using | |
the specified symmetric or asymmetric key. If not | |
specified, then the private key is not encrypted | |
when returned."; | |
description | |
"A container for the 'key-type' choice."; | |
uses key-reference-type-grouping; | |
} | |
} | |
output { | |
uses ks:asymmetric-key-pair-grouping; | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 15, head 16, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 17, head 16, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 18, head 16, lenght 3 | |
[INF]: NP: Session 1: thread 1 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 19, head 16, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 16, head 17, lenght 3 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="14"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>iana-crypt-hash</identifier><version>2014-08-06</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 20, head 17, lenght 4 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "iana-crypt-hash" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 17, head 18, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 18, head 19, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="14"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module iana-crypt-hash { | |
namespace "urn:ietf:params:xml:ns:yang:iana-crypt-hash"; | |
prefix ianach; | |
organization | |
"IANA"; | |
contact | |
" Internet Assigned Numbers Authority | |
Postal: ICANN | |
12025 Waterfront Drive, Suite 300 | |
Los Angeles, CA 90094-2536 | |
United States | |
Tel: +1 310 301 5800 | |
E-Mail: [email protected]>"; | |
description | |
"This YANG module defines a type for storing passwords | |
using a hash function and features to indicate which hash | |
functions are supported by an implementation. | |
The latest revision of this YANG module can be obtained from | |
the IANA web site. | |
Requests for new values should be made to IANA via | |
email ([email protected]). | |
Copyright (c) 2014 IETF Trust and the persons identified as | |
authors of the code. All rights reserved. | |
Redistribution | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 19, head 20, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 21, head 20, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
and use in source and binary forms, with or | |
without modification, is permitted pursuant to, and subject | |
to the license terms contained in, the Simplified BSD License | |
set forth in Section 4.c of the IETF Trust's Legal Provisions | |
Relating to IETF Documents | |
(http://trustee.ietf.org/license-info). | |
The initial version of this YANG module is part of RFC 7317; | |
see the RFC itself for full legal notices."; | |
revision 2014-08-06 { | |
description | |
"Initial revision."; | |
reference | |
"RFC 7317: A YANG Data Model for System Management"; | |
} | |
feature crypt-hash-md5 { | |
description | |
"Indicates that the device supports the MD5 | |
hash function in 'crypt-hash' values."; | |
reference | |
"RFC 1321: The MD5 Message-Digest Algorithm"; | |
} | |
feature crypt-hash-sha-256 { | |
description | |
"Indicates that the device supports the SHA-256 | |
hash function in 'crypt-hash' values."; | |
reference | |
"FIPS.180-4.2012: Secure Hash Standard (SHS)"; | |
} | |
feature | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 22, head 20, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 23, head 20, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 20, head 21, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
crypt-hash-sha-512 { | |
description | |
"Indicates that the device supports the SHA-512 | |
hash function in 'crypt-hash' values."; | |
reference | |
"FIPS.180-4.2012: Secure Hash Standard (SHS)"; | |
} | |
typedef crypt-hash { | |
type string { | |
pattern "$0$.*|$1$[a-zA-Z0-9./]{1,8}$[a-zA-Z0-9./]{22}|$5$(rounds=\\d+$)?[a-zA-Z0-9./]{1,16}$[a-zA-Z0-9./]{43}|$6$(rounds=\\d+$)?[a-zA-Z0-9./]{1,16}$[a-zA-Z0-9./]{86}"; | |
} | |
description | |
"The crypt-hash type is used to store passwords using | |
a hash function. The algorithms for applying the hash | |
function and encoding the result are implemented in | |
various UNIX systems as the function crypt(3). | |
A value of this type matches one of the forms: | |
$0$<clear text password> | |
$<id>$<salt>$<password hash> | |
$<id>$<parameter>$<salt>$<password hash> | |
The '$0$' prefix signals that the value is clear text. When | |
such a value is received by the server | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 21, head 22, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 22, head 23, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
, a hash value is | |
calculated, and the string '$<id>$<salt>$' or | |
$<id>$<parameter>$<salt>$ is prepended to the result. This | |
value is stored in the configuration data store. | |
If a value starting with '$<id>$', where <id> is not '0', is | |
received, the server knows that the value already represents a | |
hashed value and stores it 'as is' in the data store. | |
When a server needs to verify a password given by a user, it | |
finds the stored password hash string for that user, extracts | |
the salt, and calculates the hash with the salt and given | |
password as input. If the calculated hash value is the same | |
as the stored value, the password given by the client is | |
accepted. | |
This type defines the following hash functions: | |
id | hash function | feature | |
---+---------------+------------------- | |
1 | MD5 | crypt-hash-md5 | |
5 | SHA-256 | crypt-hash-sha-256 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 24, head 23, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#360 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 23, head 24, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
6 | SHA-512 | crypt-hash-sha-512 | |
The server indicates support for the different hash functions | |
by advertising the corresponding feature."; | |
reference | |
"IEEE Std 1003.1-2008 - crypt() function | |
RFC 1321: The MD5 Message-Digest Algorithm | |
FIPS.180-4.2012: Secure Hash Standard (SHS)"; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 25, head 24, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 26, head 24, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 24, head 25, lenght 2 | |
[INF]: NP: Session 1: thread 3 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 27, head 25, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 28, head 25, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 25, head 26, lenght 3 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="15"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tls-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 26, head 27, lenght 2 | |
[INF]: LN: Schema "ietf-tls-server" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 27, head 28, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 29, head 28, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 28, head 29, lenght 1 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 29, head 24, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="15"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tls-server { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-tls-server"; | |
prefix tlss; | |
import ietf-tls-common { | |
prefix tlscmn; | |
revision-date 2019-07-02; | |
reference | |
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers"; | |
} | |
import ietf-truststore { | |
prefix ts; | |
reference | |
"RFC YYYY: A YANG Data Model for a Truststore"; | |
} | |
import ietf-keystore { | |
prefix ks; | |
reference | |
"RFC ZZZZ: A YANG Data Model for a Keystore"; | |
} | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected] | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
t> | |
Author: Gary Wu <mailto:[email protected]>"; | |
description | |
"This module defines reusable groupings for TLS servers that | |
can be used as a basis for specific TLS server instances. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 0, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 0, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers"; | |
} | |
feature tls-server-hello-params-config { | |
description | |
"TLS hello message parameters are configurable on a TLS | |
server."; | |
} | |
feature tls-server-keepalives { | |
description | |
"Per socket TLS keepalive parameters are configurable for | |
TLS servers on the server implementing this feature."; | |
} | |
feature local-client-auth-supported { | |
description | |
"Indicates that the TLS server supports local | |
configuration of client credentials."; | |
} | |
feature external-client-auth-supported { | |
description | |
"Indicates that the TLS server supports external | |
configuration of client credentials."; | |
} | |
grouping tls-server-grouping { | |
description | |
"A reusable grouping for configuring a TLS serve | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
r without | |
any consideration for how underlying TCP sessions are | |
established. | |
Note that this grouping uses fairly typical descendent | |
node names such that a stack of 'uses' statements will | |
have name conflicts. It is intended that the consuming | |
data model will resolve the issue (e.g., by wrapping | |
the 'uses' statement in a container called | |
'tls-server-parameters'). This model purposely does | |
not do this itself so as to provide maximum flexibility | |
to consuming models."; | |
container server-identity { | |
nacm:default-deny-write; | |
description | |
"A locally-defined or referenced end-entity certificate, | |
including any configured intermediate certificates, the | |
TLS server will present when establishing a TLS connection | |
in its Certificate message, as defined in Section 7.4.2 | |
in RFC 5246."; | |
reference | |
"RFC 5246: | |
The Transport Layer Security (TLS) Protocol Version 1.2 | |
RFC | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ZZZZ: | |
YANG Data Model for a 'Keystore' Mechanism"; | |
uses ks:local-or-keystore-end-entity-cert-with-key-grouping; | |
} | |
container client-authentication { | |
nacm:default-deny-write; | |
presence "Indicates that certificate based client authentication | |
is supported (i.e., the server will request that the | |
client send a certificate)."; | |
description | |
"Specifies if TLS client authentication is required or | |
optional, and specifies if the certificates needed to | |
authenticate the TLS client are configured locally or | |
externally. If configured locally, the data model | |
enables both trust anchors and end-entity certificate | |
to be set."; | |
choice required-or-optional { | |
mandatory true; | |
description | |
"Indicates if TLS-level client authentication is required | |
or optional. This is necessary for some protocols (e.g., | |
RESTCONF) the may optionally authenticate a client via | |
TLS- | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 6, head 5, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
level authentication, HTTP-level authentication, or | |
both simultaneously)."; | |
leaf required { | |
type empty; | |
description | |
"Indicates that TLS-level client authentication is | |
required."; | |
} | |
leaf optional { | |
type empty; | |
description | |
"Indicates that TLS-level client authentication is | |
optional."; | |
} | |
} | |
choice local-or-external { | |
mandatory true; | |
description | |
"Indicates if the certificates needed to authenticate | |
the client are configured locally or externally. The | |
need to support external configuration for client | |
authentication stems from the desire to support | |
consuming data models that prefer to place client | |
authentication with client definitions, rather then | |
in a data model principally concerned with configuring | |
the transport."; | |
case local { | |
if-feature "local-cl | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ient-auth-supported"; | |
description | |
"The certificates needed to authenticate the clients | |
are configured locally."; | |
leaf ca-certs { | |
if-feature "ts:x509-certificates"; | |
type ts:certificates-ref; | |
description | |
"A reference to a list of certificate authority (CA) | |
certificates used by the TLS server to authenticate | |
TLS client certificates. A client certificate is | |
authenticated if it has a valid chain of trust to | |
a configured CA certificate."; | |
reference | |
"RFC YYYY: YANG Data Model for Global Trust Anchors"; | |
} | |
leaf client-certs { | |
if-feature "ts:x509-certificates"; | |
type ts:certificates-ref; | |
description | |
"A reference to a list of client certificates | |
used by the TLS server to authenticate TLS | |
client certificates. A clients certificate | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
is authenticated if it is an exact match to | |
a configured client certificate."; | |
reference | |
"RFC YYYY: YANG Data Model for Global Trust Anchors"; | |
} | |
} | |
case external { | |
if-feature "external-client-auth-supported"; | |
description | |
"The certificates needed to authenticate the clients | |
are configured externally."; | |
leaf client-auth-defined-elsewhere { | |
type empty; | |
description | |
"Indicates that certificates needed to authenticate | |
clients are configured elsewhere."; | |
} | |
} | |
} | |
} | |
container hello-params { | |
nacm:default-deny-write; | |
if-feature "tls-server-hello-params-config"; | |
description | |
"Configurable parameters for the TLS hello message."; | |
uses tlscmn:hello-params-grouping; | |
} | |
container keepalives { | |
nacm:default-deny-write; | |
if-feature "tls-server-keepalives"; | |
presence "In | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 10, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#983 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
dicates that keepalives are enabled."; | |
description | |
"Configures the keep-alive policy, to proactively test | |
the aliveness of the TLS client. An unresponsive | |
TLS client is dropped after approximately max-wait | |
* max-attempts seconds."; | |
leaf max-wait { | |
type uint16 { | |
range "1..max"; | |
} | |
units "seconds"; | |
default "30"; | |
description | |
"Sets the amount of time in seconds after which if | |
no data has been received from the TLS client, a | |
TLS-level message will be sent to test the | |
aliveness of the TLS client."; | |
} | |
leaf max-attempts { | |
type uint8; | |
default "3"; | |
description | |
"Sets the maximum number of sequential keep-alive | |
messages that can fail to obtain a response from | |
the TLS client before assuming the TLS client is | |
no longer alive."; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 11, head 6, lenght 0 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="16"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tls-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 1, lenght 3 | |
[INF]: LN: Schema "ietf-tls-common" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 4, head 2, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 2 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="16"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tls-common { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-tls-common"; | |
prefix tlscmn; | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]> | |
Author: Gary Wu <mailto:[email protected]>"; | |
description | |
"This module defines a common features, identities, and | |
groupings for Transport Layer Security (TLS). | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set fort | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 5, head 4, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
h in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers"; | |
} | |
feature tls-1_0 { | |
description | |
"TLS Protocol Version 1.0 is supported."; | |
reference | |
"RFC 2246: The TLS Protocol Version 1.0"; | |
} | |
feature tls-1_1 { | |
description | |
"TLS Protocol Version 1.1 is supported."; | |
reference | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 4, head 5, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
"RFC 4346: The Transport Layer Security (TLS) Protocol | |
Version 1.1"; | |
} | |
feature tls-1_2 { | |
description | |
"TLS Protocol Version 1.2 is supported."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
feature tls-1_3 { | |
description | |
"TLS Protocol Version 1.2 is supported."; | |
reference | |
"RFC 8446: The Transport Layer Security (TLS) Protocol | |
Version 1.3"; | |
} | |
feature tls-ecc { | |
description | |
"Elliptic Curve Cryptography (ECC) is supported for TLS."; | |
reference | |
"RFC 8422: Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS)"; | |
} | |
feature tls-dhe { | |
description | |
"Ephemeral Diffie-Hellman key exchange is supported for TLS."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
feature tls-3des { | |
description | |
"The Triple-DES block cipher is supported for | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
TLS."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
feature tls-gcm { | |
description | |
"The Galois/Counter Mode authenticated encryption mode is | |
supported for TLS."; | |
reference | |
"RFC 5288: AES Galois Counter Mode (GCM) Cipher Suites for | |
TLS"; | |
} | |
feature tls-sha2 { | |
description | |
"The SHA2 family of cryptographic hash functions is supported | |
for TLS."; | |
reference | |
"FIPS PUB 180-4: Secure Hash Standard (SHS)"; | |
} | |
identity tls-version-base { | |
description | |
"Base identity used to identify TLS protocol versions."; | |
} | |
identity tls-1.0 { | |
if-feature "tls-1_0"; | |
base tls-version-base; | |
description | |
"TLS Protocol Version 1.0."; | |
reference | |
"RFC 2246: The TLS Protocol Version 1.0"; | |
} | |
identity tls-1.1 { | |
if-feature "tls-1_1"; | |
base tls-version-base; | |
description | |
"TLS Protocol Version 1.1."; | |
reference | |
"RFC 4346: The Transport | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
Layer Security (TLS) Protocol | |
Version 1.1"; | |
} | |
identity tls-1.2 { | |
if-feature "tls-1_2"; | |
base tls-version-base; | |
description | |
"TLS Protocol Version 1.2."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity cipher-suite-base { | |
description | |
"Base identity used to identify TLS cipher suites."; | |
} | |
identity rsa-with-aes-128-cbc-sha { | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_RSA_WITH_AES_128_CBC_SHA."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity rsa-with-aes-256-cbc-sha { | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_RSA_WITH_AES_256_CBC_SHA."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity rsa-with-aes-128-cbc-sha256 { | |
if-feature "tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Ci | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 8, head 9, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 10, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
pher suite TLS_RSA_WITH_AES_128_CBC_SHA256."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity rsa-with-aes-256-cbc-sha256 { | |
if-feature "tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity dhe-rsa-with-aes-128-cbc-sha { | |
if-feature "tls-dhe"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity dhe-rsa-with-aes-256-cbc-sha { | |
if-feature "tls-dhe"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity dhe-rsa-with-aes-128 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
-cbc-sha256 { | |
if-feature "tls-dhe and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity dhe-rsa-with-aes-256-cbc-sha256 { | |
if-feature "tls-dhe and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity ecdhe-ecdsa-with-aes-128-cbc-sha256 { | |
if-feature "tls-ecc and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-ecdsa-with-aes-256-cbc-sha384 { | |
if-feature "tls-ecc and tls-sha2"; | |
base cipher-suite-base; | |
descr | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 11, head 12, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 13, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 14, head 12, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
iption | |
"Cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-rsa-with-aes-128-cbc-sha256 { | |
if-feature "tls-ecc and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-rsa-with-aes-256-cbc-sha384 { | |
if-feature "tls-ecc and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-ecdsa-with-aes-128-gcm-sha256 { | |
if-feature "tls-ecc and tls-gcm and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Ciph | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 12, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
er suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-ecdsa-with-aes-256-gcm-sha384 { | |
if-feature "tls-ecc and tls-gcm and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-rsa-with-aes-128-gcm-sha256 { | |
if-feature "tls-ecc and tls-gcm and tls-sha2"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity ecdhe-rsa-with-aes-256-gcm-sha384 { | |
if-feature "tls-ecc and tls-gcm and tls-sha2"; | |
base cipher-suite-base; | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 14, head 15, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 16, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 17, head 15, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
"Cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384."; | |
reference | |
"RFC 5289: TLS Elliptic Curve Cipher Suites with | |
SHA-256/384 and AES Galois Counter Mode (GCM)"; | |
} | |
identity rsa-with-3des-ede-cbc-sha { | |
if-feature "tls-3des"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_RSA_WITH_3DES_EDE_CBC_SHA."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
} | |
identity ecdhe-rsa-with-3des-ede-cbc-sha { | |
if-feature "tls-ecc and tls-3des"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA."; | |
reference | |
"RFC 8422: Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS)"; | |
} | |
identity ecdhe-rsa-with-aes-128-cbc-sha { | |
if-feature "tls-ecc"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA."; | |
reference | |
"RFC 8422: Elliptic Curve Cryptograp | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 15, head 16, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 18, head 16, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
hy (ECC) Cipher Suites | |
for Transport Layer Security (TLS)"; | |
} | |
identity ecdhe-rsa-with-aes-256-cbc-sha { | |
if-feature "tls-ecc"; | |
base cipher-suite-base; | |
description | |
"Cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA."; | |
reference | |
"RFC 8422: Elliptic Curve Cryptography (ECC) Cipher Suites | |
for Transport Layer Security (TLS)"; | |
} | |
grouping hello-params-grouping { | |
description | |
"A reusable grouping for TLS hello message parameters."; | |
reference | |
"RFC 5246: The Transport Layer Security (TLS) Protocol | |
Version 1.2"; | |
container tls-versions { | |
description | |
"Parameters regarding TLS versions."; | |
leaf-list tls-version { | |
type identityref { | |
base tls-version-base; | |
} | |
description | |
"Acceptable TLS protocol versions. | |
If this leaf-list is not configured (has zero elements) | |
the acceptable TLS protocol versions are implementation- | |
defined | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 17, head 18, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#823 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 19, head 18, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
."; | |
} | |
} | |
container cipher-suites { | |
description | |
"Parameters regarding cipher suites."; | |
leaf-list cipher-suite { | |
type identityref { | |
base cipher-suite-base; | |
} | |
ordered-by user; | |
description | |
"Acceptable cipher suites in order of descending | |
preference. The configured host key algorithms should | |
be compatible with the algorithm used by the configured | |
private key. Please see Section 5 of RFC XXXX for | |
valid combinations. | |
If this leaf-list is not configured (has zero elements) | |
the acceptable cipher suites are implementation- | |
defined."; | |
reference | |
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers"; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 20, head 18, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 21, head 18, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[INF]: NP: Session 1: thread 4 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 18, head 19, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 22, head 19, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 19, head 20, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 20, head 21, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="17"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-truststore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 23, head 21, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-truststore" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 21, head 22, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 22, head 23, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 24, head 23, lenght 2 | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 23, head 24, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="17"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-truststore { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-truststore"; | |
prefix ts; | |
import ietf-netconf-acm { | |
prefix nacm; | |
reference | |
"RFC 8341: Network Configuration Access Control Model"; | |
} | |
import ietf-crypto-types { | |
prefix ct; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]>"; | |
description | |
"This module defines a truststore to centralize management | |
of trust anchors including both X.509 certificates and | |
SSH host keys. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 24, head 19, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: A YANG Data Model for a Truststore"; | |
} | |
feature truststore-supported { | |
descripti | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
on | |
"The 'truststore-supported' feature indicates that the | |
server supports the truststore."; | |
} | |
feature local-definitions-supported { | |
description | |
"The 'local-definitions-supported' feature indicates that | |
the server supports locally-defined trust anchors."; | |
} | |
feature x509-certificates { | |
description | |
"The 'x509-certificates' feature indicates that the server | |
implements the /truststore/certificates subtree."; | |
} | |
feature ssh-host-keys { | |
description | |
"The 'ssh-host-keys' feature indicates that the server | |
implements the /truststore/host-keys subtree."; | |
} | |
typedef certificates-ref { | |
type leafref { | |
path "/ts:truststore/ts:certificates/ts:name"; | |
} | |
description | |
"This typedef enables modules to easily define a reference | |
to a set of certificates defined in the truststore."; | |
} | |
typedef host-keys-ref { | |
type leafref { | |
path "/ts:truststore/ts:host-keys/ts:name"; | |
} | |
description | |
"This typedef | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
enables modules to easily define a reference | |
to a set of host keys defined in the truststore."; | |
} | |
grouping local-or-truststore-certs-grouping { | |
description | |
"A grouping that expands to allow trust anchors to be | |
either stored locally, within the using data model, or be | |
a reference to trust anchors stored in the truststore."; | |
choice local-or-truststore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the truststore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local trust anchor definitions. | |
A list is defined so as to be symmetric with the | |
truststore definition."; | |
uses ct:trust-anchor-certs-grouping; | |
} | |
} | |
case truststore { | |
if-feature "truststore-supported"; | |
if-feature "x509-certificates"; | |
leaf tr | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
uststore-reference { | |
type certificates-ref; | |
description | |
"A reference to a set of trust anchors that exists | |
in the truststore."; | |
} | |
} | |
} | |
} | |
grouping local-or-truststore-host-keys-grouping { | |
description | |
"A grouping that expands to allow trust anchors to be | |
either stored locally, within the using data model, or be | |
a reference to trust anchors stored in the truststore."; | |
choice local-or-truststore { | |
mandatory true; | |
description | |
"A choice between an inlined definition and a definition | |
that exists in the truststore."; | |
case local { | |
if-feature "local-definitions-supported"; | |
container local-definition { | |
description | |
"Container to hold the local trust anchor definitions. | |
A list is defined so as to be symmetric with the | |
truststore definition."; | |
leaf-list host-key { | |
nacm:default-deny-write; | |
type ct:ss | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
h-host-key; | |
description | |
"The binary data for this host key."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
uses ct:trust-anchor-certs-grouping; | |
} | |
} | |
case truststore { | |
if-feature "truststore-supported"; | |
if-feature "ssh-host-keys"; | |
leaf truststore-reference { | |
type host-keys-ref; | |
description | |
"A reference to a set of trust anchors that exists | |
in the truststore."; | |
} | |
} | |
} | |
} | |
grouping truststore-grouping { | |
description | |
"Grouping definition enables use in other contexts. If ever | |
done, implementations SHOULD augment new 'case' statements | |
into local-or-keystore 'choice' statements to supply leafrefs | |
to the new location."; | |
list certificates { | |
if-feature "x509-certificates"; | |
key "name"; | |
description | |
"A list of certificates. These certificates can be | |
use | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
d by a server to authenticate clients, or by a client | |
to authenticate servers. Each list of certificates | |
SHOULD be specific to a purpose, as the list as a whole | |
may be referenced by other modules. For instance, a | |
RESTCONF server's configuration might use a specific list | |
of certificates for when authenticating RESTCONF | |
client connections."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this list of certificates."; | |
} | |
leaf description { | |
type string; | |
description | |
"An arbitrary description for this list of | |
certificates."; | |
} | |
list certificate { | |
key "name"; | |
description | |
"A certificate."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this certificate. The | |
name must be unique across all lists of | |
certificates (not just this list) so that leafrefs | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
from another module can resolve to unique values."; | |
} | |
uses ct:trust-anchor-cert-grouping { | |
refine "cert" { | |
mandatory true; | |
} | |
} | |
} | |
} | |
list host-keys { | |
if-feature "ssh-host-keys"; | |
key "name"; | |
description | |
"A list of host keys. These host-keys can | |
be used by clients to authenticate SSH servers. Each | |
list of host keys SHOULD be specific to a purpose, | |
so the list as a whole may be referenced by other modules. | |
For instance, a NETCONF client's configuration might | |
point to a specific list of host keys for when | |
authenticating specific SSH servers."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this list of SSH | |
host keys."; | |
} | |
leaf description { | |
type string; | |
description | |
"An arbitrary description for this list of SSH | |
host keys."; | |
} | |
list host-key { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#860 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
key "name"; | |
description | |
"A host key."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this host-key. Must be | |
unique across all lists of host-keys (not just | |
this list) so that a leafref to it from another module | |
can resolve to unique values."; | |
} | |
leaf host-key { | |
type ct:ssh-host-key; | |
mandatory true; | |
description | |
"The binary public key data for this host key."; | |
reference | |
"RFC YYYY: Common YANG Data Types for Cryptography"; | |
} | |
} | |
} | |
} | |
container truststore { | |
nacm:default-deny-write; | |
description | |
"The truststore contains sets of X.509 certificates and | |
SSH host keys."; | |
uses truststore-grouping; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 11, head 9, lenght 3 | |
[INF]: NP: Session 1: thread 3 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 12, head 9, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 9, head 10, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="18"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-netconf-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 13, head 11, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 11, head 12, lenght 2 | |
[INF]: LN: Schema "ietf-netconf-server" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 12, head 13, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 13, head 14, lenght 1 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 14, head 9, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="18"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-netconf-server { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-netconf-server"; | |
prefix ncs; | |
import ietf-yang-types { | |
prefix yang; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-x509-cert-to-name { | |
prefix x509c2n; | |
reference | |
"RFC 7407: A YANG Data Model for SNMP Configuration"; | |
} | |
import ietf-tcp-client { | |
prefix tcpc; | |
reference | |
"RFC AAAA: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
import ietf-tcp-server { | |
prefix tcps; | |
reference | |
"RFC AAAA: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
import ietf-ssh-server { | |
prefix sshs; | |
revision-date 2019-07-02; | |
reference | |
"RFC BBBB: YANG Groupings for SSH Clients and SSH Servers"; | |
} | |
import ietf-tls-server { | |
prefix tlss; | |
revision-date 2019-07-02; | |
reference | |
"RFC CC | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
CC: YANG Groupings for TLS Clients and TLS Servers"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
WG List: <mailto:[email protected]> | |
Author: Kent Watsen <mailto:[email protected]> | |
Author: Gary Wu <mailto:[email protected]> | |
Author: Juergen Schoenwaelder | |
<mailto:[email protected]>"; | |
description | |
"This module contains a collection of YANG definitions | |
for configuring NETCONF servers. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.or | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 4, head 1, lenght 4 | |
[DBG]: LN: Session 1: sending message: | |
g/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: NETCONF Client and Server Models"; | |
} | |
feature ssh-listen { | |
description | |
"The 'ssh-listen' feature indicates that the NETCONF server | |
supports opening a port to accept NETCONF over SSH | |
client connections."; | |
reference | |
"RFC 6242: | |
Using the NETCONF Protocol over Secure Shell (SSH)"; | |
} | |
feature tls-listen { | |
description | |
"The 'tls-listen' feature indicates that the NETC | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
ONF server | |
supports opening a port to accept NETCONF over TLS | |
client connections."; | |
reference | |
"RFC 7589: Using the NETCONF Protocol over Transport | |
Layer Security (TLS) with Mutual X.509 | |
Authentication"; | |
} | |
feature ssh-call-home { | |
description | |
"The 'ssh-call-home' feature indicates that the NETCONF | |
server supports initiating a NETCONF over SSH call | |
home connection to NETCONF clients."; | |
reference | |
"RFC 8071: NETCONF Call Home and RESTCONF Call Home"; | |
} | |
feature tls-call-home { | |
description | |
"The 'tls-call-home' feature indicates that the NETCONF | |
server supports initiating a NETCONF over TLS call | |
home connection to NETCONF clients."; | |
reference | |
"RFC 8071: NETCONF Call Home and RESTCONF Call Home"; | |
} | |
grouping netconf-server-grouping { | |
description | |
"Top-level grouping for NETCONF server configuration."; | |
container listen { | |
if-feature "ssh-listen or tls-listen"; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
presence "Enables server to listen for NETCONF client connections."; | |
description | |
"Configures listen behavior"; | |
leaf idle-timeout { | |
type uint16; | |
units "seconds"; | |
default "3600"; | |
description | |
"Specifies the maximum number of seconds that a NETCONF | |
session may remain idle. A NETCONF session will be | |
dropped if it is idle for an interval longer than this | |
number of seconds. If set to zero, then the server | |
will never drop a session because it is idle. Sessions | |
that have a notification subscription active are never | |
dropped."; | |
} | |
list endpoint { | |
key "name"; | |
min-elements 1; | |
description | |
"List of endpoints to listen for NETCONF connections."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the NETCONF listen endpoint."; | |
} | |
choice transport { | |
mandatory true; | |
de | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 5, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
scription | |
"Selects between available transports."; | |
case ssh { | |
if-feature "ssh-listen"; | |
container ssh { | |
description | |
"SSH-specific listening configuration for inbound | |
connections."; | |
container tcp-server-parameters { | |
description | |
"A wrapper around the TCP client parameters | |
to avoid name collisions."; | |
uses tcps:tcp-server-grouping { | |
refine "local-port" { | |
default "830"; | |
description | |
"The NETCONF server will listen on the | |
IANA-assigned well-known port value | |
for 'netconf-ssh' (830) if no value | |
is specified."; | |
} | |
} | |
} | |
container ssh-server-parameters { | |
description | |
"A wrapper around the SSH server parameters | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
to avoid name collisions."; | |
uses sshs:ssh-server-grouping; | |
} | |
} | |
} | |
case tls { | |
if-feature "tls-listen"; | |
container tls { | |
description | |
"TLS-specific listening configuration for inbound | |
connections."; | |
container tcp-server-parameters { | |
description | |
"A wrapper around the TCP client parameters | |
to avoid name collisions."; | |
uses tcps:tcp-server-grouping { | |
refine "local-port" { | |
default "6513"; | |
description | |
"The NETCONF server will listen on the | |
IANA-assigned well-known port value | |
for 'netconf-tls' (6513) if no value | |
is specified."; | |
} | |
} | |
} | |
container tls-server-parameters { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 9, head 7, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"A wrapper around the TLS server parameters to | |
avoid name collisions."; | |
uses tlss:tls-server-grouping { | |
refine "client-authentication" { | |
description | |
"NETCONF/TLS servers MUST validate client | |
certificates."; | |
} | |
augment "client-authentication" { | |
description | |
"Augments in the cert-to-name structure."; | |
container cert-maps { | |
description | |
"The cert-maps container is used by a TLS- | |
based NETCONF server to map the NETCONF | |
client's presented X.509 certificate to | |
a NETCONF username. If no matching and | |
valid cert-to-name list entry can be found, | |
then the NETCONF server MUST close the | |
co | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 7, head 8, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
nnection, and MUST NOT accept NETCONF | |
messages over it."; | |
reference | |
"RFC WWWW: NETCONF over TLS, Section 7"; | |
uses x509c2n:cert-to-name; | |
} | |
} | |
} | |
} | |
} | |
} | |
} | |
} | |
} | |
container call-home { | |
if-feature "ssh-call-home or tls-call-home"; | |
presence "Enables the NETCONF server to initiate the underlying | |
transport connection to NETCONF clients."; | |
description | |
"Configures call home behavior."; | |
list netconf-client { | |
key "name"; | |
min-elements 1; | |
description | |
"List of NETCONF clients the NETCONF server is to | |
initiate call-home connections to in parallel."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for the remote NETCONF client."; | |
} | |
container endpoints { | |
description | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
"Container for the list of endpoints."; | |
list endpoint { | |
key "name"; | |
min-elements 1; | |
ordered-by user; | |
description | |
"A non-empty user-ordered list of endpoints for this | |
NETCONF server to try to connect to in sequence. | |
Defining more than one enables high-availability."; | |
leaf name { | |
type string; | |
description | |
"An arbitrary name for this endpoint."; | |
} | |
choice transport { | |
mandatory true; | |
description | |
"Selects between available transports."; | |
case ssh { | |
if-feature "ssh-call-home"; | |
container ssh { | |
description | |
"Specifies SSH-specific call-home transport | |
configuration."; | |
container tcp-client-parameters { | |
description | |
"A wrapper around t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
he TCP client parameters | |
to avoid name collisions."; | |
uses tcpc:tcp-client-grouping { | |
refine "remote-port" { | |
default "4334"; | |
description | |
"The NETCONF server will attempt to connect | |
to the IANA-assigned well-known port for | |
'netconf-ch-tls' (4334) if no value is | |
specified."; | |
} | |
} | |
} | |
container ssh-server-parameters { | |
description | |
"A wrapper around the SSH server parameters | |
to avoid name collisions."; | |
uses sshs:ssh-server-grouping; | |
} | |
} | |
} | |
case tls { | |
if-feature "tls-call-home"; | |
container tls { | |
description | |
"Speci | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
fies TLS-specific call-home transport | |
configuration."; | |
container tcp-client-parameters { | |
description | |
"A wrapper around the TCP client parameters | |
to avoid name collisions."; | |
uses tcpc:tcp-client-grouping { | |
refine "remote-port" { | |
default "4335"; | |
description | |
"The NETCONF server will attempt to connect | |
to the IANA-assigned well-known port for | |
'netconf-ch-tls' (4335) if no value is | |
specified."; | |
} | |
} | |
} | |
container tls-server-parameters { | |
description | |
"A wrapper around the TLS server parameters | |
to avoid name collisions."; | |
uses tlss:tls-server-grouping { | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 12, head 13, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
refine "client-authentication" { | |
description | |
"NETCONF/TLS servers MUST validate client | |
certificates."; | |
} | |
augment "client-authentication" { | |
description | |
"Augments in the cert-to-name structure."; | |
container cert-maps { | |
description | |
"The cert-maps container is used by a | |
TLS-based NETCONF server to map the | |
NETCONF client's presented X.509 | |
certificate to a NETCONF username. If | |
no matching and valid cert-to-name list | |
entry can be found, then the NETCONF | |
server MUST close the connection, and | |
MUST NOT accept NETCONF messages over | |
it." | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 13, head 14, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 16, head 14, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 14, head 15, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
; | |
reference | |
"RFC WWWW: NETCONF over TLS, Section 7"; | |
uses x509c2n:cert-to-name; | |
} | |
} | |
} | |
} | |
} | |
} | |
} | |
} | |
} | |
container connection-type { | |
description | |
"Indicates the NETCONF server's preference for how the | |
NETCONF connection is maintained."; | |
choice connection-type { | |
mandatory true; | |
description | |
"Selects between available connection types."; | |
case persistent-connection { | |
container persistent { | |
presence "Indicates that a persistent connection is | |
to be maintained."; | |
description | |
"Maintain a persistent connection to the NETCONF | |
client. If the connection goes down, immediately | |
start trying t | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 15, head 16, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 17, head 16, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 18, head 16, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
o reconnect to the NETCONF client, | |
using the reconnection strategy. | |
This connection type minimizes any NETCONF client | |
to NETCONF server data-transfer delay, albeit at | |
the expense of holding resources longer."; | |
} | |
} | |
case periodic-connection { | |
container periodic { | |
presence "Indicates that a periodic connection is | |
to be maintained."; | |
description | |
"Periodically connect to the NETCONF client. | |
This connection type increases resource | |
utilization, albeit with increased delay in | |
NETCONF client to NETCONF client interactions. | |
The NETCONF client SHOULD gracefully close the | |
connection using <close-session> upon completing | |
planned activities. If the NETCONF session is | |
not closed gracefully, | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 16, head 17, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 19, head 17, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
the NETCONF server MUST | |
immediately attempt to reestablish the connection. | |
In the case that the previous connection is still | |
active (i.e., the NETCONF client has not closed | |
it yet), establishing a new connection is NOT | |
RECOMMENDED."; | |
leaf period { | |
type uint16; | |
units "minutes"; | |
default "60"; | |
description | |
"Duration of time between periodic connections."; | |
} | |
leaf anchor-time { | |
type yang:date-and-time { | |
pattern "\\d{4}-\\d{2}-\\d{2}T\\d{2}:\\d{2}(Z|[\\+\\-]\\d{2}:\\d{2})"; | |
} | |
description | |
"Designates a timestamp before or after which a | |
series of periodic connections are determined. | |
The periodic connections occur at a whole | |
multipl | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 17, head 18, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 20, head 18, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 18, head 19, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
e interval from the anchor time. For | |
example, for an anchor time is 15 minutes past | |
midnight and a period interval of 24 hours, then | |
a periodic connection will occur 15 minutes past | |
midnight everyday."; | |
} | |
leaf idle-timeout { | |
type uint16; | |
units "seconds"; | |
default "120"; | |
description | |
"Specifies the maximum number of seconds that | |
a NETCONF session may remain idle. A NETCONF | |
session will be dropped if it is idle for an | |
interval longer than this number of seconds. | |
If set to zero, then the server will never | |
drop a session because it is idle."; | |
} | |
} | |
} | |
} | |
} | |
container reconnect-strategy { | |
description | |
"The reconnection stra | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 19, head 20, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 21, head 20, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 22, head 20, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 20, head 21, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
tegy directs how a NETCONF server | |
reconnects to a NETCONF client, after discovering its | |
connection to the client has dropped, even if due to a | |
reboot. The NETCONF server starts with the specified | |
endpoint and tries to connect to it max-attempts times | |
before trying the next endpoint in the list (round | |
robin)."; | |
leaf start-with { | |
type enumeration { | |
enum "first-listed" { | |
description | |
"Indicates that reconnections should start with | |
the first endpoint listed."; | |
} | |
enum "last-connected" { | |
description | |
"Indicates that reconnections should start with | |
the endpoint last connected to. If no previous | |
connection has ever been established, then the | |
first endpoint configured is used. NETCONF | |
servers SHOULD be able to rememb | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 21, head 22, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 23, head 22, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 24, head 22, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 22, head 23, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
er the last | |
endpoint connected to across reboots."; | |
} | |
enum "random-selection" { | |
description | |
"Indicates that reconnections should start with | |
a random endpoint."; | |
} | |
} | |
default "first-listed"; | |
description | |
"Specifies which of the NETCONF client's endpoints | |
the NETCONF server should start with when trying | |
to connect to the NETCONF client."; | |
} | |
leaf max-attempts { | |
type uint8 { | |
range "1..max"; | |
} | |
default "3"; | |
description | |
"Specifies the number times the NETCONF server tries | |
to connect to a specific endpoint before moving on | |
to the next endpoint in the list (round robin)."; | |
} | |
} | |
} | |
} | |
} | |
container netconf-server { | |
description | |
"Top-level container for NETCONF server co | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 23, head 24, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 25, head 24, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 26, head 24, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#74 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 24, head 25, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
nfiguration."; | |
uses netconf-server-grouping; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 25, head 26, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 26, head 21, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 0, head 0, lenght 1 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="19"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-x509-cert-to-name</identifier><version>2014-12-10</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 1, head 2, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-x509-cert-to-name" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 3, head 4, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="19"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-x509-cert-to-name { | |
namespace "urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name"; | |
prefix x509c2n; | |
import ietf-yang-types { | |
prefix yang; | |
} | |
organization | |
"IETF NETMOD (NETCONF Data Modeling Language) Working Group"; | |
contact | |
"WG Web: <http://tools.ietf.org/wg/netmod/> | |
WG List: <mailto:[email protected]> | |
WG Chair: Thomas Nadeau | |
<mailto:[email protected]> | |
WG Chair: Juergen Schoenwaelder | |
<mailto:[email protected]> | |
Editor: Martin Bjorklund | |
<mailto:[email protected]> | |
Editor: Juergen Schoenwaelder | |
<mailto:[email protected]>"; | |
description | |
"This module contains a collection of YANG definitions for | |
extracting a name from an X.509 certificate. | |
The algorithm used | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 26, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
to extract a name from an X.509 certificate | |
was first defined in RFC 6353. | |
Copyright (c) 2014 IETF Trust and the persons identified as | |
authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with or | |
without modification, is permitted pursuant to, and subject | |
to the license terms contained in, the Simplified BSD License | |
set forth in Section 4.c of the IETF Trust's Legal Provisions | |
Relating to IETF Documents | |
(http://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC 7407; see | |
the RFC itself for full legal notices."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model for | |
the Simple Network Management Protocol (SNMP)"; | |
revision 2014-12-10 { | |
description | |
"Initial revision."; | |
reference | |
"RFC 7407: A YANG Data Model for SNMP Configuration"; | |
} | |
identity cert-to-name { | |
description | |
"Base identity for algorithms to derive a name fro | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 2, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
m a | |
certificate."; | |
} | |
identity specified { | |
base cert-to-name; | |
description | |
"Directly specifies the name to be used for the certificate. | |
The value of the leaf 'name' in the cert-to-name list is | |
used."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSpecified"; | |
} | |
identity san-rfc822-name { | |
base cert-to-name; | |
description | |
"Maps a subjectAltName's rfc822Name to a name. The local part | |
of the rfc822Name is passed unaltered, but the host-part of | |
the name must be passed in lowercase. For example, the | |
rfc822Name field [email protected] is mapped to name | |
[email protected]."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANRFC822Name"; | |
} | |
identity san-dns-name { | |
base cer | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
t-to-name; | |
description | |
"Maps a subjectAltName's dNSName to a name after first | |
converting it to all lowercase (RFC 5280 does not specify | |
converting to lowercase, so this involves an extra step). | |
This mapping results in a 1:1 correspondence between | |
subjectAltName dNSName values and the name values."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANDNSName"; | |
} | |
identity san-ip-address { | |
base cert-to-name; | |
description | |
"Maps a subjectAltName's iPAddress to a name by | |
transforming the binary-encoded address as follows: | |
1) for IPv4, the value is converted into a | |
decimal-dotted quad address (e.g., '192.0.2.1'). | |
2) for IPv6 addresses, the value is converted into a | |
32-character, all-lowercase hexadecimal string | |
without any colon separators. | |
This mapping results in a | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
1:1 correspondence between | |
subjectAltName iPAddress values and the name values."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANIpAddress"; | |
} | |
identity san-any { | |
base cert-to-name; | |
description | |
"Maps any of the following fields using the corresponding | |
mapping algorithms: | |
+------------+-----------------+ | |
| Type | Algorithm | | |
|------------+-----------------| | |
| rfc822Name | san-rfc822-name | | |
| dNSName | san-dns-name | | |
| iPAddress | san-ip-address | | |
+------------+-----------------+ | |
The first matching subjectAltName value found in the | |
certificate of the above types MUST be used when deriving | |
the name. The mapping algorithm specified in the | |
'Algorithm' column MUST be used to derive the name. | |
This mapping results in a 1:1 correspondenc | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 7, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
e between | |
subjectAltName values and name values. The three sub-mapping | |
algorithms produced by this combined algorithm cannot produce | |
conflicting results between themselves."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertSANAny"; | |
} | |
identity common-name { | |
base cert-to-name; | |
description | |
"Maps a certificate's CommonName to a name after converting | |
it to a UTF-8 encoding. The usage of CommonNames is | |
deprecated, and users are encouraged to use subjectAltName | |
mapping methods instead. This mapping results in a 1:1 | |
correspondence between certificate CommonName values and name | |
values."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertCommonName"; | |
} | |
typedef tls-fingerprint { | |
type y | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 7, head 8, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 9, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
ang:hex-string { | |
pattern "([0-9a-fA-F]){2}(:([0-9a-fA-F]){2}){0,254}"; | |
} | |
description | |
"A fingerprint value that can be used to uniquely reference | |
other data of potentially arbitrary length. | |
A tls-fingerprint value is composed of a 1-octet hashing | |
algorithm identifier followed by the fingerprint value. The | |
first octet value identifying the hashing algorithm is taken | |
from the IANA 'TLS HashAlgorithm Registry' (RFC 5246). The | |
remaining octets are filled using the results of the hashing | |
algorithm."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.SnmpTLSFingerprint"; | |
} | |
grouping cert-to-name { | |
description | |
"Defines nodes for mapping certificates to names. Modules | |
that use this grouping should describe how the resulting | |
name is used."; | |
list cert-to-name { | |
key "id"; | |
description | |
"Th | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
is list defines how certificates are mapped to names. | |
The name is derived by considering each cert-to-name | |
list entry in order. The cert-to-name entry's fingerprint | |
determines whether the list entry is a match: | |
1) If the cert-to-name list entry's fingerprint value | |
matches that of the presented certificate, then consider | |
the list entry a successful match. | |
2) If the cert-to-name list entry's fingerprint value | |
matches that of a locally held copy of a trusted CA | |
certificate, and that CA certificate was part of the CA | |
certificate chain to the presented certificate, then | |
consider the list entry a successful match. | |
Once a matching cert-to-name list entry has been found, the | |
map-type is used to determine how the name associated with | |
the certificate should be determined. See the map-type | |
leaf's description for details on determining the name value. | |
If it | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 12, head 10, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 10, head 11, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 11, head 12, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
is impossible to determine a name from the cert-to-name | |
list entry's data combined with the data presented in the | |
certificate, then additional cert-to-name list entries MUST | |
be searched to look for another potential match. | |
Security administrators are encouraged to make use of | |
certificates with subjectAltName fields that can be mapped to | |
names so that a single root CA certificate can allow all | |
child certificates' subjectAltName fields to map directly to | |
a name via a 1:1 transformation."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol (SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNEntry"; | |
leaf id { | |
type uint32; | |
description | |
"The id specifies the order in which the entries in the | |
cert-to-name list are searched. Entries with lower | |
numbers are searched first."; | |
reference | |
"RFC 6 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 12, head 7, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNID"; | |
} | |
leaf fingerprint { | |
type tls-fingerprint; | |
mandatory true; | |
description | |
"Specifies a value with which the fingerprint of the | |
full certificate presented by the peer is compared. If | |
the fingerprint of the full certificate presented by the | |
peer does not match the fingerprint configured, then the | |
entry is skipped, and the search for a match continues."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNFingerprint"; | |
} | |
leaf map-type { | |
type identityref { | |
base cert-to-name; | |
} | |
mandatory true; | |
description | |
"Specifies the algorithm | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#956 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
used to map the certificate | |
presented by the peer to a name. | |
Mappings that need additional configuration objects should | |
use the 'when' statement to make them conditional based on | |
the map-type."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNMapType"; | |
} | |
leaf name { | |
when "../map-type = 'x509c2n:specified'"; | |
type string; | |
mandatory true; | |
description | |
"Directly specifies the NETCONF username when the | |
map-type is 'specified'."; | |
reference | |
"RFC 6353: Transport Layer Security (TLS) Transport Model | |
for the Simple Network Management Protocol | |
(SNMP). | |
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNData"; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[INF]: NP: Session 1: thread 0 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 4, head 1, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 1, head 2, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 5, head 2, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 2, head 3, lenght 3 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="20"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-client</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 4, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 4, head 5, lenght 1 | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-tcp-client" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 6, head 5, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 5, head 6, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="20"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-client { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-client"; | |
prefix tcpc; | |
import ietf-inet-types { | |
prefix inet; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-tcp-common { | |
prefix tcpcmn; | |
reference | |
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group and the | |
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
<http://datatracker.ietf.org/wg/tcpm/> | |
WG List: <mailto:[email protected]> | |
<mailto:[email protected]> | |
Authors: Kent Watsen <mailto:[email protected]> | |
Michael Scharf | |
<mailto:[email protected]>" | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 6, head 1, lenght 0 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
; | |
description | |
"This module defines reusable groupings for TCP clients that | |
can be used as a basis for specific TCP client instances. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and o | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
nly when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
feature local-binding-supported { | |
description | |
"Indicates that the server supports configuring local | |
bindings (i.e., the local address and local port) for | |
TCP clients."; | |
} | |
feature tcp-client-keepalives { | |
description | |
"Per socket TCP keepalive parameters are configurable for | |
TCP clients on the server implementing this feature."; | |
} | |
grouping tcp-client-grouping { | |
description | |
"A reusable grouping for configuring a TCP client. | |
Note that this grouping uses fairly typical descendent | |
node names such that a stack of 'uses' statements will | |
have name conflicts. It is intended that the consuming | |
data model will resolve the issue (e.g., by wrapping | |
the 'uses' statement in a container called | |
'tcp-client-paramete | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
rs'). This model purposely does | |
not do this itself so as to provide maximum flexibility | |
to consuming models."; | |
leaf remote-address { | |
type inet:host; | |
mandatory true; | |
description | |
"The IP address or hostname of the remote peer to | |
establish a connection with. If a domain name is | |
configured, then the DNS resolution should happen on | |
each connection attempt. If the the DNS resolution | |
results in multiple IP addresses, the IP addresses | |
are tried according to local preference order until | |
a connection has been established or until all IP | |
addresses have failed."; | |
} | |
leaf remote-port { | |
type inet:port-number; | |
default "0"; | |
description | |
"The IP port number for the remote peer to establish a | |
connection with. An invalid default value (0) is used | |
(instead of 'mandatory true') so that as application | |
level data model may 'refine' it with an application | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 5, head 3, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
specific default port number value."; | |
} | |
leaf local-address { | |
if-feature "local-binding-supported"; | |
type inet:ip-address; | |
description | |
"The local IP address/interface (VRF?) to bind to for when | |
connecting to the remote peer. INADDR_ANY ('0.0.0.0') or | |
INADDR6_ANY ('0:0:0:0:0:0:0:0' a.k.a. '::') MAY be used to | |
explicitly indicate the implicit default, that the server | |
can bind to any IPv4 or IPv6 addresses, respectively."; | |
} | |
leaf local-port { | |
if-feature "local-binding-supported"; | |
type inet:port-number; | |
default "0"; | |
description | |
"The local IP port number to bind to for when connecting | |
to the remote peer. The port number '0', which is the | |
default value, indicates that any available local port | |
number may be used."; | |
} | |
uses tcpcmn:tcp-connection-grouping { | |
augment "keepalives" { | |
if-feature "tcp-client-keepalives"; | |
description | |
"Add an if-feat | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#135 | |
[DBG]: LN: Session 1: sending message: | |
ure statement so that implementations | |
can choose to support TCP client keepalives."; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 4, head 5, lenght 2 | |
[INF]: NP: Session 1: thread 2 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 7, head 5, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 5, head 6, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 8, head 6, lenght 3 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="21"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 6, head 7, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-tcp-common" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 7, head 8, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 9, head 8, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 8, head 9, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="21"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-common { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-common"; | |
prefix tcpcmn; | |
organization | |
"IETF NETCONF (Network Configuration) Working Group and the | |
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
<http://datatracker.ietf.org/wg/tcpm/> | |
WG List: <mailto:[email protected]> | |
<mailto:[email protected]> | |
Authors: Kent Watsen <mailto:[email protected]> | |
Michael Scharf | |
<mailto:[email protected]>"; | |
description | |
"This module defines reusable groupings for TCP commons that | |
can be used as a basis for specific TCP common instances. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 9, head 4, lenght 0 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 0, head 0, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 1, head 0, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and only when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
feature keepalives-s | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 2, head 0, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 0, head 1, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 3, head 1, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
upported { | |
description | |
"Indicates that keepalives are supported."; | |
} | |
grouping tcp-common-grouping { | |
description | |
"A reusable grouping for configuring TCP parameters common | |
to TCP connections as well as the operating system as a | |
whole."; | |
container keepalives { | |
if-feature "keepalives-supported"; | |
presence "Indicates that keepalives are enabled."; | |
description | |
"Configures the keep-alive policy, to proactively test the | |
aliveness of the TCP peer. An unresponsive TCP peer is | |
dropped after approximately (idle-time * 60) + (max-probes | |
* probe-interval) seconds."; | |
leaf idle-time { | |
type uint16 { | |
range "1..max"; | |
} | |
units "seconds"; | |
mandatory true; | |
description | |
"Sets the amount of time after which if no data has been | |
received from the TCP peer, a TCP-level probe message | |
will be sent to test the aliveness of the TCP peer."; | |
} | |
leaf m | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 1, head 2, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 4, head 2, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#751 | |
[DBG]: LN: Session 1: sending message: | |
ax-probes { | |
type uint16 { | |
range "1..max"; | |
} | |
mandatory true; | |
description | |
"Sets the maximum number of sequential keep-alive probes | |
that can fail to obtain a response from the TCP peer | |
before assuming the TCP peer is no longer alive."; | |
} | |
leaf probe-interval { | |
type uint16 { | |
range "1..max"; | |
} | |
units "seconds"; | |
mandatory true; | |
description | |
"Sets the time interval between failed probes."; | |
} | |
} | |
} | |
grouping tcp-connection-grouping { | |
description | |
"A reusable grouping for configuring TCP parameters common | |
to TCP connections."; | |
uses tcp-common-grouping; | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 2, head 3, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 5, head 3, lenght 3 | |
[INF]: NP: Session 1: thread 0 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 3, head 4, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 6, head 4, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: removed 4, head 5, lenght 2 | |
[DBG]: LN: Session 1: received message: | |
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="22"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 7, head 5, lenght 3 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[INF]: LN: Schema "ietf-tcp-server" was requested. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 5, head 6, lenght 2 | |
[INF]: LY: Resolving unresolved data nodes and their constraints... | |
[INF]: LY: All data nodes and constraints resolved. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 6, head 7, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 8, head 7, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="22"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-server { | |
yang-version 1.1; | |
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-server"; | |
prefix tcps; | |
import ietf-inet-types { | |
prefix inet; | |
reference | |
"RFC 6991: Common YANG Data Types"; | |
} | |
import ietf-tcp-common { | |
prefix tcpcmn; | |
reference | |
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
organization | |
"IETF NETCONF (Network Configuration) Working Group and the | |
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group"; | |
contact | |
"WG Web: <http://datatracker.ietf.org/wg/netconf/> | |
<http://datatracker.ietf.org/wg/tcpm/> | |
WG List: <mailto:[email protected]> | |
<mailto:[email protected]> | |
Authors: Kent Watsen <mailto:[email protected]> | |
Michael Scharf | |
<mailto:[email protected]>" | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 7, head 8, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 9, head 8, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 10, head 8, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: Session 1: sending message: | |
; | |
description | |
"This module defines reusable groupings for TCP servers that | |
can be used as a basis for specific TCP server instances. | |
Copyright (c) 2019 IETF Trust and the persons identified | |
as authors of the code. All rights reserved. | |
Redistribution and use in source and binary forms, with | |
or without modification, is permitted pursuant to, and | |
subject to the license terms contained in, the Simplified | |
BSD License set forth in Section 4.c of the IETF Trust's | |
Legal Provisions Relating to IETF Documents | |
(https://trustee.ietf.org/license-info). | |
This version of this YANG module is part of RFC XXXX | |
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC | |
itself for full legal notices.; | |
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', | |
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', | |
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document | |
are to be interpreted as described in BCP 14 (RFC 2119) | |
(RFC 8174) when, and on | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: removed 8, head 9, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 11, head 9, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#1024 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 9, head 10, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
ly when, they appear in all | |
capitals, as shown here."; | |
revision 2019-07-02 { | |
description | |
"Initial version"; | |
reference | |
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers"; | |
} | |
feature tcp-server-keepalives { | |
description | |
"Per socket TCP keepalive parameters are configurable for | |
TCP servers on the server implementing this feature."; | |
} | |
grouping tcp-server-grouping { | |
description | |
"A reusable grouping for configuring a TCP server. | |
Note that this grouping uses fairly typical descendent | |
node names such that a stack of 'uses' statements will | |
have name conflicts. It is intended that the consuming | |
data model will resolve the issue (e.g., by wrapping | |
the 'uses' statement in a container called | |
'tcp-server-parameters'). This model purposely does | |
not do this itself so as to provide maximum flexibility | |
to consuming models."; | |
leaf local-address { | |
type inet:ip-address; | |
mandatory true; | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: removed 10, head 11, lenght 1 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 12, head 11, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548547850672 queue: added 13, head 11, lenght 3 | |
[DBG]: LN: Session 1: sending message: | |
#984 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: removed 11, head 12, lenght 2 | |
[DBG]: LN: Session 1: sending message: | |
description | |
"The local IP address to listen on for incoming | |
TCP client connections. INADDR_ANY (0.0.0.0) or | |
INADDR6_ANY (0:0:0:0:0:0:0:0 a.k.a. ::) MUST be | |
used when the server is to listen on all IPv4 or | |
IPv6 addresses, respectively."; | |
} | |
leaf local-port { | |
type inet:port-number; | |
default "0"; | |
description | |
"The local port number to listen on for incoming TCP | |
client connections. An invalid default value (0) | |
is used (instead of 'mandatory true') so that an | |
application level data model may 'refine' it with | |
an application specific default port number value."; | |
} | |
uses tcpcmn:tcp-connection-grouping { | |
augment "keepalives" { | |
if-feature "tcp-server-keepalives"; | |
description | |
"Add an if-feature statement so that implementations | |
can choose to support TCP server keepalives."; | |
} | |
} | |
} | |
} | |
</data></rpc-reply> | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: removed 12, head 13, lenght 1 | |
[DBG]: LN: Session 1: sending message: | |
## | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 15, head 13, lenght 3 | |
[INF]: NP: Session 1: thread 1 event new RPC. | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 16, head 13, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 17, head 13, lenght 5 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 14, head 13, lenght 2 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 15, head 13, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 16, head 13, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 17, head 13, lenght 5 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 18, head 13, lenght 3 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 19, head 13, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 20, head 13, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 21, head 13, lenght 5 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 22, head 13, lenght 3 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 23, head 13, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 24, head 13, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 25, head 13, lenght 5 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548624875952 queue: added 26, head 13, lenght 3 | |
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out). | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548641661360 queue: added 27, head 13, lenght 3 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548633268656 queue: added 28, head 13, lenght 4 | |
[DBG]: LN: PS 0x0x55555c03a0 TID 548672574784 queue: added 29, head 13, lenght 5 | |
^C | |
Thread 1 "netopeer2-serve" received signal SIGINT, Interrupt. | |
futex_abstimed_wait_cancelable (private=0, abstime=0x7ffffff718, expected=0, futex_word=0x55555c03d8) | |
at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
205 int err = lll_futex_timed_wait_bitset (futex_word, expected, abstime, | |
(gdb) bt | |
#0 futex_abstimed_wait_cancelable (private=0, abstime=0x7ffffff718, expected=0, futex_word=0x55555c03d8) | |
at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
#1 __pthread_cond_wait_common (abstime=0x7ffffff718, mutex=0x55555c03e0, cond=0x55555c03b0) at pthread_cond_wait.c:539 | |
#2 __pthread_cond_timedwait (cond=0x55555c03b0, mutex=0x55555c03e0, abstime=0x7ffffff718) at pthread_cond_wait.c:667 | |
#3 0x0000007fbf4fca64 in ?? () from /usr/lib/libnetconf2.so.1.0.5 | |
#4 0x0000007fbf4fd47c in nc_ps_poll () from /usr/lib/libnetconf2.so.1.0.5 | |
#5 0x000000555556a064 in ?? () | |
#6 0x000000555555d1b0 in main () | |
(gdb) info thread | |
Id Target Id Frame | |
* 1 Thread 0x7fbf6f1540 (LWP 2444) "netopeer2-serve" futex_abstimed_wait_cancelable (private=0, abstime=0x7ffffff718, | |
expected=0, futex_word=0x55555c03d8) at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
2 Thread 0x7fbe9911b0 (LWP 2449) "netopeer2-serve" 0x0000007fbf34883c in __GI___select (nfds=<optimized out>, | |
readfds=0x7fbe990918, writefds=0x0, exceptfds=0x0, timeout=0x7fbe990908) at ../sysdeps/unix/sysv/linux/select.c:53 | |
4 Thread 0x7fbe1821b0 (LWP 2451) "netopeer2-serve" 0x0000007fbf34883c in __GI___select (nfds=<optimized out>, | |
readfds=0x7fbe181918, writefds=0x0, exceptfds=0x0, timeout=0x7fbe181908) at ../sysdeps/unix/sysv/linux/select.c:53 | |
5 Thread 0x7fbd9761b0 (LWP 2452) "netopeer2-serve" futex_abstimed_wait_cancelable (private=0, abstime=0x7fbd975738, | |
expected=0, futex_word=0x55555c03d8) at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
6 Thread 0x7fbd1751b0 (LWP 2453) "netopeer2-serve" futex_abstimed_wait_cancelable (private=0, abstime=0x7fbd174738, | |
expected=0, futex_word=0x55555c03d8) at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
7 Thread 0x7fbc9741b0 (LWP 2454) "netopeer2-serve" futex_abstimed_wait_cancelable (private=0, abstime=0x7fbc973738, | |
expected=0, futex_word=0x55555c03d8) at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
8 Thread 0x7fb7fff1b0 (LWP 2455) "netopeer2-serve" 0x0000007fbf41fee0 in ?? () from /usr/lib/libssh.so.4 | |
(gdb) thread 2 | |
[Switching to thread 2 (Thread 0x7fbe9911b0 (LWP 2449))] | |
#0 0x0000007fbf34883c in __GI___select (nfds=<optimized out>, readfds=0x7fbe990918, writefds=0x0, exceptfds=0x0, | |
timeout=0x7fbe990908) at ../sysdeps/unix/sysv/linux/select.c:53 | |
53 result = SYSCALL_CANCEL (pselect6, nfds, readfds, writefds, exceptfds, tsp, | |
(gdb) bt | |
#0 0x0000007fbf34883c in __GI___select (nfds=<optimized out>, readfds=0x7fbe990918, writefds=0x0, exceptfds=0x0, | |
timeout=0x7fbe990908) at ../sysdeps/unix/sysv/linux/select.c:53 | |
#1 0x0000007fbf4b1d44 in ?? () from /usr/lib/libsysrepo.so.3 | |
#2 0x0000007fbf63d6fc in start_thread (arg=0x7ffffff846) at pthread_create.c:486 | |
#3 0x0000007fbf34effc in thread_start () at ../sysdeps/unix/sysv/linux/aarch64/clone.S:78 | |
(gdb) thread 5 | |
[Switching to thread 5 (Thread 0x7fbd9761b0 (LWP 2452))] | |
#0 futex_abstimed_wait_cancelable (private=0, abstime=0x7fbd975738, expected=0, futex_word=0x55555c03d8) | |
at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
205 int err = lll_futex_timed_wait_bitset (futex_word, expected, abstime, | |
(gdb) bt | |
#0 futex_abstimed_wait_cancelable (private=0, abstime=0x7fbd975738, expected=0, futex_word=0x55555c03d8) | |
at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
#1 __pthread_cond_wait_common (abstime=0x7fbd975738, mutex=0x55555c03e0, cond=0x55555c03b0) at pthread_cond_wait.c:539 | |
#2 __pthread_cond_timedwait (cond=0x55555c03b0, mutex=0x55555c03e0, abstime=0x7fbd975738) at pthread_cond_wait.c:667 | |
#3 0x0000007fbf4fca64 in ?? () from /usr/lib/libnetconf2.so.1.0.5 | |
#4 0x0000007fbf4fd47c in nc_ps_poll () from /usr/lib/libnetconf2.so.1.0.5 | |
#5 0x000000555556a064 in ?? () | |
#6 0x0000007fbf63d6fc in start_thread (arg=0x7ffffff946) at pthread_create.c:486 | |
#7 0x0000007fbf34effc in thread_start () at ../sysdeps/unix/sysv/linux/aarch64/clone.S:78 | |
(gdb) | |
(gdb) | |
#0 futex_abstimed_wait_cancelable (private=0, abstime=0x7fbd975738, expected=0, futex_word=0x55555c03d8) | |
at ../sysdeps/unix/sysv/linux/futex-internal.h:205 | |
#1 __pthread_cond_wait_common (abstime=0x7fbd975738, mutex=0x55555c03e0, cond=0x55555c03b0) at pthread_cond_wait.c:539 | |
#2 __pthread_cond_timedwait (cond=0x55555c03b0, mutex=0x55555c03e0, abstime=0x7fbd975738) at pthread_cond_wait.c:667 | |
#3 0x0000007fbf4fca64 in ?? () from /usr/lib/libnetconf2.so.1.0.5 | |
#4 0x0000007fbf4fd47c in nc_ps_poll () from /usr/lib/libnetconf2.so.1.0.5 | |
#5 0x000000555556a064 in ?? () | |
#6 0x0000007fbf63d6fc in start_thread (arg=0x7ffffff946) at pthread_create.c:486 | |
#7 0x0000007fbf34effc in thread_start () at ../sysdeps/unix/sysv/linux/aarch64/clone.S:78 | |
(gdb) p/x 548624875952 | |
$1 = 0x7fbc9741b0 | |
(gdb) p/x 548547850672 | |
$2 = 0x7fb7fff1b0 | |
(gdb) thread 8 | |
[Switching to thread 8 (Thread 0x7fb7fff1b0 (LWP 2455))] | |
#0 0x0000007fbf41fee0 in ?? () from /usr/lib/libssh.so.4 | |
(gdb) bt | |
#0 0x0000007fbf41fee0 in ?? () from /usr/lib/libssh.so.4 | |
#1 0x0000007fbf406d88 in ssh_channel_poll_timeout () from /usr/lib/libssh.so.4 | |
#2 0x0000007fbf4fd864 in nc_ps_poll () from /usr/lib/libnetconf2.so.1.0.5 | |
#3 0x000000555556a064 in ?? () | |
#4 0x0000007fbf63d6fc in start_thread (arg=0x7ffffff946) at pthread_create.c:486 | |
#5 0x0000007fbf34effc in thread_start () at ../sysdeps/unix/sysv/linux/aarch64/clone.S:78 | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment