Skip to content

Instantly share code, notes, and snippets.

@brchiu
Created October 2, 2019 07:08
Show Gist options
  • Save brchiu/ecd9146c8d96586ebc1b9f360c85fe62 to your computer and use it in GitHub Desktop.
Save brchiu/ecd9146c8d96586ebc1b9f360c85fe62 to your computer and use it in GitHub Desktop.
log from beginning
root@xilinx-zcu111-2019_1:~# netopeer2-server -d -c MSG
[INF]: LY: Plugin "/usr/lib/libyang/extensions/metadata.so" successfully loaded.
[INF]: LY: Plugin "/usr/lib/libyang/extensions/yangdata.so" successfully loaded.
[INF]: LY: Plugin "/usr/lib/libyang/extensions/nacm.so" successfully loaded.
[INF]: LY: Plugin "/usr/lib/libyang/user_types/user_yang_types.so" successfully loaded.
[INF]: LY: Plugin "/usr/lib/libyang/user_types/user_inet_types.so" successfully loaded.
[INF]: LY: Reading module "ietf-yang-metadata".
[INF]: LY: Module "ietf-yang-metadata@2016-08-05" successfully parsed as implemented.
[INF]: LY: Reading module "yang".
[INF]: LY: Resolving "yang" unresolved schema nodes and their constraints...
[INF]: LY: All "yang" schema nodes and constraints resolved.
[INF]: LY: Module "yang@2017-02-20" successfully parsed as implemented.
[INF]: LY: Reading module "ietf-inet-types".
[INF]: LY: Resolving derived type "union" failed, it will be attempted later.
[INF]: LY: Resolving derived type "union" failed, it will be attempted later.
[INF]: LY: Resolving derived type "union" failed, it will be attempted later.
[INF]: LY: Resolving derived type "union" failed, it will be attempted later.
[INF]: LY: Resolving "ietf-inet-types" unresolved schema nodes and their constraints...
[INF]: LY: All "ietf-inet-types" schema nodes and constraints resolved.
[INF]: LY: Module "ietf-inet-types@2013-07-15" successfully parsed as implemented.
[INF]: LY: Reading module "ietf-yang-types".
[INF]: LY: Module "ietf-yang-types@2013-07-15" successfully parsed as implemented.
[INF]: LY: Reading module "ietf-datastores".
[INF]: LY: Module "ietf-datastores@2017-08-17" successfully parsed as implemented.
[INF]: LY: Reading module "ietf-yang-library".
[INF]: LY: Searching for "ietf-yang-types" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-yang-types" in /home/root.
[INF]: LY: Searching for "ietf-inet-types" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-inet-types" in /home/root.
[INF]: LY: Searching for "ietf-datastores" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-datastores" in /home/root.
[INF]: LY: Module "ietf-yang-library@2019-01-04" successfully parsed as implemented.
[INF]: LY: Resolving "sysrepo" unresolved schema nodes and their constraints...
[INF]: LY: All "sysrepo" schema nodes and constraints resolved.
[INF]: LY: Module "sysrepo@2019-09-25" successfully parsed as implemented.
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LY: Searching for "ietf-netconf-with-defaults" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-netconf" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-netconf" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-netconf-acm" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-netconf-acm" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-netconf-acm@2018-02-14" successfully parsed as imported.
[INF]: LY: Module "ietf-netconf@2013-09-29" successfully parsed as imported.
[INF]: LY: Resolving "ietf-netconf-with-defaults" unresolved schema nodes and their constraints...
[INF]: LY: All "ietf-netconf-with-defaults" schema nodes and constraints resolved.
[INF]: LY: Module "ietf-netconf-with-defaults@2011-06-01" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-netconf-notifications" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Resolving "ietf-netconf-notifications" unresolved schema nodes and their constraints...
[INF]: LY: All "ietf-netconf-notifications" schema nodes and constraints resolved.
[INF]: LY: Module "ietf-netconf-notifications@2012-02-06" successfully parsed as implemented.
[INF]: LY: Module "ietf-netconf-acm@2018-02-14" now implemented.
[INF]: LY: Searching for "ietf-netconf-monitoring" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-netconf-monitoring@2010-10-04" successfully parsed as implemented.
[INF]: LY: Searching for "nc-notifications" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "notifications" in /etc/sysrepo/yang.
[INF]: LY: Searching for "notifications" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "notifications@2008-07-14" successfully parsed as imported.
[INF]: LY: Module "nc-notifications@2008-07-14" successfully parsed as implemented.
[INF]: LY: Module "notifications@2008-07-14" now implemented.
[INF]: LY: Searching for "ietf-x509-cert-to-name" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-x509-cert-to-name@2014-12-10" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-crypto-types" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-crypto-types@2019-07-02" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-keystore" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-crypto-types" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-crypto-types" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Resolving "ietf-keystore" unresolved schema nodes and their constraints...
[INF]: LY: All "ietf-keystore" schema nodes and constraints resolved.
[INF]: LY: Module "ietf-keystore@2019-07-02" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-truststore" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-truststore@2019-07-02" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-tcp-common" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-tcp-common@2019-07-02" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-ssh-server" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-ssh-common" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-ssh-common@2019-07-02" successfully parsed as imported.
[INF]: LY: Searching for "ietf-keystore" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-keystore" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "iana-crypt-hash" in /etc/sysrepo/yang.
[INF]: LY: Searching for "iana-crypt-hash" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "iana-crypt-hash@2014-08-06" successfully parsed as imported.
[INF]: LY: Module "ietf-ssh-server@2019-07-02" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-tls-server" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-tls-common" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-tls-common@2019-07-02" successfully parsed as imported.
[INF]: LY: Searching for "ietf-truststore" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-truststore" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-tls-server@2019-07-02" successfully parsed as implemented.
[INF]: LY: Searching for "ietf-netconf-server" in /etc/sysrepo/yang.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-x509-cert-to-name" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-x509-cert-to-name" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-tcp-client" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-tcp-client" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Searching for "ietf-tcp-common" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-tcp-common" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-tcp-client@2019-07-02" successfully parsed as imported.
[INF]: LY: Searching for "ietf-tcp-server" in /etc/sysrepo/yang.
[INF]: LY: Searching for "ietf-tcp-server" in /home/root.
[INF]: LY: Loading schema from "/etc/sysrepo/yang/[email protected]" file.
[INF]: LY: Module "ietf-tcp-server@2019-07-02" successfully parsed as imported.
[INF]: LY: Resolving "ietf-netconf-server" unresolved schema nodes and their constraints...
[INF]: LY: All "ietf-netconf-server" schema nodes and constraints resolved.
[INF]: LY: Module "ietf-netconf-server@2019-07-02" successfully parsed as implemented.
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Listening on 0.0.0.0:830 for SSH connections.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 3, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 2, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[INF]: LN: Accepted a connection on 0.0.0.0:830.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[2019/10/02 07:06:01.030621, 2] ssh_pki_import_privkey_base64: Trying to decode privkey passphrase=false
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.080304, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.084054, 2] ssh_server_connection_callback: SSH client banner: SSH-2.0-libssh_0.9.0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[2019/10/02 07:06:01.086302, 2] ssh_analyze_banner: Analyzing banner: SSH-2.0-libssh_0.9.0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.100027, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.106113, 2] ssh_kex_select_methods: Negotiated curve25519-sha256,ssh-rsa,[email protected],[email protected],[email protected],[email protected],none,none,,
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.110173, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.214010, 2] ssh_packet_server_curve25519_init: SSH_MSG_KEX_ECDH_REPLY sent
[2019/10/02 07:06:01.217308, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks
[2019/10/02 07:06:01.219101, 2] ssh_init_rekey_state: Set rekey after 4294967296 blocks
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[2019/10/02 07:06:01.221868, 2] ssh_packet_server_curve25519_init: SSH_MSG_NEWKEYS sent
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.226747, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[2019/10/02 07:06:01.230854, 2] ssh_packet_newkeys:[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
Received SSH_MSG_NEWKEYS
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:01.239600, 1] ssh_timeout_elapsed: ssh_timeout_elapsed called with -2. this needs to be fixed. please set a breakpoint on misc.c:1093 and fix the caller
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[INF]: LN: Received an SSH message "request-service" of subtype "ssh-userauth".
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[INF]: LN: Received an SSH message "request-auth" of subtype "none".
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[INF]: LN: Received an SSH message "request-auth" of subtype "interactive".
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:02.344661, 2] ssh_message_auth_interactive_request: Warning: Got a keyboard-interactive response but it seems we didn't send the request.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 3, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[INF]: LN: Received an SSH message "request-auth" of subtype "interactive".
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[INF]: LN: User "root" authenticated.
[INF]: LN: Received an SSH message "request-channel-open" of subtype "session".
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[INF]: LN: Received an SSH message "request-channel" of subtype "subsystem".
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:params:netconf:base:1.0</capability><capability>urn:ietf:params:netconf:base:1.1</capability><capability>urn:ietf:params:netconf:capability:writable-running:1.0</capability><capability>urn:ietf:params:netconf:capability:candidate:1.0</capability><capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capability><capability>urn:ietf:params:netconf:capability:validate:1.1</capability><capability>urn:ietf:params:netconf:capability:startup:1.0</capability><capability>urn:ietf:params:netconf:capability:url:1.0</capability><capability>urn:ietf:params:netconf:capability:xpath:1.0</capability><capability>urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode=explicit&amp;also-supported=report-all,report-all-tagged,trim,explicit</capability><capability>urn:ietf:params:netconf:capability:notification:1.0</capability><capability>urn:ietf:params:netconf:capability:interleave:1.0</capability><capability>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: Session 1: sending message:
urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang-metadata&amp;revision=2016-08-05</capability><capability>urn:ietf:params:xml:ns:yang:1?module=yang&amp;revision=2017-02-20</capability><capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&amp;revision=2013-07-15</capability><capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-types&amp;revision=2013-07-15</capability><capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=2019-01-04&amp;module-set-id=28</capability><capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf-acm&amp;revision=2018-02-14</capability><capability>urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&amp;revision=2013-09-29&amp;features=writable-running,candidate,rollback-on-error,validate,startup,url,xpath</capability><capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ietf-netconf-with-defaults&amp;revision=2011-06-01</capability><capability>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[2019/10/02 07:06:03.788416, 2] grow_window: growing window (channel 43:43) to 1280000 bytes
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[2019/10/02 07:06:03.790289, 2] channel_rcv_change_window: Adding 1217017 bytes to channel (43:43) (from 61978 bytes)
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 0, lenght 0
[DBG]: LN: Session 1: sending message:
urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ietf-netconf-notifications&amp;revision=2012-02-06</capability><capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf-netconf-monitoring&amp;revision=2010-10-04</capability><capability>urn:ietf:params:xml:ns:netconf:notification:1.0?module=notifications&amp;revision=2008-07-14</capability><capability>urn:ietf:params:xml:ns:netmod:notification?module=nc-notifications&amp;revision=2008-07-14</capability><capability>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name?module=ietf-x509-cert-to-name&amp;revision=2014-12-10</capability><capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-hash&amp;revision=2014-08-06</capability></capabilities><session-id>1</session-id></hello>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
]]>]]>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: Session 1: received message:
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:params:netconf:base:1.0</capability><capability>urn:ietf:params:netconf:base:1.1</capability></capabilities></hello>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-yang-library</identifier><version>2019-01-04</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 2, head 0, lenght 3
[INF]: NP: Generated new event (netconf-session-start).
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 1, lenght 3
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 2
[INF]: LN: Schema "ietf-yang-library" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-yang-library {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-yang-library";
prefix yanglib;
import ietf-yang-types {
prefix yang;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-inet-types {
prefix inet;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-datastores {
prefix ds;
reference
"RFC 8342: Network Management Datastore Architecture
(NMDA)";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;https://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Andy Bierman
&lt;mailto:[email protected]&gt;
Author: Martin Bjorklund
&lt;mailto:[email protected]&gt;
Author: Juergen Schoenwaelder
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
&lt;mailto:[email protected]&gt;
Author: Kent Watsen
&lt;mailto:[email protected]&gt;
Author: Robert Wilton
&lt;mailto:[email protected]&gt;";
description
"This module provides information about the YANG modules,
datastores, and datastore schemas used by a network
management server.
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
'MAY', and 'OPTIONAL' in this document are to be interpreted as
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
they appear in all capitals, as shown here.
Copyright (c) 2019 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
to the license terms contained in, the Simplified BSD License
set forth in Se
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
ction 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC 8525; see
the RFC itself for full legal notices.";
revision 2019-01-04 {
description
"Added support for multiple datastores according to the
Network Management Datastore Architecture (NMDA).";
reference
"RFC 8525: YANG Library";
}
revision 2016-04-09 {
description
"Initial revision.";
reference
"RFC 7895: YANG Module Library";
}
typedef revision-identifier {
type string {
pattern "\\d{4}-\\d{2}-\\d{2}";
}
description
"Represents a specific date in YYYY-MM-DD format.";
}
grouping module-identification-leafs {
description
"Parameters for identifying YANG modules and submodules.";
leaf name {
type yang:yang-identifier;
mandatory true;
description
"The YANG module or submodule name.";
}
leaf revisi
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
on {
type revision-identifier;
description
"The YANG module or submodule revision date. If no revision
statement is present in the YANG module or submodule, this
leaf is not instantiated.";
}
}
grouping location-leaf-list {
description
"Common leaf-list parameter for the locations of modules and
submodules.";
leaf-list location {
type inet:uri;
description
"Contains a URL that represents the YANG schema
resource for this module or submodule.
This leaf will only be present if there is a URL
available for retrieval of the schema for this entry.";
}
}
grouping module-implementation-parameters {
description
"Parameters for describing the implementation of a module.";
leaf-list feature {
type yang:yang-identifier;
description
"List of all YANG feature names from this module that are
supported by the server, regardless whether they are defined
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 2, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
in the module or any included submodule.";
}
leaf-list deviation {
type leafref {
path "../../module/name";
}
description
"List of all YANG deviation modules used by this server to
modify the conformance of the module associated with this
entry. Note that the same module can be used for deviations
for multiple modules, so the same entry MAY appear within
multiple 'module' entries.
This reference MUST NOT (directly or indirectly)
refer to the module being deviated.
Robust clients may want to make sure that they handle a
situation where a module deviates itself (directly or
indirectly) gracefully.";
}
}
grouping module-set-parameters {
description
"A set of parameters that describe a module set.";
leaf name {
type string;
description
"An arbitrary name of the module set.";
}
list module {
key "name";
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
"An entry in this list represents a module implemented by the
server, as per Section 5.6.5 of RFC 7950, with a particular
set of supported features and deviations.";
reference
"RFC 7950: The YANG 1.1 Data Modeling Language";
uses module-identification-leafs;
leaf namespace {
type inet:uri;
mandatory true;
description
"The XML namespace identifier for this module.";
}
uses location-leaf-list;
list submodule {
key "name";
description
"Each entry represents one submodule within the
parent module.";
uses module-identification-leafs;
uses location-leaf-list;
}
uses module-implementation-parameters;
}
list import-only-module {
key "name revision";
description
"An entry in this list indicates that the server imports
reusable definitions from the specified revision of the
module but does not implement any p
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 5, head 6, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 7, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
rotocol-accessible
objects from this revision.
Multiple entries for the same module name MAY exist. This
can occur if multiple modules import the same module but
specify different revision dates in the import statements.";
leaf name {
type yang:yang-identifier;
description
"The YANG module name.";
}
leaf revision {
type union {
type revision-identifier;
type string {
length "0";
}
}
description
"The YANG module revision date.
A zero-length string is used if no revision statement
is present in the YANG module.";
}
leaf namespace {
type inet:uri;
mandatory true;
description
"The XML namespace identifier for this module.";
}
uses location-leaf-list;
list submodule {
key "name";
description
"Each entry represents one submodule within the
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 8, head 6, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
parent module.";
uses module-identification-leafs;
uses location-leaf-list;
}
}
}
grouping yang-library-parameters {
description
"The YANG library data structure is represented as a grouping
so it can be reused in configuration or another monitoring
data structure.";
list module-set {
key "name";
description
"A set of modules that may be used by one or more schemas.
A module set does not have to be referentially complete,
i.e., it may define modules that contain import statements
for other modules not included in the module set.";
uses module-set-parameters;
}
list schema {
key "name";
description
"A datastore schema that may be used by one or more
datastores.
The schema must be valid and referentially complete, i.e.,
it must contain modules to satisfy all used import
statements for all modules specified in the schema.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
leaf name {
type string;
description
"An arbitrary name of the schema.";
}
leaf-list module-set {
type leafref {
path "../../module-set/name";
}
description
"A set of module-sets that are included in this schema.
If a non-import-only module appears in multiple module
sets, then the module revision and the associated features
and deviations must be identical.";
}
}
list datastore {
key "name";
description
"A datastore supported by this server.
Each datastore indicates which schema it supports.
The server MUST instantiate one entry in this list per
specific datastore it supports.
Each datastore entry with the same datastore schema SHOULD
reference the same schema.";
leaf name {
type ds:datastore-ref;
description
"The identity of the datastore.";
}
leaf schema {
typ
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 8, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
e leafref {
path "../../schema/name";
}
mandatory true;
description
"A reference to the schema supported by this datastore.
All non-import-only modules of the schema are implemented
with their associated features and deviations.";
}
}
}
grouping module-list {
status deprecated;
description
"The module data structure is represented as a grouping
so it can be reused in configuration or another monitoring
data structure.";
grouping common-leafs {
status deprecated;
description
"Common parameters for YANG modules and submodules.";
leaf name {
type yang:yang-identifier;
status deprecated;
description
"The YANG module or submodule name.";
}
leaf revision {
type union {
type revision-identifier;
type string {
length "0";
}
}
status deprecated;
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 9, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
"The YANG module or submodule revision date.
A zero-length string is used if no revision statement
is present in the YANG module or submodule.";
}
}
grouping schema-leaf {
status deprecated;
description
"Common schema leaf parameter for modules and submodules.";
leaf schema {
type inet:uri;
status deprecated;
description
"Contains a URL that represents the YANG schema
resource for this module or submodule.
This leaf will only be present if there is a URL
available for retrieval of the schema for this entry.";
}
}
list module {
key "name revision";
status deprecated;
description
"Each entry represents one revision of one module
currently supported by the server.";
uses common-leafs {
status deprecated;
}
uses schema-leaf {
status deprecated;
}
leaf namespace {
type inet:ur
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 10, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
i;
mandatory true;
status deprecated;
description
"The XML namespace identifier for this module.";
}
leaf-list feature {
type yang:yang-identifier;
status deprecated;
description
"List of YANG feature names from this module that are
supported by the server, regardless of whether they are
defined in the module or any included submodule.";
}
list deviation {
key "name revision";
status deprecated;
description
"List of YANG deviation module names and revisions
used by this server to modify the conformance of
the module associated with this entry. Note that
the same module can be used for deviations for
multiple modules, so the same entry MAY appear
within multiple 'module' entries.
The deviation module MUST be present in the 'module'
list, with the same name and revision values.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
The 'conformance-type' value will be 'implement' for
the deviation module.";
uses common-leafs {
status deprecated;
}
}
leaf conformance-type {
type enumeration {
enum "implement" {
description
"Indicates that the server implements one or more
protocol-accessible objects defined in the YANG module
identified in this entry. This includes deviation
statements defined in the module.
For YANG version 1.1 modules, there is at most one
'module' entry with conformance type 'implement' for a
particular module name, since YANG 1.1 requires that
at most one revision of a module is implemented.
For YANG version 1 modules, there SHOULD NOT be more
than one 'module' entry for a particular module
name.";
}
enum "import" {
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 13, head 14, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 15, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
"Indicates that the server imports reusable definitions
from the specified revision of the module but does
not implement any protocol-accessible objects from
this revision.
Multiple 'module' entries for the same module name MAY
exist. This can occur if multiple modules import the
same module but specify different revision dates in
the import statements.";
}
}
mandatory true;
status deprecated;
description
"Indicates the type of conformance the server is claiming
for the YANG module identified by this entry.";
}
list submodule {
key "name revision";
status deprecated;
description
"Each entry represents one submodule within the
parent module.";
uses common-leafs {
status deprecated;
}
uses schema-leaf {
status deprecated;
}
}
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 14, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
}
}
container yang-library {
config false;
description
"Container holding the entire YANG library of this server.";
uses yang-library-parameters;
leaf content-id {
type string;
mandatory true;
description
"A server-generated identifier of the contents of the
'/yang-library' tree. The server MUST change the value of
this leaf if the information represented by the
'/yang-library' tree, except '/yang-library/content-id', has
changed.";
}
}
container modules-state {
config false;
status deprecated;
description
"Contains YANG module monitoring information.";
leaf module-set-id {
type string;
mandatory true;
status deprecated;
description
"Contains a server-specific identifier representing
the current set of modules and submodules. The
server MUST change the value of this leaf if the
information represented by the 'module' list insta
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 15, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 18, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
nces
has changed.";
}
uses module-list {
status deprecated;
}
}
notification yang-library-update {
description
"Generated when any YANG library information on the
server has changed.";
leaf content-id {
type leafref {
path "/yanglib:yang-library/yanglib:content-id";
}
mandatory true;
description
"Contains the YANG library content identifier for the updated
YANG library at the time the notification is generated.";
}
}
notification yang-library-change {
status deprecated;
description
"Generated when the set of modules and submodules supported
by the server has changed.";
leaf module-set-id {
type leafref {
path "/yanglib:modules-state/yanglib:module-set-id";
}
mandatory true;
status deprecated;
description
"Contains the module-set-id value representing the
set of modules and submodules supported at the server
at t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 19, head 17, lenght 3
[DBG]: LN: Session 1: sending message:
#72
[DBG]: LN: Session 1: sending message:
he time the notification is generated.";
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 17, head 18, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 18, head 19, lenght 1
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 20, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 19, head 20, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 21, head 20, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 20, head 21, lenght 1
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-datastores</identifier><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 22, head 21, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 21, head 22, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 23, head 22, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 22, head 23, lenght 1
[INF]: LN: Schema "ietf-datastores" was requested.
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 23, head 18, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-datastores {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-datastores";
prefix ds;
organization
"IETF Network Modeling (NETMOD) Working Group";
contact
"WG Web: &lt;https://datatracker.ietf.org/wg/netmod/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Martin Bjorklund
&lt;mailto:[email protected]&gt;
Author: Juergen Schoenwaelder
&lt;mailto:[email protected]&gt;
Author: Phil Shafer
&lt;mailto:[email protected]&gt;
Author: Kent Watsen
&lt;mailto:[email protected]&gt;
Author: Rob Wilton
&lt;[email protected]&gt;";
description
"This YANG module defines two sets of identities for datastores.
The first identifies the datastores themselves, the second
identifies datastore
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 2, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
properties.
Copyright (c) 2017 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
the license terms contained in, the Simplified BSD License set
forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(http://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(http://www.rfc-editor.org/info/rfcxxxx); see the RFC itself
for full legal notices.";
revision 2017-08-17 {
description
"Initial revision.";
reference
"RFC XXXX: Network Management Datastore Architecture";
}
identity datastore {
description
"Abstract base identity for datastore identities.";
}
identity conventional {
base datastore;
description
"Abstract base identity for conventional configuration
datastores.";
}
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#847
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
identity running {
base conventional;
description
"The running configuration datastore.";
}
identity candidate {
base conventional;
description
"The candidate configuration datastore.";
}
identity startup {
base conventional;
description
"The startup configuration datastore.";
}
identity intended {
base conventional;
description
"The intended configuration datastore.";
}
identity dynamic {
base datastore;
description
"Abstract base identity for dynamic configuration datastores.";
}
identity operational {
base datastore;
description
"The operational state datastore.";
}
typedef datastore-ref {
type identityref {
base datastore;
}
description
"A datastore identity reference.";
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
##
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 5, head 2, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 6, head 2, lenght 5
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 2, head 3, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 3, head 4, lenght 3
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3"><get xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><filter type="xpath" xmlns:yanglib="urn:ietf:params:xml:ns:yang:ietf-yang-library" select="/yanglib:*"/></get></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 4, head 5, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 5, head 6, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 6, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 4, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 5, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 6, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 3, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 1, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 3, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3"><data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><yang-library xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-library"><module-set><name>complete</name><import-only-module><name>ietf-yang-metadata</name><revision>2016-08-05</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-metadata</namespace></import-only-module><module><name>yang</name><revision>2017-02-20</revision><namespace>urn:ietf:params:xml:ns:yang:1</namespace></module><import-only-module><name>ietf-inet-types</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-inet-types</namespace></import-only-module><import-only-module><name>ietf-yang-types</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-types</namespace></import-only-module><import-only-module><name>ietf-datastores</name><revision>2017-08-17</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-datastores</namespace></import-only-module><module>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 0, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
<name>ietf-yang-library</name><revision>2019-01-04</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-library</namespace></module><module><name>sysrepo</name><revision>2019-09-25</revision><namespace>http://www.sysrepo.org/yang/sysrepo</namespace></module><module><name>ietf-netconf-acm</name><revision>2018-02-14</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-acm</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-netconf</name><revision>2013-09-29</revision><namespace>urn:ietf:params:xml:ns:netconf:base:1.0</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>writable-running</feature><feature>candidate</feature><feature>rollback-on-error</feature><feature>validate</feature><feature>startup</feature><feature>url</feature><feature>xpath</feature></module><module><name>ietf-netconf-with-defaults</name><revision>2011-06-01</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-w
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 1
[DBG]: LN: Session 1: sending message:
ith-defaults</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-netconf-notifications</name><revision>2012-02-06</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-netconf-monitoring</name><revision>2010-10-04</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>notifications</name><revision>2008-07-14</revision><namespace>urn:ietf:params:xml:ns:netconf:notification:1.0</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>nc-notifications</name><revision>2008-07-14</revision><namespace>urn:ietf:params:xml:ns:netmod:notification</namespace><location>file:///etc/sysrepo/yang/nc-notifications@2008
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1021
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 3, lenght 0
[DBG]: LN: Session 1: sending message:
-07-14.yang</location></module><module><name>ietf-x509-cert-to-name</name><revision>2014-12-10</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-crypto-types</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-crypto-types</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></module><module><name>ietf-keystore</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-keystore</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>keystore-supported</feature></module><module><name>ietf-truststore</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-truststore</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>truststore-supported</feature><feature>x509-certificates
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: Session 1: sending message:
#1019
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 2, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
</feature></module><module><name>ietf-tcp-common</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-common</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>keepalives-supported</feature></module><import-only-module><name>ietf-ssh-common</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-common</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><import-only-module><name>iana-crypt-hash</name><revision>2014-08-06</revision><namespace>urn:ietf:params:xml:ns:yang:iana-crypt-hash</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><module><name>ietf-ssh-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>local-client-auth-supported</feature>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 3, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 4, head 2, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
</module><import-only-module><name>ietf-tls-common</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-common</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><module><name>ietf-tls-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>local-client-auth-supported</feature></module><import-only-module><name>ietf-tcp-client</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-client</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><import-only-module><name>ietf-tcp-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location></import-only-module><module><name>ietf-ne
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 3, head 4, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 5, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
tconf-server</name><revision>2019-07-02</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-server</namespace><location>file:///etc/sysrepo/yang/[email protected]</location><feature>ssh-listen</feature><feature>tls-listen</feature><feature>ssh-call-home</feature><feature>tls-call-home</feature></module></module-set><content-id>28</content-id></yang-library><modules-state xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-library"><module><name>ietf-yang-metadata</name><revision>2016-08-05</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-metadata</namespace><conformance-type>import</conformance-type></module><module><name>yang</name><revision>2017-02-20</revision><namespace>urn:ietf:params:xml:ns:yang:1</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-inet-types</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-inet-types</namespace><conformance-type>import</conformance-type></module><module><name>ietf-yang-types
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 4, head 5, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 6, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
#1022
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 7, head 5, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
</name><revision>2013-07-15</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-types</namespace><conformance-type>import</conformance-type></module><module><name>ietf-datastores</name><revision>2017-08-17</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-datastores</namespace><conformance-type>import</conformance-type></module><module><name>ietf-yang-library</name><revision>2019-01-04</revision><namespace>urn:ietf:params:xml:ns:yang:ietf-yang-library</namespace><conformance-type>implement</conformance-type></module><module><name>sysrepo</name><revision>2019-09-25</revision><namespace>http://www.sysrepo.org/yang/sysrepo</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-acm</name><revision>2018-02-14</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-acm</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf</name><revision>2013-09-29
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 6, head 7, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 8, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1021
[DBG]: LN: Session 1: sending message:
</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:netconf:base:1.0</namespace><feature>writable-running</feature><feature>candidate</feature><feature>rollback-on-error</feature><feature>validate</feature><feature>startup</feature><feature>url</feature><feature>xpath</feature><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-with-defaults</name><revision>2011-06-01</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-notifications</name><revision>2012-02-06</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-netconf-monitoring
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 7, head 8, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 9, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 8, head 9, lenght 1
[DBG]: LN: Session 1: sending message:
</name><revision>2010-10-04</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring</namespace><conformance-type>implement</conformance-type></module><module><name>notifications</name><revision>2008-07-14</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:netconf:notification:1.0</namespace><conformance-type>implement</conformance-type></module><module><name>nc-notifications</name><revision>2008-07-14</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:netmod:notification</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-x509-cert-to-name</name><revision>2014-12-10</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name</namespace><conformance-type>implemen
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 10, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 9, head 10, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 11, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
t</conformance-type></module><module><name>ietf-crypto-types</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-crypto-types</namespace><conformance-type>implement</conformance-type></module><module><name>ietf-keystore</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-keystore</namespace><feature>keystore-supported</feature><conformance-type>implement</conformance-type></module><module><name>ietf-truststore</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-truststore</namespace><feature>truststore-supported</feature><feature>x509-certificates</feature><conformance-type>implement</conformance-type></module><module><name>ietf-tcp-common</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 10, head 11, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 12, head 11, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
#1023
[DBG]: LN: Session 1: sending message:
[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-common</namespace><feature>keepalives-supported</feature><conformance-type>implement</conformance-type></module><module><name>ietf-ssh-common</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-common</namespace><conformance-type>import</conformance-type></module><module><name>iana-crypt-hash</name><revision>2014-08-06</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:iana-crypt-hash</namespace><conformance-type>import</conformance-type></module><module><name>ietf-ssh-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-ssh-server</namespace><feature>local-client-auth-supported</feature><conformance-type>implement</conformance-type></module>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 12, head 13, lenght 1
[DBG]: LN: Session 1: sending message:
#1017
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 14, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
<module><name>ietf-tls-common</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-common</namespace><conformance-type>import</conformance-type></module><module><name>ietf-tls-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tls-server</namespace><feature>local-client-auth-supported</feature><conformance-type>implement</conformance-type></module><module><name>ietf-tcp-client</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-client</namespace><conformance-type>import</conformance-type></module><module><name>ietf-tcp-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-tcp-server
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 13, head 14, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 15, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#527
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
</namespace><conformance-type>import</conformance-type></module><module><name>ietf-netconf-server</name><revision>2019-07-02</revision><schema>file:///etc/sysrepo/yang/[email protected]</schema><namespace>urn:ietf:params:xml:ns:yang:ietf-netconf-server</namespace><feature>ssh-listen</feature><feature>tls-listen</feature><feature>ssh-call-home</feature><feature>tls-call-home</feature><conformance-type>implement</conformance-type></module><module-set-id>28</module-set-id></modules-state></data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 14, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 15, head 16, lenght 1
[INF]: NP: Session 1: thread 0 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 17, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 16, head 17, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 18, head 17, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>sysrepo</identifier><version>2019-09-25</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 17, head 18, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 19, head 18, lenght 2
[INF]: LN: Schema "sysrepo" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 18, head 19, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 20, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 19, head 20, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 20, head 15, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module sysrepo {
yang-version 1.1;
namespace "http://www.sysrepo.org/yang/sysrepo";
prefix sr;
import ietf-yang-types {
prefix yang;
}
import ietf-yang-metadata {
prefix md;
revision-date 2016-08-05;
}
organization
"CESNET";
contact
"Author: Michal Vasko
&lt;[email protected]&gt;";
description
"Sysrepo YANG datastore internal attributes and information.";
revision 2019-09-25 {
description
"Added initial startup data for newly installed modules.";
}
revision 2019-09-17 {
description
"Added list of scheduled installed modules.";
}
revision 2019-07-10 {
description
"Initial revision.";
}
md:annotation "orig-key" {
type string;
description
"List keys that were originally preceding the list node instance in the configuration.";
}
md:annotation "orig-value"
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 16, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
{
type string;
description
"Leaf-list value that was originally prceding the leaf-list node instance in the configuration.";
}
md:annotation "orig-dflt" {
type empty;
description
"Present if the node was originally a default node.";
}
typedef module-ref {
type leafref {
path "/sysrepo-modules/module/name";
}
description
"Reference to a module.";
}
grouping module-info-grp {
leaf name {
type string;
description
"Module name.";
}
leaf revision {
type string;
description
"Module revision.";
}
leaf-list enabled-feature {
type string;
description
"List of all the enabled features.";
}
}
grouping deps-grp {
leaf-list module {
type module-ref;
description
"Module that is being dependent on.";
}
list inst-id {
key "xpath";
leaf xpath {
type yang:xpath1.0;
description
"XPath identifying the no
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
de with the dependency.";
}
leaf default-module {
type module-ref;
description
"Module dependency in case the default value is being used.";
}
}
}
container sysrepo-modules {
config false;
description
"All installed Sysrepo modules.";
list module {
key "name";
description
"Sysrepo module.";
uses module-info-grp;
leaf replay-support {
type uint64;
description
"Present only if the module supports replay. Means the earliest stored notification if any present.
Otherwise the time the replay support was switched on.";
}
choice changed-module {
description
"This module is scheduled for a change.";
leaf removed {
type empty;
description
"Module was removed.";
}
leaf updated-yang {
type string;
description
"Module was updated with a newer revision. Content is t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
he whole new YANG module.";
}
case feature-changes {
list changed-feature {
key "name";
description
"Module features are scheduled for a change.";
leaf name {
type string;
description
"Changed feature name.";
}
leaf change {
type enumeration {
enum "enable" {
description
"Feature will be enabled.";
}
enum "disable" {
description
"Feature will be disabled.";
}
}
mandatory true;
description
"Feature change nature.";
}
}
}
}
container data-deps {
description
"Module data dependencies on other modules.";
uses deps-grp;
}
list op-deps {
key "xpath";
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 4, head 2, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 3, head 4, lenght 1
[DBG]: LN: Session 1: sending message:
"Module operation (RPCs, Actions, Notifications) dependencies on other modules.";
leaf xpath {
type yang:xpath1.0;
description
"XPath identifying the operation.";
}
container in {
description
"Operation input or notification dependencies.";
uses deps-grp;
}
container out {
description
"Operation output dependencies.";
uses deps-grp;
}
}
leaf-list inverse-data-deps {
type module-ref;
description
"List of modules that depend on this module.";
}
}
list installed-module {
key "name";
description
"Sysrepo module scheduled to be installed.";
uses module-info-grp;
leaf module-yang {
type string;
mandatory true;
description
"Content is the whole new YANG module.";
}
leaf startup-data {
type string;
description
"
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 5, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#104
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
Initial startup data to be set for the module, in JSON format.";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 7, head 4, lenght 4
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 4, head 5, lenght 3
[INF]: NP: Session 1: thread 1 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 8, head 5, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 9, head 5, lenght 5
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 5, head 6, lenght 4
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-x509-cert-to-name</identifier><version>2014-12-10</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 6, head 7, lenght 3
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 7, head 8, lenght 2
[INF]: LN: Schema "ietf-x509-cert-to-name" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 8, head 9, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 9, head 4, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-x509-cert-to-name {
namespace "urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name";
prefix x509c2n;
import ietf-yang-types {
prefix yang;
}
organization
"IETF NETMOD (NETCONF Data Modeling Language) Working Group";
contact
"WG Web: &lt;http://tools.ietf.org/wg/netmod/&gt;
WG List: &lt;mailto:[email protected]&gt;
WG Chair: Thomas Nadeau
&lt;mailto:[email protected]&gt;
WG Chair: Juergen Schoenwaelder
&lt;mailto:[email protected]&gt;
Editor: Martin Bjorklund
&lt;mailto:[email protected]&gt;
Editor: Juergen Schoenwaelder
&lt;mailto:[email protected]&gt;";
description
"This module contains a collection of YANG definitions for
extracting a name from an X.509 certificate.
The algorithm used
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 0, lenght 4
[DBG]: LN: Session 1: sending message:
to extract a name from an X.509 certificate
was first defined in RFC 6353.
Copyright (c) 2014 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
to the license terms contained in, the Simplified BSD License
set forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(http://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC 7407; see
the RFC itself for full legal notices.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model for
the Simple Network Management Protocol (SNMP)";
revision 2014-12-10 {
description
"Initial revision.";
reference
"RFC 7407: A YANG Data Model for SNMP Configuration";
}
identity cert-to-name {
description
"Base identity for algorithms to derive a name from
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
a
certificate.";
}
identity specified {
base cert-to-name;
description
"Directly specifies the name to be used for the certificate.
The value of the leaf 'name' in the cert-to-name list is
used.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSpecified";
}
identity san-rfc822-name {
base cert-to-name;
description
"Maps a subjectAltName's rfc822Name to a name. The local part
of the rfc822Name is passed unaltered, but the host-part of
the name must be passed in lowercase. For example, the
rfc822Name field [email protected] is mapped to name
[email protected].";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANRFC822Name";
}
identity san-dns-name {
base cert
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 4, lenght 1
[DBG]: LN: Session 1: sending message:
-to-name;
description
"Maps a subjectAltName's dNSName to a name after first
converting it to all lowercase (RFC 5280 does not specify
converting to lowercase, so this involves an extra step).
This mapping results in a 1:1 correspondence between
subjectAltName dNSName values and the name values.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANDNSName";
}
identity san-ip-address {
base cert-to-name;
description
"Maps a subjectAltName's iPAddress to a name by
transforming the binary-encoded address as follows:
1) for IPv4, the value is converted into a
decimal-dotted quad address (e.g., '192.0.2.1').
2) for IPv6 addresses, the value is converted into a
32-character, all-lowercase hexadecimal string
without any colon separators.
This mapping results in a 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 5, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 7, head 4, lenght 4
[DBG]: LN: Session 1: sending message:
:1 correspondence between
subjectAltName iPAddress values and the name values.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANIpAddress";
}
identity san-any {
base cert-to-name;
description
"Maps any of the following fields using the corresponding
mapping algorithms:
+------------+-----------------+
| Type | Algorithm |
|------------+-----------------|
| rfc822Name | san-rfc822-name |
| dNSName | san-dns-name |
| iPAddress | san-ip-address |
+------------+-----------------+
The first matching subjectAltName value found in the
certificate of the above types MUST be used when deriving
the name. The mapping algorithm specified in the
'Algorithm' column MUST be used to derive the name.
This mapping results in a 1:1 correspondence
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
between
subjectAltName values and name values. The three sub-mapping
algorithms produced by this combined algorithm cannot produce
conflicting results between themselves.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANAny";
}
identity common-name {
base cert-to-name;
description
"Maps a certificate's CommonName to a name after converting
it to a UTF-8 encoding. The usage of CommonNames is
deprecated, and users are encouraged to use subjectAltName
mapping methods instead. This mapping results in a 1:1
correspondence between certificate CommonName values and name
values.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertCommonName";
}
typedef tls-fingerprint {
type ya
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 8, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
ng:hex-string {
pattern "([0-9a-fA-F]){2}(:([0-9a-fA-F]){2}){0,254}";
}
description
"A fingerprint value that can be used to uniquely reference
other data of potentially arbitrary length.
A tls-fingerprint value is composed of a 1-octet hashing
algorithm identifier followed by the fingerprint value. The
first octet value identifying the hashing algorithm is taken
from the IANA 'TLS HashAlgorithm Registry' (RFC 5246). The
remaining octets are filled using the results of the hashing
algorithm.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.SnmpTLSFingerprint";
}
grouping cert-to-name {
description
"Defines nodes for mapping certificates to names. Modules
that use this grouping should describe how the resulting
name is used.";
list cert-to-name {
key "id";
description
"Thi
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 6, head 7, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
s list defines how certificates are mapped to names.
The name is derived by considering each cert-to-name
list entry in order. The cert-to-name entry's fingerprint
determines whether the list entry is a match:
1) If the cert-to-name list entry's fingerprint value
matches that of the presented certificate, then consider
the list entry a successful match.
2) If the cert-to-name list entry's fingerprint value
matches that of a locally held copy of a trusted CA
certificate, and that CA certificate was part of the CA
certificate chain to the presented certificate, then
consider the list entry a successful match.
Once a matching cert-to-name list entry has been found, the
map-type is used to determine how the name associated with
the certificate should be determined. See the map-type
leaf's description for details on determining the name value.
If it
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
is impossible to determine a name from the cert-to-name
list entry's data combined with the data presented in the
certificate, then additional cert-to-name list entries MUST
be searched to look for another potential match.
Security administrators are encouraged to make use of
certificates with subjectAltName fields that can be mapped to
names so that a single root CA certificate can allow all
child certificates' subjectAltName fields to map directly to
a name via a 1:1 transformation.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNEntry";
leaf id {
type uint32;
description
"The id specifies the order in which the entries in the
cert-to-name list are searched. Entries with lower
numbers are searched first.";
reference
"RFC 63
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 9, head 10, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 11, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 10, head 11, lenght 1
[DBG]: LN: Session 1: sending message:
53: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNID";
}
leaf fingerprint {
type tls-fingerprint;
mandatory true;
description
"Specifies a value with which the fingerprint of the
full certificate presented by the peer is compared. If
the fingerprint of the full certificate presented by the
peer does not match the fingerprint configured, then the
entry is skipped, and the search for a match continues.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNFingerprint";
}
leaf map-type {
type identityref {
base cert-to-name;
}
mandatory true;
description
"Specifies the algorithm u
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 11, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 11, head 12, lenght 1
[DBG]: LN: Session 1: sending message:
#955
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 13, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 14, head 12, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
sed to map the certificate
presented by the peer to a name.
Mappings that need additional configuration objects should
use the 'when' statement to make them conditional based on
the map-type.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNMapType";
}
leaf name {
when "../map-type = 'x509c2n:specified'";
type string;
mandatory true;
description
"Directly specifies the NETCONF username when the
map-type is 'specified'.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNData";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 13, head 14, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 15, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 14, lenght 3
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 14, head 15, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 17, head 15, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="6"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-crypto-types</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 1
[INF]: LN: Schema "ietf-crypto-types" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 18, head 17, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 19, head 17, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 17, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 19, head 20, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 20, head 15, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 16, lenght 0
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="6"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-crypto-types {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-crypto-types";
prefix ct;
import ietf-yang-types {
prefix yang;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;
Author: Wang Haiguang &lt;[email protected]&gt;";
description
"This module defines common YANG types for cryptographic
applications.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights rese
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 1, lenght 4
[DBG]: LN: Session 1: sending message:
rved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: Common YANG Data Types for Cryptography";
}
typedef hash-algorithm-t {
type union {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Hash algorithm is NULL.";
}
enum "sha1" {
value 1;
status obsolete;
description
"The SHA1 algorithm.";
reference
"RFC 3174: US Secure Hash Algorithms 1 (SHA1).";
}
enum "sha-224" {
value 2;
description
"The SHA-224 algorithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "sha-256" {
value 3;
description
"The SHA-256 algorithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "sha-384" {
value 4;
description
"The SHA-384 algorithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "sha-512" {
value 5;
description
"The SHA-512 alg
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 4, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 5, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
orithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "shake-128" {
value 6;
description
"The SHA3 algorithm with 128-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-224" {
value 7;
description
"The SHA3 algorithm with 224-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-256" {
value 8;
description
"The SHA3 algorithm with 256-bits output.";
reference
"National In
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 7, head 5, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
stitute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-384" {
value 9;
description
"The SHA3 algorithm with 384-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-512" {
value 10;
description
"The SHA3 algorithm with 384-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
}
}
default "0";
descriptio
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 6, head 7, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 8, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
n
"The uint16 filed shall be set by individual protocol families
according to the hash algorithm value assigned by IANA. The
setting is optional and by default is 0. The enumeration
filed is set to the selected hash algorithm.";
}
typedef asymmetric-key-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Asymetric key algorithm is NULL.";
}
enum "rsa1024" {
value 1;
description
"The RSA algorithm using a 1024-bit key.";
reference
"RFC 8017: PKCS #1: RSA Cryptography
Specifications Version 2.2.";
}
enum "rsa2048" {
value 2;
description
"The RSA algorithm using a 2048-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa3072" {
value 3;
d
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
escription
"The RSA algorithm using a 3072-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa4096" {
value 4;
description
"The RSA algorithm using a 4096-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa7680" {
value 5;
description
"The RSA algorithm using a 7680-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa15360" {
value 6;
description
"The RSA algorithm using a 15360-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "secp192r1" {
value 7;
description
"The asymmetric algorithm
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 8, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 9, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
using a NIST P192 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp224r1" {
value 8;
description
"The asymmetric algorithm using a NIST P224 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp256r1" {
value 9;
description
"The asymmetric algorithm using a NIST P256 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp384r1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 10, head 11, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
" {
value 10;
description
"The asymmetric algorithm using a NIST P384 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp521r1" {
value 11;
description
"The asymmetric algorithm using a NIST P521 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "x25519" {
value 12;
description
"The asymmetric algorithm using a x.25519 Curve.";
reference
"RFC 7748:
Elliptic Curves for Security.";
}
enum "x448" {
value 13;
description
"The
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 13, head 11, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 11, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
asymmetric algorithm using a x.448 Curve.";
reference
"RFC 7748:
Elliptic Curves for Security.";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the asymmetric key algorithm value
assigned by IANA. The setting is optional and by default
is 0. The enumeration filed is set to the selected
asymmetric key algorithm.";
}
typedef mac-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"mac algorithm is NULL.";
}
enum "hmac-sha1" {
value 1;
description
"Generating MAC using SHA1 hash function";
reference
"RFC 3174: US Secure Hash Algorithm 1 (SHA1)";
}
enum "hmac-sha1-96" {
value 2;
description
"Generating MAC using SHA1 hash function";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 15, head 13, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 13, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
reference
"RFC 2404: The Use of HMAC-SHA-1-96 within ESP and AH";
}
enum "hmac-sha2-224" {
value 3;
description
"Generating MAC using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-256" {
value 4;
description
"Generating MAC using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-256-128" {
value 5;
description
"Generating a 256 bits MAC using SHA2 hash function and
truncate it to 128 bits";
reference
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512 with IPsec";
}
enum "hmac-sha2-384" {
value 6;
description
"Generating a 384 bits MAC
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 14, head 15, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-384-192" {
value 7;
description
"Generating a 384 bits MAC using SHA2 hash function and
truncate it to 192 bits";
reference
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512 with IPsec";
}
enum "hmac-sha2-512" {
value 8;
description
"Generating a 512 bits MAC using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-512-256" {
value 9;
description
"Generating a 512 bits MAC using SHA2 hash function and
truncate it to 256 bits";
reference
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 18, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
with IPsec";
}
enum "aes-128-gmac" {
value 10;
description
"Generating 128-bit MAC using the Advanced Encryption
Standard (AES) Galois Message Authentication Code
(GMAC) as a mechanism to provide data origin
authentication.";
reference
"RFC 4543:
The Use of Galois Message Authentication Code (GMAC)
in IPsec ESP and AH";
}
enum "aes-192-gmac" {
value 11;
description
"Generating 192-bit MAC using the Advanced Encryption
Standard (AES) Galois Message Authentication Code
(GMAC) as a mechanism to provide data origin
authentication.";
reference
"RFC 4543:
The Use of Galois Message Authentication Code (GMAC)
in IPsec ESP and AH";
}
enum "aes-256-gmac" {
value 12;
description
"Generating 256-bit
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 19, head 17, lenght 3
[DBG]: LN: Session 1: sending message:
MAC using the Advanced Encryption
Standard (AES) Galois Message Authentication Code
(GMAC) as a mechanism to provide data origin
authentication.";
reference
"RFC 4543:
The Use of Galois Message Authentication Code (GMAC)
in IPsec ESP and AH";
}
enum "aes-cmac-96" {
value 13;
description
"Generating 96-bit MAC using Advanced Encryption
Standard (AES) Cipher-based Message Authentication
Code (CMAC)";
reference
"RFC 4494:
The AES-CMAC Algorithm and its Use with IPsec";
}
enum "aes-cmac-128" {
value 14;
description
"Generating 128-bit MAC using Advanced Encryption
Standard (AES) Cipher-based Message Authentication
Code (CMAC)";
reference
"RFC 4494:
The AES-CMAC Algorithm and its Use with IPsec";
}
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 17, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
enum "sha1-des3-kd" {
value 15;
description
"Generating MAC using triple DES encryption function";
reference
"RFC 3961:
Encryption and Checksum Specifications for Kerberos
5";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the mac algorithm value assigned by
IANA. The setting is optional and by default is 0. The
enumeration filed is set to the selected mac algorithm.";
}
typedef encryption-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Encryption algorithm is NULL.";
}
enum "aes-128-cbc" {
value 1;
description
"Encrypt message with AES algorithm in CBC mode with
a key length of 128 bits.";
reference
"RFC 3565: Use of t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
he Advanced Encryption Standard (AES)
Encryption Algorithm in Cryptographic Message Syntax
(CMS)";
}
enum "aes-192-cbc" {
value 2;
description
"Encrypt message with AES algorithm in CBC mode with
a key length of 192 bits";
reference
"RFC 3565: Use of the Advanced Encryption Standard (AES)
Encryption Algorithm in Cryptographic Message Syntax
(CMS)";
}
enum "aes-256-cbc" {
value 3;
description
"Encrypt message with AES algorithm in CBC mode with
a key length of 256 bits";
reference
"RFC 3565: Use of the Advanced Encryption Standard (AES)
Encryption Algorithm in Cryptographic Message Syntax
(CMS)";
}
enum "aes-128-ctr" {
value 4;
description
"Encrypt message with AES algorithm in CTR mode with
a key length of 128
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 20, lenght 3
[DBG]: LN: Session 1: sending message:
bits";
reference
"RFC 3686:
Using Advanced Encryption Standard (AES) Counter
Mode with IPsec Encapsulating Security Payload
(ESP)";
}
enum "aes-192-ctr" {
value 5;
description
"Encrypt message with AES algorithm in CTR mode with
a key length of 192 bits";
reference
"RFC 3686:
Using Advanced Encryption Standard (AES) Counter
Mode with IPsec Encapsulating Security Payload
(ESP)";
}
enum "aes-256-ctr" {
value 6;
description
"Encrypt message with AES algorithm in CTR mode with
a key length of 256 bits";
reference
"RFC 3686:
Using Advanced Encryption Standard (AES) Counter
Mode with IPsec Encapsulating Security Payload
(ESP)";
}
enum "des3-cbc-sha1-kd" {
value 7;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 20, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
description
"Encrypt message with 3DES algorithm in CBC mode
with sha1 function for key derivation";
reference
"RFC 3961:
Encryption and Checksum Specifications for
Kerberos 5";
}
enum "rc4-hmac" {
value 8;
description
"Encrypt message with rc4 algorithm";
reference
"RFC 4757:
The RC4-HMAC Kerberos Encryption Types Used by
Microsoft Windows";
}
enum "rc4-hmac-exp" {
value 9;
description
"Encrypt message with rc4 algorithm that is exportable";
reference
"RFC 4757:
The RC4-HMAC Kerberos Encryption Types Used by
Microsoft Windows";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the encryption algorithm value
assigned by IANA. The set
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 23, head 21, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 21, head 22, lenght 2
[DBG]: LN: Session 1: sending message:
ting is optional and by default
is 0. The enumeration filed is set to the selected
encryption algorithm.";
}
typedef encryption-and-mac-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Encryption and MAC algorithm is NULL.";
reference
"None";
}
enum "aes-128-ccm" {
value 1;
description
"Encrypt message with AES algorithm in CCM
mode with a key length of 128 bits; it can
also be used for generating MAC";
reference
"RFC 4309: Using Advanced Encryption Standard
(AES) CCM Mode with IPsec Encapsulating Security
Payload (ESP)";
}
enum "aes-192-ccm" {
value 2;
description
"Encrypt message with AES algorithm in CCM
mode with a key length of 192 bits; it can
also be used for generatin
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 24, head 22, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 22, head 23, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 25, head 23, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 23, head 24, lenght 2
[DBG]: LN: Session 1: sending message:
g MAC";
reference
"RFC 4309: Using Advanced Encryption Standard
(AES) CCM Mode with IPsec Encapsulating Security
Payload (ESP)";
}
enum "aes-256-ccm" {
value 3;
description
"Encrypt message with AES algorithm in CCM
mode with a key length of 256 bits; it can
also be used for generating MAC";
reference
"RFC 4309: Using Advanced Encryption Standard
(AES) CCM Mode with IPsec Encapsulating Security
Payload (ESP)";
}
enum "aes-128-gcm" {
value 4;
description
"Encrypt message with AES algorithm in GCM
mode with a key length of 128 bits; it can
also be used for generating MAC";
reference
"RFC 4106: The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP)";
}
enum "aes-192-gcm" {
value 5;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 26, head 24, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 24, head 25, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 27, head 25, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 25, head 26, lenght 2
[DBG]: LN: Session 1: sending message:
description
"Encrypt message with AES algorithm in GCM
mode with a key length of 192 bits; it can
also be used for generating MAC";
reference
"RFC 4106: The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP)";
}
enum "aes-256-gcm" {
value 6;
description
"Encrypt message with AES algorithm in GCM
mode with a key length of 256 bits; it can
also be used for generating MAC";
reference
"RFC 4106: The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP)";
}
enum "chacha20-poly1305" {
value 7;
description
"Encrypt message with chacha20 algorithm and generate
MAC with POLY1305; it can also be used for generating
MAC";
reference
"RFC 8439: ChaCha20 and Poly1305 for IETF Protocols";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 26, head 27, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 28, head 27, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 27, head 28, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 29, head 28, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 28, head 29, lenght 1
[DBG]: LN: Session 1: sending message:
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the encryption and mac algorithm value
assigned by IANA. The setting is optional and by default is
0. The enumeration filed is set to the selected encryption
and mac algorithm.";
}
typedef signature-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Signature algorithm is NULL";
}
enum "dsa-sha1" {
value 1;
description
"The signature algorithm using DSA algorithm with SHA1
hash algorithm";
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
enum "rsassa-pkcs1-sha1" {
value 2;
description
"The signature algorithm using RSASSA-PKCS1-v1_5 with
the SHA1 hash algorithm.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 29, head 24, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
enum "rsassa-pkcs1-sha256" {
value 3;
description
"The signature algorithm using RSASSA-PKCS1-v1_5 with
the SHA256 hash algorithm.";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512 in the
Secure Shell (SSH) Protocol
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pkcs1-sha384" {
value 4;
description
"The signature algorithm using RSASSA-PKCS1-v1_5 with
the SHA384 hash algorithm.";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pkcs1-sha512" {
value 5;
description
"The signature algorithm using RS
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ASSA-PKCS1-v1_5 with
the SHA512 hash algorithm.";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512 in the
Secure Shell (SSH) Protocol
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-rsae-sha256" {
value 6;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA256 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-rsae-sha384" {
value 7;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA384 hash algorithm. If
the
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-rsae-sha512" {
value 8;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA512 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-pss-sha256" {
value 9;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA256 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 2, head 3, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-pss-sha384" {
value 10;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA384 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-pss-sha512" {
value 11;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA512 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Prot
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 3, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 3, head 4, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 5, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
ocol
Version 1.3";
}
enum "ecdsa-secp256r1-sha256" {
value 12;
description
"The signature algorithm using ECDSA with curve name
secp256r1 and SHA256 hash algorithm.";
reference
"RFC 5656:
Elliptic Curve Algorithm Integration in the Secure
Shell Transport Layer
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ecdsa-secp384r1-sha384" {
value 13;
description
"The signature algorithm using ECDSA with curve name
secp384r1 and SHA384 hash algorithm.";
reference
"RFC 5656:
Elliptic Curve Algorithm Integration in the Secure
Shell Transport Layer
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ecdsa-secp521r1-sha512" {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 5, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 6, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
value 14;
description
"The signature algorithm using ECDSA with curve name
secp521r1 and SHA512 hash algorithm.";
reference
"RFC 5656:
Elliptic Curve Algorithm Integration in the Secure
Shell Transport Layer
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ed25519" {
value 15;
description
"The signature algorithm using EdDSA with curve x25519";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed25519-cts" {
value 16;
description
"The signature algorithm using EdDSA with curve x25519
with phflag = 0";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed25519-ph" {
value 17;
des
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 8, head 5, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 5, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
cription
"The signature algorithm using EdDSA with curve x25519
with phflag = 1";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed25519-sha512" {
value 18;
description
"The signature algorithm using EdDSA with curve x25519
and SHA-512 function";
reference
"RFC 8419:
Use of Edwards-Curve Digital Signature Algorithm
(EdDSA) Signatures in the Cryptographic Message
Syntax (CMS)";
}
enum "ed448" {
value 19;
description
"The signature algorithm using EdDSA with curve x448";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed448-ph" {
value 20;
description
"The signature algorithm using EdDSA with curve x448
and with PH
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
being SHAKE256(x, 64) and phflag being 1";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed448-shake256" {
value 21;
description
"The signature algorithm using EdDSA with curve x448
and SHAKE-256 function";
reference
"RFC 8419:
Use of Edwards-Curve Digital Signature Algorithm
(EdDSA) Signatures in the Cryptographic Message
Syntax (CMS)";
}
enum "ed448-shake256-len" {
value 22;
description
"The signature algorithm using EdDSA with curve x448
and SHAKE-256 function and a customized hash output";
reference
"RFC 8419:
Use of Edwards-Curve Digital Signature Algorithm
(EdDSA) Signatures in the Cryptographic Message
Syntax (CMS)";
}
enum "rsa-sha2-256" {
value 23;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 7, head 8, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 9, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
description
"The signature algorithm using RSA with SHA2 function
for SSH protocol";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512
in the Secure Shell (SSH) Protocol";
}
enum "rsa-sha2-512" {
value 24;
description
"The signature algorithm using RSA with SHA2 function
for SSH protocol";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512
in the Secure Shell (SSH) Protocol";
}
enum "eccsi" {
value 25;
description
"The signature algorithm using ECCSI signature as
defined in RFC 6507.";
reference
"RFC 6507:
Elliptic Curve-Based Certificateless Signatures
for Identity-based Encryption (ECCSI)";
}
}
}
default "0";
description
"The uint16 filed shall be set by ind
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 10, head 8, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
ividual protocol
families according to the signature algorithm value
assigned by IANA. The setting is optional and by default
is 0. The enumeration filed is set to the selected
signature algorithm.";
}
typedef key-exchange-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Key exchange algorithm is NULL.";
}
enum "psk-only" {
value 1;
description
"Using Pre-shared key for authentication and key
exchange";
reference
"RFC 4279:
Pre-Shared Key cipher suites for Transport Layer
Security (TLS)";
}
enum "dhe-ffdhe2048" {
value 2;
description
"Ephemeral Diffie Hellman key exchange with 2048 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 9, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe3072" {
value 3;
description
"Ephemeral Diffie Hellman key exchange with 3072 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe4096" {
value 4;
description
"Ephemeral Diffie Hellman key exchange with 4096 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe6144" {
value 5;
description
"Ephemeral Diffie Hellman key exchange with 6144 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellma
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 10, head 11, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 11, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
n Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe8192" {
value 6;
description
"Ephemeral Diffie Hellman key exchange with 8192 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "psk-dhe-ffdhe2048" {
value 7;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE2048";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe3072" {
value 8;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE30
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 14, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 15, head 13, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
72";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe4096" {
value 9;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE4096";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe6144" {
value 10;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE6144";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe8192" {
value 11;
description
"Key exchange using pre-shared key with Diffie-H
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 13, head 14, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ellman
key generation mechanism, where the DH group is
FFDHE8192";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ecdhe-secp256r1" {
value 12;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve secp256r1";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "ecdhe-secp384r1" {
value 13;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve secp384r1";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
en
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 14, head 15, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
um "ecdhe-secp521r1" {
value 14;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve secp521r1";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "ecdhe-x25519" {
value 15;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve x25519";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "ecdhe-x448" {
value 16;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve x448";
reference
"RFC 8422:
Elliptic Curve Cryptography (E
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 18, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
CC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "psk-ecdhe-secp256r1" {
value 17;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve secp256r1";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-secp384r1" {
value 18;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve secp384r1";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-secp521r1" {
value 19;
description
"Key exchange using pre-shared key with elliptic
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 19, head 17, lenght 3
[DBG]: LN: Session 1: sending message:
group-based Ephemeral Diffie Hellman key exchange
over curve secp521r1";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-x25519" {
value 20;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve x25519";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-x448" {
value 21;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve x448";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "diffie-hellman-group14-sha1" {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 17, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
value 22;
description
"Using DH group14 and SHA1 for key exchange";
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
enum "diffie-hellman-group14-sha256" {
value 23;
description
"Using DH group14 and SHA-256 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group15-sha512" {
value 24;
description
"Using DH group15 and SHA-512 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group16-sha512" {
value 25;
description
"Using DH group16 and SHA-512
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group17-sha512" {
value 26;
description
"Using DH group17 and SHA-512 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group18-sha512" {
value 27;
description
"Using DH group18 and SHA-512 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "ecdh-sha2-secp256r1" {
value 28;
description
"Elliptic curve-based Diffie Hellman key exchange ove
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 19, head 20, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 22, head 20, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 20, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
r
curve ecp256r1 and using SHA2 for MAC generation";
reference
"RFC 6239:
Suite B Cryptographic Suites for Secure Shell (SSH)";
}
enum "ecdh-sha2-secp384r1" {
value 29;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve ecp384r1 and using SHA2 for MAC generation";
reference
"RFC 6239:
Suite B Cryptographic Suites for Secure Shell (SSH)";
}
enum "ecdh-x25519-x9.63-sha256" {
value 30;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using ANSI x9.63 with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-x9.63-sha384" {
valu
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 21, head 22, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 23, head 22, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 24, head 22, lenght 3
[DBG]: LN: Session 1: sending message:
e 31;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using ANSI x9.63 with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-x9.63-sha512" {
value 32;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using ANSI x9.63 with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-hkdf-sha256" {
value 33;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and usi
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 22, head 23, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 25, head 23, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 23, head 24, lenght 2
[DBG]: LN: Session 1: sending message:
ng HKDF with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-hkdf-sha384" {
value 34;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using HKDF with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-hkdf-sha512" {
value 35;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using HKDF with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 24, head 25, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 26, head 25, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 27, head 25, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 25, head 26, lenght 2
[DBG]: LN: Session 1: sending message:
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-x9.63-sha256" {
value 36;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using ANSI x9.63 with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-x9.63-sha384" {
value 37;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using ANSI x9.63 with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 26, head 27, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 28, head 27, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 29, head 27, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 27, head 28, lenght 2
[DBG]: LN: Session 1: sending message:
48-x9.63-sha512" {
value 38;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using ANSI x9.63 with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-hkdf-sha256" {
value 39;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using HKDF with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-hkdf-sha384" {
value 40;
description
"Elliptic curve-based Diffie Hellman key exchange over
cur
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 28, head 29, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 30, head 29, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 31, head 29, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 29, head 30, lenght 2
[DBG]: LN: Session 1: sending message:
ve x.448 and using HKDF with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-hkdf-sha512" {
value 41;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using HKDF with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "rsaes-oaep" {
value 42;
description
"RSAES-OAEP combines the RSAEP and RSADP primitives with
the EME-OAEP encoding method";
reference
"RFC 8017:
PKCS #1:
RSA Cryptography Specifications Version 2.2.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 30, head 31, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 32, head 31, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 33, head 31, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 31, head 32, lenght 2
[DBG]: LN: Session 1: sending message:
}
enum "rsaes-pkcs1-v1_5" {
value 43;
description
"RSAES-PKCS1-v1_5 combines the RSAEP and RSADP
primitives with the EME-PKCS1-v1_5 encoding method";
reference
"RFC 8017:
PKCS #1:
RSA Cryptography Specifications Version 2.2.";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the key exchange algorithm value
assigned by IANA. The setting is optional and by default
is 0. The enumeration filed is set to the selected key
exchange algorithm.";
}
typedef x509 {
type binary;
description
"A Certificate structure, as specified in RFC 5280,
encoded using ASN.1 distinguished encoding rules (DER),
as specified in ITU-T X.690.";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 32, head 33, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 34, head 33, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 33, head 34, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 35, head 34, lenght 2
[DBG]: LN: Session 1: sending message:
(CRL) Profile
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
typedef crl {
type binary;
description
"A CertificateList structure, as specified in RFC 5280,
encoded using ASN.1 distinguished encoding rules (DER),
as specified in ITU-T X.690.";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
typedef cms {
type binary;
description
"A ContentInfo structure, as specified in RFC 5652,
encoded using ASN.1 distinguished encoding rules (DER),
as specified in ITU-
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 34, head 35, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 36, head 35, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 37, head 35, lenght 3
[DBG]: LN: Session 1: sending message:
T X.690.";
reference
"RFC 5652:
Cryptographic Message Syntax (CMS)
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
typedef data-content-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
data content type, as described by Section 4 in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef signed-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
signed-data content type, as described by Section 5 in
RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef enveloped-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
enveloped-data content type, as described by
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 35, head 36, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 38, head 36, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
Section 6
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef digested-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
digested-data content type, as described by Section 7
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef encrypted-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
encrypted-data content type, as described by Section 8
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef authenticated-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
authenticated-data content type, as described by Section 9
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef ssh-host-key {
type binary;
description
"The
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 36, head 37, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 39, head 37, lenght 3
[DBG]: LN: Session 1: sending message:
binary public key data for this SSH key, as
specified by RFC 4253, Section 6.6, i.e.:
string certificate or public key format
identifier
byte[n] key/certificate data.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer
Protocol";
}
typedef trust-anchor-cert-x509 {
type x509;
description
"A Certificate structure that MUST encode a self-signed
root certificate.";
}
typedef end-entity-cert-x509 {
type x509;
description
"A Certificate structure that MUST encode a certificate
that is neither self-signed nor having Basic constraint
CA true.";
}
typedef trust-anchor-cert-cms {
type signed-data-cms;
description
"A CMS SignedData structure that MUST contain the chain of
X.509 certificates needed to authenticate the certificate
presented by a client or end-entity.
The CMS MUST contain only a single chain of certificates.
The cli
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 37, head 38, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 40, head 38, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 38, head 39, lenght 2
[DBG]: LN: Session 1: sending message:
ent or end-entity certificate MUST only authenticate
to last intermediate CA certificate listed in the chain.
In all cases, the chain MUST include a self-signed root
certificate. In the case where the root certificate is
itself the issuer of the client or end-entity certificate,
only one certificate is present.
This CMS structure MAY (as applicable where this type is
used) also contain suitably fresh (as defined by local
policy) revocation objects with which the device can
verify the revocation status of the certificates.
This CMS encodes the degenerate form of the SignedData
structure that is commonly used to disseminate X.509
certificates and revocation objects (RFC 5280).";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile.";
}
typedef end-entity-cert-cms {
type signed-data-cms;
description
"A CMS SignedD
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 39, head 40, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 41, head 40, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 42, head 40, lenght 3
[DBG]: LN: Session 1: sending message:
ata structure that MUST contain the end
entity certificate itself, and MAY contain any number
of intermediate certificates leading up to a trust
anchor certificate. The trust anchor certificate
MAY be included as well.
The CMS MUST contain a single end entity certificate.
The CMS MUST NOT contain any spurious certificates.
This CMS structure MAY (as applicable where this type is
used) also contain suitably fresh (as defined by local
policy) revocation objects with which the device can
verify the revocation status of the certificates.
This CMS encodes the degenerate form of the SignedData
structure that is commonly used to disseminate X.509
certificates and revocation objects (RFC 5280).";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile.";
}
grouping symmetric-key-grouping {
description
"A symmetric key
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 40, head 41, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 43, head 41, lenght 3
[DBG]: LN: Session 1: sending message:
and algorithm.";
leaf algorithm {
type encryption-algorithm-t;
mandatory true;
description
"The algorithm to be used when generating the key.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
choice key-type {
mandatory true;
description
"Choice between key types.";
leaf key {
nacm:default-deny-all;
type binary;
description
"The binary value of the key. The interpretation of
the value is defined by 'algorithm'. For example,
FIXME.";
reference
"RFC XXXX: FIXME";
}
leaf hidden-key {
nacm:default-deny-write;
type empty;
description
"A permanently hidden key. How such keys are created
is outside the scope of this module.";
}
}
}
grouping public-key-grouping {
description
"A public key and its associated algorithm.";
leaf algorithm {
nacm:default-deny-w
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 41, head 42, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 44, head 42, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 42, head 43, lenght 2
[DBG]: LN: Session 1: sending message:
rite;
type asymmetric-key-algorithm-t;
mandatory true;
description
"Identifies the key's algorithm.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
leaf public-key {
nacm:default-deny-write;
type binary;
mandatory true;
description
"The binary value of the public key. The interpretation
of the value is defined by 'algorithm'. For example,
a DSA key is an integer, an RSA key is represented as
RSAPublicKey per RFC 8017, and an ECC key is represented
using the 'publicKey' described in RFC 5915.";
reference
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1:
RSA Cryptography Specifications Version 2.2.
RFC 5915: Elliptic Curve Private Key Structure.";
}
}
grouping asymmetric-key-pair-grouping {
description
"A private key and its associated public key and algorithm.";
uses public-key-grouping;
choice priva
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 43, head 44, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 45, head 44, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 46, head 44, lenght 3
[DBG]: LN: Session 1: sending message:
te-key-type {
mandatory true;
description
"Choice between key types.";
leaf private-key {
nacm:default-deny-all;
type binary;
description
"The value of the binary key. The key's value is
interpreted by the 'algorithm'. For example, a DSA key
is an integer, an RSA key is represented as RSAPrivateKey
as defined in RFC 8017, and an ECC key is represented as
ECPrivateKey as defined in RFC 5915.";
reference
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1:
RSA Cryptography Specifications Version 2.2.
RFC 5915: Elliptic Curve Private Key Structure.";
}
leaf hidden-private-key {
nacm:default-deny-write;
type empty;
description
"A permanently hidden key. How such keys are created
is outside the scope of this module.";
}
}
}
grouping trust-anchor-cert-grouping {
description
"A
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 44, head 45, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 47, head 45, lenght 3
[DBG]: LN: Session 1: sending message:
trust anchor certificate, and a notification for when
it is about to (or already has) expire.";
leaf cert {
nacm:default-deny-write;
type trust-anchor-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once a day thereafter until the issue is resolved.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the certificate.";
}
}
}
grouping trust-anchor-c
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 45, head 46, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 48, head 46, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 46, head 47, lenght 2
[DBG]: LN: Session 1: sending message:
erts-grouping {
description
"A list of trust anchor certificates, and a notification
for when one is about to (or already has) expire.";
leaf-list cert {
nacm:default-deny-write;
type trust-anchor-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once a day thereafter until the issue is resolved.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the cert
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 47, head 48, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 49, head 48, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 50, head 48, lenght 3
[DBG]: LN: Session 1: sending message:
ificate.";
}
}
}
grouping end-entity-cert-grouping {
description
"An end entity certificate, and a notification for when
it is about to (or already has) expire. Implementations
SHOULD assert that, where used, the end entity certificate
contains the expected public key.";
leaf cert {
nacm:default-deny-write;
type end-entity-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once a day thereafter until the issue is resolved.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 48, head 49, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 51, head 49, lenght 3
[DBG]: LN: Session 1: sending message:
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the certificate.";
}
}
}
grouping end-entity-certs-grouping {
description
"A list of end entity certificates, and a notification for
when one is about to (or already has) expire.";
leaf-list cert {
nacm:default-deny-write;
type end-entity-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 49, head 50, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 52, head 50, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
a day thereafter until the issue is resolved.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the certificate.";
}
}
}
grouping asymmetric-key-pair-with-cert-grouping {
description
"A private/public key pair and an associated certificate.
Implementations SHOULD assert that certificates contain
the matching public key.";
uses asymmetric-key-pair-grouping;
uses end-entity-cert-grouping;
action generate-certificate-signing-request {
nacm:default-deny-all;
description
"Generates a certificate signing request structure for
the associated asymmetric key using the passed subject
and attribute values. The specified assertions need
to be appropriate for the certificate's use. For
example, an entity certificate for a TLS server
SHOULD have values that enable clients to satisfy
RFC 6125 pro
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 50, head 51, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 53, head 51, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
cessing.";
input {
leaf subject {
type binary;
mandatory true;
description
"The 'subject' field per the CertificationRequestInfo
structure as specified by RFC 2986, Section 4.1
encoded using the ASN.1 distinguished encoding
rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
leaf attributes {
type binary;
description
"The 'attributes' field from the structure
CertificationRequestInfo as specified by RFC 2986,
Section 4.1 encoded using the ASN.1 distingu
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 51, head 52, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 54, head 52, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ished
encoding rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
output {
leaf certificate-signing-request {
type binary;
mandatory true;
description
"A CertificationRequest structure as specified by
RFC 2986, Section 4.2 encoded using the ASN.1
distinguished encoding rules (DER), as specified
in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 52, head 53, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 55, head 53, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 53, head 54, lenght 2
[DBG]: LN: Session 1: sending message:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
}
}
grouping asymmetric-key-pair-with-certs-grouping {
description
"A private/public key pair and associated certificates.
Implementations SHOULD assert that certificates contain
the matching public key.";
uses asymmetric-key-pair-grouping;
container certificates {
nacm:default-deny-write;
description
"Certificates associated with this asymmetric key.
More than one certificate supports, for instance,
a TPM-protected asymmetric key that has both IDevID
and LDevID certificates associated.";
list certificate {
key "name";
description
"A certificate for this asymmetric key.";
leaf name {
type string;
description
"An arbitrary name
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 54, head 55, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 56, head 55, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 57, head 55, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 55, head 56, lenght 2
[DBG]: LN: Session 1: sending message:
for the certificate. If the name
matches the name of a certificate that exists
independently in &lt;operational&gt; (i.e., an IDevID),
then the 'cert' node MUST NOT be configured.";
}
uses end-entity-cert-grouping;
}
}
action generate-certificate-signing-request {
nacm:default-deny-all;
description
"Generates a certificate signing request structure for
the associated asymmetric key using the passed subject
and attribute values. The specified assertions need
to be appropriate for the certificate's use. For
example, an entity certificate for a TLS server
SHOULD have values that enable clients to satisfy
RFC 6125 processing.";
input {
leaf subject {
type binary;
mandatory true;
description
"The 'subject' field per the CertificationRequestInfo
structure as specified by RFC 2986, Section 4.1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 56, head 57, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 58, head 57, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 59, head 57, lenght 3
[DBG]: LN: Session 1: sending message:
encoded using the ASN.1 distinguished encoding
rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
leaf attributes {
type binary;
description
"The 'attributes' field from the structure
CertificationRequestInfo as specified by RFC 2986,
Section 4.1 encoded using the ASN.1 distinguished
encoding rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 57, head 58, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 60, head 58, lenght 3
[DBG]: LN: Session 1: sending message:
#1016
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 58, head 59, lenght 2
[DBG]: LN: Session 1: sending message:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
output {
leaf certificate-signing-request {
type binary;
mandatory true;
description
"A CertificationRequest structure as specified by
RFC 2986, Section 4.2 encoded using the ASN.1
distinguished encoding rules (DER), as specified
in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
}
}
}
</data>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 59, head 60, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 61, head 60, lenght 2
[DBG]: LN: Session 1: sending message:
#12
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 60, head 61, lenght 1
[DBG]: LN: Session 1: sending message:
</rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 62, head 61, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 61, head 62, lenght 1
[INF]: NP: Session 1: thread 4 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 63, head 62, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 64, head 62, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 62, head 63, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 65, head 63, lenght 3
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="7"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-keystore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 63, head 64, lenght 2
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 66, head 64, lenght 3
[INF]: LN: Schema "ietf-keystore" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 64, head 65, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 65, head 66, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 66, head 61, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="7"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-keystore {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-keystore";
prefix ks;
import ietf-crypto-types {
prefix ct;
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;";
description
"This module defines a keystore to centralize management
of security credentials.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and bin
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 1, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC VVVV: A YANG Data Model for a Keystore";
}
feature keystore-supported {
description
"The 'keystore-supported' feature indicates that the
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
server
supports the keystore.";
}
feature local-definitions-supported {
description
"The 'local-definitions-supported' feature indicates that the
server supports locally-defined keys.";
}
feature key-generation {
description
"Indicates that the server supports the actions related to
the life cycling keys in &lt;operational&gt;. To be used by
configuration, keys in &lt;operational&gt; must be copied to
&lt;running&gt;.";
}
typedef asymmetric-key-ref {
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name";
}
description
"This typedef enables modules to easily define a reference
to an asymmetric key stored in the keystore.";
}
grouping key-reference-type-grouping {
description
"A reusable grouping for a choice for the type of key
referenced in the keystore.";
choice key-type {
mandatory true;
description
"A choice between a reference to a s
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
ymmetric or asymmetric
key in the keystore.";
leaf symmetric-key-ref {
if-feature "keystore-supported";
type leafref {
path "/ks:keystore/ks:symmetric-keys/ks:symmetric-key/ks:name";
}
description
"Identifies a symmetric key used to encrypt this key.";
}
leaf asymmetric-key-ref {
if-feature "keystore-supported";
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name";
}
description
"Identifies an asymmetric key used to encrypt this key.";
}
}
}
grouping encrypted-value-grouping {
description
"A reusable grouping for a value that has been encrypted by
a symmetric or asymmetric key in the keystore.";
uses key-reference-type-grouping;
leaf value {
type binary;
description
"The private key, encrypted using the specified symmetric
or asymmetric key.";
}
}
grouping symmetric-key-group
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 7, head 5, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 5, head 6, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 8, head 6, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ing {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:symmetric-key-grouping {
augment "key-type" {
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-key {
description
"A container for the encrypted symmetric key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-pair-grouping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:asymmetric-key-pair-grouping {
augment "private-key-type" {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 7, head 8, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 9, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 10, head 8, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-private-key {
description
"A container for the encrypted asymmetric private
key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-pair-with-cert-grouping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:asymmetric-key-pair-with-cert-grouping {
augment "private-key-type" {
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-private-key {
description
"A container for the encrypted asymmetric private
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 9, head 10, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 11, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 10, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-pair-with-certs-grouping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:asymmetric-key-pair-with-certs-grouping {
augment "private-key-type" {
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-private-key {
description
"A container for the encrypted asymmetric private
key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-certificate-ref-grouping {
description
"This grouping defines a reference to a specific certificate
associated with an asymmetric k
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 11, head 12, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 13, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
ey stored in the keystore.";
leaf asymmetric-key {
type asymmetric-key-ref;
must "../certificate";
description
"A reference to an asymmetric key in the keystore.";
}
leaf certificate {
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key[ks:name = current()/../asymmetric-key]/ks:certificates/ks:certificate/ks:name";
}
must "../asymmetric-key";
description
"A reference to a specific certificate of the
asymmetric key in the keystore.";
}
}
grouping local-or-keystore-asymmetric-key-grouping {
description
"A grouping that expands to allow the asymmetric key to be
either stored locally, within the using data model, or be
a reference to an asymmetric key stored in the keystore.";
choice local-or-keystore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the keystore.";
case local {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 12, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 15, head 13, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local key definition.";
uses asymmetric-key-pair-grouping;
}
}
case keystore {
if-feature "keystore-supported";
leaf keystore-reference {
type asymmetric-key-ref;
description
"A reference to an asymmetric key that exists in
the keystore. The intent is to reference just the
asymmetric key, not any certificates that may also
be associated with the asymmetric key.";
}
}
}
}
grouping local-or-keystore-asymmetric-key-with-certs-grouping {
description
"A grouping that expands to allow an asymmetric key and its
associated certificates to be either stored locally, within
the using data model, or be a reference to an asymmetric key
(and its associated certificates) stored in the keystore.";
choice local-or-key
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 13, head 14, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 14, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
store {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the keystore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local key definition.";
uses asymmetric-key-pair-with-certs-grouping;
}
}
case keystore {
if-feature "keystore-supported";
leaf keystore-reference {
type asymmetric-key-ref;
description
"A reference to an asymmetric-key (and all of its
associated certificates) in the keystore.";
}
}
}
}
grouping local-or-keystore-end-entity-cert-with-key-grouping {
description
"A grouping that expands to allow an end-entity certificate
(and its associated private key) to be either stored locally,
within the using data model, or be a reference to a specific
certificate in t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 15, head 16, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 17, head 16, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 18, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
he keystore.";
choice local-or-keystore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the keystore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local key definition.";
uses asymmetric-key-pair-with-cert-grouping;
}
}
case keystore {
if-feature "keystore-supported";
container keystore-reference {
description
"A reference to a specific certificate (and its
associated private key) in the keystore.";
uses asymmetric-key-certificate-ref-grouping;
}
}
}
}
grouping keystore-grouping {
description
"Grouping definition enables use in other contexts. If ever
done, implementations SHOULD augment new 'case' statements
into local-or-keystore 'choice' statements to supply leafref
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 16, head 17, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 19, head 17, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 17, head 18, lenght 2
[DBG]: LN: Session 1: sending message:
s
to the new location.";
container asymmetric-keys {
description
"A list of asymmetric keys.";
list asymmetric-key {
key "name";
description
"An asymmetric key.";
leaf name {
type string;
description
"An arbitrary name for the asymmetric key.";
}
uses ks:asymmetric-key-pair-with-certs-grouping;
}
}
container symmetric-keys {
description
"A list of symmetric keys.";
list symmetric-key {
key "name";
description
"A symmetric key.";
leaf name {
type string;
description
"An arbitrary name for the symmetric key.";
}
uses ks:symmetric-key-grouping;
}
}
}
container keystore {
nacm:default-deny-write;
description
"The keystore contains a list of keys.";
uses keystore-grouping;
}
rpc generate-symmetric-key {
description
"Requests the device to
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 18, head 19, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 20, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
generate an symmetric key using
the specified key algorithm, optionally encrypted using
a key in the keystore. The output is this RPC can be
used as input to a subsequent configuration request.";
input {
leaf algorithm {
type ct:encryption-algorithm-t;
mandatory true;
description
"The algorithm to be used when generating the key.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
container encrypt-with {
presence "Indicates that the key should be encrypted using
the specified symmetric or asymmetric key. If not
specified, then the private key is not encrypted
when returned.";
description
"A container for the 'key-type' choice.";
uses key-reference-type-grouping;
}
}
output {
uses ks:symmetric-key-grouping;
}
}
rpc generate-asymmetric-key {
description
"Requests the device to generate an asymmetric
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
#931
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 20, lenght 3
[DBG]: LN: Session 1: sending message:
key using
the specified key algorithm, optionally encrypted using
a key in the keystore. The output is this RPC can be
used as input to a subsequent configuration request.";
input {
leaf algorithm {
type ct:asymmetric-key-algorithm-t;
mandatory true;
description
"The algorithm to be used when generating the key.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
container encrypt-with {
presence "Indicates that the key should be encrypted using
the specified symmetric or asymmetric key. If not
specified, then the private key is not encrypted
when returned.";
description
"A container for the 'key-type' choice.";
uses key-reference-type-grouping;
}
}
output {
uses ks:asymmetric-key-pair-grouping;
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 20, head 21, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 23, head 21, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 21, head 22, lenght 2
[DBG]: LN: Session 1: sending message:
##
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 24, head 22, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 22, head 23, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 23, head 24, lenght 1
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="8"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-crypto-types</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 24, head 19, lenght 0
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[INF]: LN: Schema "ietf-crypto-types" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 21, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 22, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 24, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 0, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 0
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="8"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-crypto-types {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-crypto-types";
prefix ct;
import ietf-yang-types {
prefix yang;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;
Author: Wang Haiguang &lt;[email protected]&gt;";
description
"This module defines common YANG types for cryptographic
applications.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights rese
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 1, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
rved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: Common YANG Data Types for Cryptography";
}
typedef hash-algorithm-t {
type union {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Hash algorithm is NULL.";
}
enum "sha1" {
value 1;
status obsolete;
description
"The SHA1 algorithm.";
reference
"RFC 3174: US Secure Hash Algorithms 1 (SHA1).";
}
enum "sha-224" {
value 2;
description
"The SHA-224 algorithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "sha-256" {
value 3;
description
"The SHA-256 algorithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "sha-384" {
value 4;
description
"The SHA-384 algorithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "sha-512" {
value 5;
description
"The SHA-512 alg
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 3, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
orithm.";
reference
"RFC 6234: US Secure Hash Algorithms.";
}
enum "shake-128" {
value 6;
description
"The SHA3 algorithm with 128-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-224" {
value 7;
description
"The SHA3 algorithm with 224-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-256" {
value 8;
description
"The SHA3 algorithm with 256-bits output.";
reference
"National In
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
stitute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-384" {
value 9;
description
"The SHA3 algorithm with 384-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
enum "shake-512" {
value 10;
description
"The SHA3 algorithm with 384-bits output.";
reference
"National Institute of Standards and Technology,
SHA-3 Standard: Permutation-Based Hash and
Extendable-Output Functions, FIPS PUB 202, DOI
10.6028/NIST.FIPS.202, August 2015.";
}
}
}
default "0";
descriptio
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 6, head 7, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 8, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
n
"The uint16 filed shall be set by individual protocol families
according to the hash algorithm value assigned by IANA. The
setting is optional and by default is 0. The enumeration
filed is set to the selected hash algorithm.";
}
typedef asymmetric-key-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Asymetric key algorithm is NULL.";
}
enum "rsa1024" {
value 1;
description
"The RSA algorithm using a 1024-bit key.";
reference
"RFC 8017: PKCS #1: RSA Cryptography
Specifications Version 2.2.";
}
enum "rsa2048" {
value 2;
description
"The RSA algorithm using a 2048-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa3072" {
value 3;
d
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
escription
"The RSA algorithm using a 3072-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa4096" {
value 4;
description
"The RSA algorithm using a 4096-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa7680" {
value 5;
description
"The RSA algorithm using a 7680-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "rsa15360" {
value 6;
description
"The RSA algorithm using a 15360-bit key.";
reference
"RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2.";
}
enum "secp192r1" {
value 7;
description
"The asymmetric algorithm
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 8, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 9, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
using a NIST P192 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp224r1" {
value 8;
description
"The asymmetric algorithm using a NIST P224 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp256r1" {
value 9;
description
"The asymmetric algorithm using a NIST P256 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp384r1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 10, head 11, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 12, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
" {
value 10;
description
"The asymmetric algorithm using a NIST P384 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "secp521r1" {
value 11;
description
"The asymmetric algorithm using a NIST P521 Curve.";
reference
"RFC 6090:
Fundamental Elliptic Curve Cryptography Algorithms.
RFC 5480:
Elliptic Curve Cryptography Subject Public Key
Information.";
}
enum "x25519" {
value 12;
description
"The asymmetric algorithm using a x.25519 Curve.";
reference
"RFC 7748:
Elliptic Curves for Security.";
}
enum "x448" {
value 13;
description
"The
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
asymmetric algorithm using a x.448 Curve.";
reference
"RFC 7748:
Elliptic Curves for Security.";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the asymmetric key algorithm value
assigned by IANA. The setting is optional and by default
is 0. The enumeration filed is set to the selected
asymmetric key algorithm.";
}
typedef mac-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"mac algorithm is NULL.";
}
enum "hmac-sha1" {
value 1;
description
"Generating MAC using SHA1 hash function";
reference
"RFC 3174: US Secure Hash Algorithm 1 (SHA1)";
}
enum "hmac-sha1-96" {
value 2;
description
"Generating MAC using SHA1 hash function";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 12, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 15, head 13, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 13, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 14, head 15, lenght 1
[DBG]: LN: Session 1: sending message:
reference
"RFC 2404: The Use of HMAC-SHA-1-96 within ESP and AH";
}
enum "hmac-sha2-224" {
value 3;
description
"Generating MAC using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-256" {
value 4;
description
"Generating MAC using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-256-128" {
value 5;
description
"Generating a 256 bits MAC using SHA2 hash function and
truncate it to 128 bits";
reference
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512 with IPsec";
}
enum "hmac-sha2-384" {
value 6;
description
"Generating a 384 bits MAC
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 15, head 10, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-384-192" {
value 7;
description
"Generating a 384 bits MAC using SHA2 hash function and
truncate it to 192 bits";
reference
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512 with IPsec";
}
enum "hmac-sha2-512" {
value 8;
description
"Generating a 512 bits MAC using SHA2 hash function";
reference
"RFC 6234: US Secure Hash Algorithms
(SHA and SHA-based HMAC and HKDF)";
}
enum "hmac-sha2-512-256" {
value 9;
description
"Generating a 512 bits MAC using SHA2 hash function and
truncate it to 256 bits";
reference
"RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
with IPsec";
}
enum "aes-128-gmac" {
value 10;
description
"Generating 128-bit MAC using the Advanced Encryption
Standard (AES) Galois Message Authentication Code
(GMAC) as a mechanism to provide data origin
authentication.";
reference
"RFC 4543:
The Use of Galois Message Authentication Code (GMAC)
in IPsec ESP and AH";
}
enum "aes-192-gmac" {
value 11;
description
"Generating 192-bit MAC using the Advanced Encryption
Standard (AES) Galois Message Authentication Code
(GMAC) as a mechanism to provide data origin
authentication.";
reference
"RFC 4543:
The Use of Galois Message Authentication Code (GMAC)
in IPsec ESP and AH";
}
enum "aes-256-gmac" {
value 12;
description
"Generating 256-bit
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 4, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
MAC using the Advanced Encryption
Standard (AES) Galois Message Authentication Code
(GMAC) as a mechanism to provide data origin
authentication.";
reference
"RFC 4543:
The Use of Galois Message Authentication Code (GMAC)
in IPsec ESP and AH";
}
enum "aes-cmac-96" {
value 13;
description
"Generating 96-bit MAC using Advanced Encryption
Standard (AES) Cipher-based Message Authentication
Code (CMAC)";
reference
"RFC 4494:
The AES-CMAC Algorithm and its Use with IPsec";
}
enum "aes-cmac-128" {
value 14;
description
"Generating 128-bit MAC using Advanced Encryption
Standard (AES) Cipher-based Message Authentication
Code (CMAC)";
reference
"RFC 4494:
The AES-CMAC Algorithm and its Use with IPsec";
}
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 5, head 3, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 3, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
enum "sha1-des3-kd" {
value 15;
description
"Generating MAC using triple DES encryption function";
reference
"RFC 3961:
Encryption and Checksum Specifications for Kerberos
5";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the mac algorithm value assigned by
IANA. The setting is optional and by default is 0. The
enumeration filed is set to the selected mac algorithm.";
}
typedef encryption-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Encryption algorithm is NULL.";
}
enum "aes-128-cbc" {
value 1;
description
"Encrypt message with AES algorithm in CBC mode with
a key length of 128 bits.";
reference
"RFC 3565: Use of t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 4, head 5, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
he Advanced Encryption Standard (AES)
Encryption Algorithm in Cryptographic Message Syntax
(CMS)";
}
enum "aes-192-cbc" {
value 2;
description
"Encrypt message with AES algorithm in CBC mode with
a key length of 192 bits";
reference
"RFC 3565: Use of the Advanced Encryption Standard (AES)
Encryption Algorithm in Cryptographic Message Syntax
(CMS)";
}
enum "aes-256-cbc" {
value 3;
description
"Encrypt message with AES algorithm in CBC mode with
a key length of 256 bits";
reference
"RFC 3565: Use of the Advanced Encryption Standard (AES)
Encryption Algorithm in Cryptographic Message Syntax
(CMS)";
}
enum "aes-128-ctr" {
value 4;
description
"Encrypt message with AES algorithm in CTR mode with
a key length of 128
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 6, head 7, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 8, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
bits";
reference
"RFC 3686:
Using Advanced Encryption Standard (AES) Counter
Mode with IPsec Encapsulating Security Payload
(ESP)";
}
enum "aes-192-ctr" {
value 5;
description
"Encrypt message with AES algorithm in CTR mode with
a key length of 192 bits";
reference
"RFC 3686:
Using Advanced Encryption Standard (AES) Counter
Mode with IPsec Encapsulating Security Payload
(ESP)";
}
enum "aes-256-ctr" {
value 6;
description
"Encrypt message with AES algorithm in CTR mode with
a key length of 256 bits";
reference
"RFC 3686:
Using Advanced Encryption Standard (AES) Counter
Mode with IPsec Encapsulating Security Payload
(ESP)";
}
enum "des3-cbc-sha1-kd" {
value 7;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
description
"Encrypt message with 3DES algorithm in CBC mode
with sha1 function for key derivation";
reference
"RFC 3961:
Encryption and Checksum Specifications for
Kerberos 5";
}
enum "rc4-hmac" {
value 8;
description
"Encrypt message with rc4 algorithm";
reference
"RFC 4757:
The RC4-HMAC Kerberos Encryption Types Used by
Microsoft Windows";
}
enum "rc4-hmac-exp" {
value 9;
description
"Encrypt message with rc4 algorithm that is exportable";
reference
"RFC 4757:
The RC4-HMAC Kerberos Encryption Types Used by
Microsoft Windows";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the encryption algorithm value
assigned by IANA. The set
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 9, head 10, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 11, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ting is optional and by default
is 0. The enumeration filed is set to the selected
encryption algorithm.";
}
typedef encryption-and-mac-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Encryption and MAC algorithm is NULL.";
reference
"None";
}
enum "aes-128-ccm" {
value 1;
description
"Encrypt message with AES algorithm in CCM
mode with a key length of 128 bits; it can
also be used for generating MAC";
reference
"RFC 4309: Using Advanced Encryption Standard
(AES) CCM Mode with IPsec Encapsulating Security
Payload (ESP)";
}
enum "aes-192-ccm" {
value 2;
description
"Encrypt message with AES algorithm in CCM
mode with a key length of 192 bits; it can
also be used for generatin
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 10, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
g MAC";
reference
"RFC 4309: Using Advanced Encryption Standard
(AES) CCM Mode with IPsec Encapsulating Security
Payload (ESP)";
}
enum "aes-256-ccm" {
value 3;
description
"Encrypt message with AES algorithm in CCM
mode with a key length of 256 bits; it can
also be used for generating MAC";
reference
"RFC 4309: Using Advanced Encryption Standard
(AES) CCM Mode with IPsec Encapsulating Security
Payload (ESP)";
}
enum "aes-128-gcm" {
value 4;
description
"Encrypt message with AES algorithm in GCM
mode with a key length of 128 bits; it can
also be used for generating MAC";
reference
"RFC 4106: The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP)";
}
enum "aes-192-gcm" {
value 5;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
description
"Encrypt message with AES algorithm in GCM
mode with a key length of 192 bits; it can
also be used for generating MAC";
reference
"RFC 4106: The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP)";
}
enum "aes-256-gcm" {
value 6;
description
"Encrypt message with AES algorithm in GCM
mode with a key length of 256 bits; it can
also be used for generating MAC";
reference
"RFC 4106: The Use of Galois/Counter Mode (GCM)
in IPsec Encapsulating Security Payload (ESP)";
}
enum "chacha20-poly1305" {
value 7;
description
"Encrypt message with chacha20 algorithm and generate
MAC with POLY1305; it can also be used for generating
MAC";
reference
"RFC 8439: ChaCha20 and Poly1305 for IETF Protocols";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 13, head 14, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 15, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the encryption and mac algorithm value
assigned by IANA. The setting is optional and by default is
0. The enumeration filed is set to the selected encryption
and mac algorithm.";
}
typedef signature-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Signature algorithm is NULL";
}
enum "dsa-sha1" {
value 1;
description
"The signature algorithm using DSA algorithm with SHA1
hash algorithm";
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
enum "rsassa-pkcs1-sha1" {
value 2;
description
"The signature algorithm using RSASSA-PKCS1-v1_5 with
the SHA1 hash algorithm.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 14, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 17, head 15, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: sending message:
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
enum "rsassa-pkcs1-sha256" {
value 3;
description
"The signature algorithm using RSASSA-PKCS1-v1_5 with
the SHA256 hash algorithm.";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512 in the
Secure Shell (SSH) Protocol
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pkcs1-sha384" {
value 4;
description
"The signature algorithm using RSASSA-PKCS1-v1_5 with
the SHA384 hash algorithm.";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pkcs1-sha512" {
value 5;
description
"The signature algorithm using RS
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 16, head 17, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 18, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 19, head 17, lenght 3
[DBG]: LN: Session 1: sending message:
ASSA-PKCS1-v1_5 with
the SHA512 hash algorithm.";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512 in the
Secure Shell (SSH) Protocol
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-rsae-sha256" {
value 6;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA256 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-rsae-sha384" {
value 7;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA384 hash algorithm. If
the
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 17, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 18, head 19, lenght 2
[DBG]: LN: Session 1: sending message:
public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-rsae-sha512" {
value 8;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA512 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-pss-sha256" {
value 9;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA256 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 19, head 20, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 21, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 22, head 20, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 20, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-pss-sha384" {
value 10;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA384 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "rsassa-pss-pss-sha512" {
value 11;
description
"The signature algorithm using RSASSA-PSS with mask
generation function 1 and SHA512 hash algorithm. If
the public key is carried in an X.509 certificate,
it MUST use the rsaEncryption OID";
reference
"RFC 8446:
The Transport Layer Security (TLS) Prot
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 21, head 22, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 23, head 22, lenght 2
[DBG]: LN: Session 1: sending message:
ocol
Version 1.3";
}
enum "ecdsa-secp256r1-sha256" {
value 12;
description
"The signature algorithm using ECDSA with curve name
secp256r1 and SHA256 hash algorithm.";
reference
"RFC 5656:
Elliptic Curve Algorithm Integration in the Secure
Shell Transport Layer
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ecdsa-secp384r1-sha384" {
value 13;
description
"The signature algorithm using ECDSA with curve name
secp384r1 and SHA384 hash algorithm.";
reference
"RFC 5656:
Elliptic Curve Algorithm Integration in the Secure
Shell Transport Layer
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ecdsa-secp521r1-sha512" {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 24, head 22, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 22, head 23, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 25, head 23, lenght 3
[DBG]: LN: Session 1: sending message:
value 14;
description
"The signature algorithm using ECDSA with curve name
secp521r1 and SHA512 hash algorithm.";
reference
"RFC 5656:
Elliptic Curve Algorithm Integration in the Secure
Shell Transport Layer
RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ed25519" {
value 15;
description
"The signature algorithm using EdDSA with curve x25519";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed25519-cts" {
value 16;
description
"The signature algorithm using EdDSA with curve x25519
with phflag = 0";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed25519-ph" {
value 17;
des
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 23, head 24, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 26, head 24, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 24, head 25, lenght 2
[DBG]: LN: Session 1: sending message:
cription
"The signature algorithm using EdDSA with curve x25519
with phflag = 1";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed25519-sha512" {
value 18;
description
"The signature algorithm using EdDSA with curve x25519
and SHA-512 function";
reference
"RFC 8419:
Use of Edwards-Curve Digital Signature Algorithm
(EdDSA) Signatures in the Cryptographic Message
Syntax (CMS)";
}
enum "ed448" {
value 19;
description
"The signature algorithm using EdDSA with curve x448";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed448-ph" {
value 20;
description
"The signature algorithm using EdDSA with curve x448
and with PH
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 25, head 26, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 27, head 26, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 28, head 26, lenght 3
[DBG]: LN: Session 1: sending message:
being SHAKE256(x, 64) and phflag being 1";
reference
"RFC 8032:
Edwards-Curve Digital Signature Algorithm (EdDSA)";
}
enum "ed448-shake256" {
value 21;
description
"The signature algorithm using EdDSA with curve x448
and SHAKE-256 function";
reference
"RFC 8419:
Use of Edwards-Curve Digital Signature Algorithm
(EdDSA) Signatures in the Cryptographic Message
Syntax (CMS)";
}
enum "ed448-shake256-len" {
value 22;
description
"The signature algorithm using EdDSA with curve x448
and SHAKE-256 function and a customized hash output";
reference
"RFC 8419:
Use of Edwards-Curve Digital Signature Algorithm
(EdDSA) Signatures in the Cryptographic Message
Syntax (CMS)";
}
enum "rsa-sha2-256" {
value 23;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 26, head 27, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 29, head 27, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 27, head 28, lenght 2
[DBG]: LN: Session 1: sending message:
description
"The signature algorithm using RSA with SHA2 function
for SSH protocol";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512
in the Secure Shell (SSH) Protocol";
}
enum "rsa-sha2-512" {
value 24;
description
"The signature algorithm using RSA with SHA2 function
for SSH protocol";
reference
"RFC 8332:
Use of RSA Keys with SHA-256 and SHA-512
in the Secure Shell (SSH) Protocol";
}
enum "eccsi" {
value 25;
description
"The signature algorithm using ECCSI signature as
defined in RFC 6507.";
reference
"RFC 6507:
Elliptic Curve-Based Certificateless Signatures
for Identity-based Encryption (ECCSI)";
}
}
}
default "0";
description
"The uint16 filed shall be set by ind
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 28, head 29, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 30, head 29, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 31, head 29, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 29, head 30, lenght 2
[DBG]: LN: Session 1: sending message:
ividual protocol
families according to the signature algorithm value
assigned by IANA. The setting is optional and by default
is 0. The enumeration filed is set to the selected
signature algorithm.";
}
typedef key-exchange-algorithm-t {
type union {
type uint16;
type enumeration {
enum "NONE" {
value 0;
description
"Key exchange algorithm is NULL.";
}
enum "psk-only" {
value 1;
description
"Using Pre-shared key for authentication and key
exchange";
reference
"RFC 4279:
Pre-Shared Key cipher suites for Transport Layer
Security (TLS)";
}
enum "dhe-ffdhe2048" {
value 2;
description
"Ephemeral Diffie Hellman key exchange with 2048 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 30, head 31, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 32, head 31, lenght 2
[DBG]: LN: Session 1: sending message:
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe3072" {
value 3;
description
"Ephemeral Diffie Hellman key exchange with 3072 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe4096" {
value 4;
description
"Ephemeral Diffie Hellman key exchange with 4096 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe6144" {
value 5;
description
"Ephemeral Diffie Hellman key exchange with 6144 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellma
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 33, head 31, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 31, head 32, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 34, head 32, lenght 3
[DBG]: LN: Session 1: sending message:
n Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "dhe-ffdhe8192" {
value 6;
description
"Ephemeral Diffie Hellman key exchange with 8192 bit
finite field";
reference
"RFC 7919:
Negotiated Finite Field Diffie-Hellman Ephemeral
Parameters for Transport Layer Security (TLS)";
}
enum "psk-dhe-ffdhe2048" {
value 7;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE2048";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe3072" {
value 8;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE30
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 32, head 33, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 35, head 33, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
72";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe4096" {
value 9;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE4096";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe6144" {
value 10;
description
"Key exchange using pre-shared key with Diffie-Hellman
key generation mechanism, where the DH group is
FFDHE6144";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-dhe-ffdhe8192" {
value 11;
description
"Key exchange using pre-shared key with Diffie-H
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 33, head 34, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 36, head 34, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ellman
key generation mechanism, where the DH group is
FFDHE8192";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "ecdhe-secp256r1" {
value 12;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve secp256r1";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "ecdhe-secp384r1" {
value 13;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve secp384r1";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
en
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 34, head 35, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 35, head 36, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 37, head 36, lenght 2
[DBG]: LN: Session 1: sending message:
um "ecdhe-secp521r1" {
value 14;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve secp521r1";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "ecdhe-x25519" {
value 15;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve x25519";
reference
"RFC 8422:
Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "ecdhe-x448" {
value 16;
description
"Ephemeral Diffie Hellman key exchange with elliptic
group over curve x448";
reference
"RFC 8422:
Elliptic Curve Cryptography (E
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 36, head 37, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 38, head 37, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 39, head 37, lenght 3
[DBG]: LN: Session 1: sending message:
CC) Cipher Suites
for Transport Layer Security (TLS) Versions 1.2
and Earlier";
}
enum "psk-ecdhe-secp256r1" {
value 17;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve secp256r1";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-secp384r1" {
value 18;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve secp384r1";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-secp521r1" {
value 19;
description
"Key exchange using pre-shared key with elliptic
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 37, head 38, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 40, head 38, lenght 3
[DBG]: LN: Session 1: sending message:
group-based Ephemeral Diffie Hellman key exchange
over curve secp521r1";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-x25519" {
value 20;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve x25519";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "psk-ecdhe-x448" {
value 21;
description
"Key exchange using pre-shared key with elliptic
group-based Ephemeral Diffie Hellman key exchange
over curve x448";
reference
"RFC 8446:
The Transport Layer Security (TLS) Protocol
Version 1.3";
}
enum "diffie-hellman-group14-sha1" {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 38, head 39, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 41, head 39, lenght 3
[DBG]: LN: Session 1: sending message:
value 22;
description
"Using DH group14 and SHA1 for key exchange";
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
enum "diffie-hellman-group14-sha256" {
value 23;
description
"Using DH group14 and SHA-256 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group15-sha512" {
value 24;
description
"Using DH group15 and SHA-512 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group16-sha512" {
value 25;
description
"Using DH group16 and SHA-512
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 39, head 40, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 42, head 40, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group17-sha512" {
value 26;
description
"Using DH group17 and SHA-512 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "diffie-hellman-group18-sha512" {
value 27;
description
"Using DH group18 and SHA-512 for key exchange";
reference
"RFC 8268:
More Modular Exponentiation (MODP) Diffie-Hellman (DH)
Key Exchange (KEX) Groups for Secure Shell (SSH)";
}
enum "ecdh-sha2-secp256r1" {
value 28;
description
"Elliptic curve-based Diffie Hellman key exchange ove
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 40, head 41, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 43, head 41, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
r
curve ecp256r1 and using SHA2 for MAC generation";
reference
"RFC 6239:
Suite B Cryptographic Suites for Secure Shell (SSH)";
}
enum "ecdh-sha2-secp384r1" {
value 29;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve ecp384r1 and using SHA2 for MAC generation";
reference
"RFC 6239:
Suite B Cryptographic Suites for Secure Shell (SSH)";
}
enum "ecdh-x25519-x9.63-sha256" {
value 30;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using ANSI x9.63 with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-x9.63-sha384" {
valu
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 41, head 42, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 44, head 42, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 42, head 43, lenght 2
[DBG]: LN: Session 1: sending message:
e 31;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using ANSI x9.63 with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-x9.63-sha512" {
value 32;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using ANSI x9.63 with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-hkdf-sha256" {
value 33;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and usi
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 43, head 44, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 45, head 44, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 46, head 44, lenght 3
[DBG]: LN: Session 1: sending message:
ng HKDF with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-hkdf-sha384" {
value 34;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using HKDF with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x25519-hkdf-sha512" {
value 35;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.25519 and using HKDF with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 44, head 45, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 47, head 45, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-x9.63-sha256" {
value 36;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using ANSI x9.63 with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-x9.63-sha384" {
value 37;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using ANSI x9.63 with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 45, head 46, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 48, head 46, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 46, head 47, lenght 2
[DBG]: LN: Session 1: sending message:
48-x9.63-sha512" {
value 38;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using ANSI x9.63 with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-hkdf-sha256" {
value 39;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using HKDF with SHA256 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-hkdf-sha384" {
value 40;
description
"Elliptic curve-based Diffie Hellman key exchange over
cur
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 47, head 48, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 49, head 48, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 50, head 48, lenght 3
[DBG]: LN: Session 1: sending message:
ve x.448 and using HKDF with SHA384 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "ecdh-x448-hkdf-sha512" {
value 41;
description
"Elliptic curve-based Diffie Hellman key exchange over
curve x.448 and using HKDF with SHA512 as KDF";
reference
"RFC 8418:
Use of the Elliptic Curve Diffie-Hellman Key Agreement
Algorithm with X25519 and X448 in the Cryptographic
Message Syntax (CMS)";
}
enum "rsaes-oaep" {
value 42;
description
"RSAES-OAEP combines the RSAEP and RSADP primitives with
the EME-OAEP encoding method";
reference
"RFC 8017:
PKCS #1:
RSA Cryptography Specifications Version 2.2.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 48, head 49, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 51, head 49, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 49, head 50, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 50, head 51, lenght 1
[DBG]: LN: Session 1: sending message:
}
enum "rsaes-pkcs1-v1_5" {
value 43;
description
"RSAES-PKCS1-v1_5 combines the RSAEP and RSADP
primitives with the EME-PKCS1-v1_5 encoding method";
reference
"RFC 8017:
PKCS #1:
RSA Cryptography Specifications Version 2.2.";
}
}
}
default "0";
description
"The uint16 filed shall be set by individual protocol
families according to the key exchange algorithm value
assigned by IANA. The setting is optional and by default
is 0. The enumeration filed is set to the selected key
exchange algorithm.";
}
typedef x509 {
type binary;
description
"A Certificate structure, as specified in RFC 5280,
encoded using ASN.1 distinguished encoding rules (DER),
as specified in ITU-T X.690.";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 51, head 46, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
(CRL) Profile
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
typedef crl {
type binary;
description
"A CertificateList structure, as specified in RFC 5280,
encoded using ASN.1 distinguished encoding rules (DER),
as specified in ITU-T X.690.";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
typedef cms {
type binary;
description
"A ContentInfo structure, as specified in RFC 5652,
encoded using ASN.1 distinguished encoding rules (DER),
as specified in ITU-
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
T X.690.";
reference
"RFC 5652:
Cryptographic Message Syntax (CMS)
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
typedef data-content-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
data content type, as described by Section 4 in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef signed-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
signed-data content type, as described by Section 5 in
RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef enveloped-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
enveloped-data content type, as described by
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 4, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
Section 6
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef digested-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
digested-data content type, as described by Section 7
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef encrypted-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
encrypted-data content type, as described by Section 8
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef authenticated-data-cms {
type cms;
description
"A CMS structure whose top-most content type MUST be the
authenticated-data content type, as described by Section 9
in RFC 5652.";
reference
"RFC 5652: Cryptographic Message Syntax (CMS)";
}
typedef ssh-host-key {
type binary;
description
"The
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 3, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
binary public key data for this SSH key, as
specified by RFC 4253, Section 6.6, i.e.:
string certificate or public key format
identifier
byte[n] key/certificate data.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer
Protocol";
}
typedef trust-anchor-cert-x509 {
type x509;
description
"A Certificate structure that MUST encode a self-signed
root certificate.";
}
typedef end-entity-cert-x509 {
type x509;
description
"A Certificate structure that MUST encode a certificate
that is neither self-signed nor having Basic constraint
CA true.";
}
typedef trust-anchor-cert-cms {
type signed-data-cms;
description
"A CMS SignedData structure that MUST contain the chain of
X.509 certificates needed to authenticate the certificate
presented by a client or end-entity.
The CMS MUST contain only a single chain of certificates.
The cli
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 5, head 6, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 7, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 8, head 6, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
ent or end-entity certificate MUST only authenticate
to last intermediate CA certificate listed in the chain.
In all cases, the chain MUST include a self-signed root
certificate. In the case where the root certificate is
itself the issuer of the client or end-entity certificate,
only one certificate is present.
This CMS structure MAY (as applicable where this type is
used) also contain suitably fresh (as defined by local
policy) revocation objects with which the device can
verify the revocation status of the certificates.
This CMS encodes the degenerate form of the SignedData
structure that is commonly used to disseminate X.509
certificates and revocation objects (RFC 5280).";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile.";
}
typedef end-entity-cert-cms {
type signed-data-cms;
description
"A CMS SignedD
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 7, head 8, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 9, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
ata structure that MUST contain the end
entity certificate itself, and MAY contain any number
of intermediate certificates leading up to a trust
anchor certificate. The trust anchor certificate
MAY be included as well.
The CMS MUST contain a single end entity certificate.
The CMS MUST NOT contain any spurious certificates.
This CMS structure MAY (as applicable where this type is
used) also contain suitably fresh (as defined by local
policy) revocation objects with which the device can
verify the revocation status of the certificates.
This CMS encodes the degenerate form of the SignedData
structure that is commonly used to disseminate X.509
certificates and revocation objects (RFC 5280).";
reference
"RFC 5280:
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile.";
}
grouping symmetric-key-grouping {
description
"A symmetric key
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 8, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
and algorithm.";
leaf algorithm {
type encryption-algorithm-t;
mandatory true;
description
"The algorithm to be used when generating the key.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
choice key-type {
mandatory true;
description
"Choice between key types.";
leaf key {
nacm:default-deny-all;
type binary;
description
"The binary value of the key. The interpretation of
the value is defined by 'algorithm'. For example,
FIXME.";
reference
"RFC XXXX: FIXME";
}
leaf hidden-key {
nacm:default-deny-write;
type empty;
description
"A permanently hidden key. How such keys are created
is outside the scope of this module.";
}
}
}
grouping public-key-grouping {
description
"A public key and its associated algorithm.";
leaf algorithm {
nacm:default-deny-w
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 9, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
rite;
type asymmetric-key-algorithm-t;
mandatory true;
description
"Identifies the key's algorithm.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
leaf public-key {
nacm:default-deny-write;
type binary;
mandatory true;
description
"The binary value of the public key. The interpretation
of the value is defined by 'algorithm'. For example,
a DSA key is an integer, an RSA key is represented as
RSAPublicKey per RFC 8017, and an ECC key is represented
using the 'publicKey' described in RFC 5915.";
reference
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1:
RSA Cryptography Specifications Version 2.2.
RFC 5915: Elliptic Curve Private Key Structure.";
}
}
grouping asymmetric-key-pair-grouping {
description
"A private key and its associated public key and algorithm.";
uses public-key-grouping;
choice priva
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 10, head 11, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
te-key-type {
mandatory true;
description
"Choice between key types.";
leaf private-key {
nacm:default-deny-all;
type binary;
description
"The value of the binary key. The key's value is
interpreted by the 'algorithm'. For example, a DSA key
is an integer, an RSA key is represented as RSAPrivateKey
as defined in RFC 8017, and an ECC key is represented as
ECPrivateKey as defined in RFC 5915.";
reference
"RFC 8017: Public-Key Cryptography Standards (PKCS) #1:
RSA Cryptography Specifications Version 2.2.
RFC 5915: Elliptic Curve Private Key Structure.";
}
leaf hidden-private-key {
nacm:default-deny-write;
type empty;
description
"A permanently hidden key. How such keys are created
is outside the scope of this module.";
}
}
}
grouping trust-anchor-cert-grouping {
description
"A
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
trust anchor certificate, and a notification for when
it is about to (or already has) expire.";
leaf cert {
nacm:default-deny-write;
type trust-anchor-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once a day thereafter until the issue is resolved.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the certificate.";
}
}
}
grouping trust-anchor-c
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 13, head 14, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 15, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
erts-grouping {
description
"A list of trust anchor certificates, and a notification
for when one is about to (or already has) expire.";
leaf-list cert {
nacm:default-deny-write;
type trust-anchor-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once a day thereafter until the issue is resolved.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the cert
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 14, head 15, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ificate.";
}
}
}
grouping end-entity-cert-grouping {
description
"An end entity certificate, and a notification for when
it is about to (or already has) expire. Implementations
SHOULD assert that, where used, the end entity certificate
contains the expected public key.";
leaf cert {
nacm:default-deny-write;
type end-entity-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once a day thereafter until the issue is resolved.";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 15, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 18, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the certificate.";
}
}
}
grouping end-entity-certs-grouping {
description
"A list of end entity certificates, and a notification for
when one is about to (or already has) expire.";
leaf-list cert {
nacm:default-deny-write;
type end-entity-cert-cms;
description
"The binary certificate data for this certificate.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
notification certificate-expiration {
description
"A notification indicating that the configured certificate
is either about to expire or has already expired. When to
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
then once
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 17, head 18, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 19, head 18, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
a day thereafter until the issue is resolved.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
description
"Identifies the expiration date on the certificate.";
}
}
}
grouping asymmetric-key-pair-with-cert-grouping {
description
"A private/public key pair and an associated certificate.
Implementations SHOULD assert that certificates contain
the matching public key.";
uses asymmetric-key-pair-grouping;
uses end-entity-cert-grouping;
action generate-certificate-signing-request {
nacm:default-deny-all;
description
"Generates a certificate signing request structure for
the associated asymmetric key using the passed subject
and attribute values. The specified assertions need
to be appropriate for the certificate's use. For
example, an entity certificate for a TLS server
SHOULD have values that enable clients to satisfy
RFC 6125 pro
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
cessing.";
input {
leaf subject {
type binary;
mandatory true;
description
"The 'subject' field per the CertificationRequestInfo
structure as specified by RFC 2986, Section 4.1
encoded using the ASN.1 distinguished encoding
rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
leaf attributes {
type binary;
description
"The 'attributes' field from the structure
CertificationRequestInfo as specified by RFC 2986,
Section 4.1 encoded using the ASN.1 distingu
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 20, head 21, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 22, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 23, head 21, lenght 3
[DBG]: LN: Session 1: sending message:
ished
encoding rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
output {
leaf certificate-signing-request {
type binary;
mandatory true;
description
"A CertificationRequest structure as specified by
RFC 2986, Section 4.2 encoded using the ASN.1
distinguished encoding rules (DER), as specified
in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 21, head 22, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 24, head 22, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
}
}
grouping asymmetric-key-pair-with-certs-grouping {
description
"A private/public key pair and associated certificates.
Implementations SHOULD assert that certificates contain
the matching public key.";
uses asymmetric-key-pair-grouping;
container certificates {
nacm:default-deny-write;
description
"Certificates associated with this asymmetric key.
More than one certificate supports, for instance,
a TPM-protected asymmetric key that has both IDevID
and LDevID certificates associated.";
list certificate {
key "name";
description
"A certificate for this asymmetric key.";
leaf name {
type string;
description
"An arbitrary name
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 22, head 23, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 25, head 23, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
for the certificate. If the name
matches the name of a certificate that exists
independently in &lt;operational&gt; (i.e., an IDevID),
then the 'cert' node MUST NOT be configured.";
}
uses end-entity-cert-grouping;
}
}
action generate-certificate-signing-request {
nacm:default-deny-all;
description
"Generates a certificate signing request structure for
the associated asymmetric key using the passed subject
and attribute values. The specified assertions need
to be appropriate for the certificate's use. For
example, an entity certificate for a TLS server
SHOULD have values that enable clients to satisfy
RFC 6125 processing.";
input {
leaf subject {
type binary;
mandatory true;
description
"The 'subject' field per the CertificationRequestInfo
structure as specified by RFC 2986, Section 4.1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 23, head 24, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 26, head 24, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
encoded using the ASN.1 distinguished encoding
rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
leaf attributes {
type binary;
description
"The 'attributes' field from the structure
CertificationRequestInfo as specified by RFC 2986,
Section 4.1 encoded using the ASN.1 distinguished
encoding rules (DER), as specified in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 24, head 25, lenght 2
[DBG]: LN: Session 1: sending message:
#1016
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 27, head 25, lenght 3
[DBG]: LN: Session 1: sending message:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
output {
leaf certificate-signing-request {
type binary;
mandatory true;
description
"A CertificationRequest structure as specified by
RFC 2986, Section 4.2 encoded using the ASN.1
distinguished encoding rules (DER), as specified
in ITU-T X.690.";
reference
"RFC 2986:
PKCS #10: Certification Request Syntax
Specification Version 1.7.
ITU-T X.690:
Information technology - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER),
Canonical Encoding Rules (CER) and Distinguished
Encoding Rules (DER).";
}
}
}
}
}
</data>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 25, head 26, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 28, head 26, lenght 3
[DBG]: LN: Session 1: sending message:
#12
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 26, head 27, lenght 2
[DBG]: LN: Session 1: sending message:
</rpc-reply>
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 27, head 28, lenght 1
[INF]: NP: Session 1: thread 4 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 29, head 28, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 28, head 29, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 30, head 29, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 29, head 30, lenght 1
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="9"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-truststore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 30, head 25, lenght 0
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 26, lenght 0
[INF]: LN: Schema "ietf-truststore" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 1, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 28, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="9"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-truststore {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-truststore";
prefix ts;
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
import ietf-crypto-types {
prefix ct;
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;";
description
"This module defines a truststore to centralize management
of trust anchors including both X.509 certificates and
SSH host keys.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 0, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: A YANG Data Model for a Truststore";
}
feature truststore-supported {
descriptio
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
n
"The 'truststore-supported' feature indicates that the
server supports the truststore.";
}
feature local-definitions-supported {
description
"The 'local-definitions-supported' feature indicates that
the server supports locally-defined trust anchors.";
}
feature x509-certificates {
description
"The 'x509-certificates' feature indicates that the server
implements the /truststore/certificates subtree.";
}
feature ssh-host-keys {
description
"The 'ssh-host-keys' feature indicates that the server
implements the /truststore/host-keys subtree.";
}
typedef certificates-ref {
type leafref {
path "/ts:truststore/ts:certificates/ts:name";
}
description
"This typedef enables modules to easily define a reference
to a set of certificates defined in the truststore.";
}
typedef host-keys-ref {
type leafref {
path "/ts:truststore/ts:host-keys/ts:name";
}
description
"This typedef e
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 4, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 5, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
nables modules to easily define a reference
to a set of host keys defined in the truststore.";
}
grouping local-or-truststore-certs-grouping {
description
"A grouping that expands to allow trust anchors to be
either stored locally, within the using data model, or be
a reference to trust anchors stored in the truststore.";
choice local-or-truststore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the truststore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local trust anchor definitions.
A list is defined so as to be symmetric with the
truststore definition.";
uses ct:trust-anchor-certs-grouping;
}
}
case truststore {
if-feature "truststore-supported";
if-feature "x509-certificates";
leaf tru
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 7, head 5, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 8, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
ststore-reference {
type certificates-ref;
description
"A reference to a set of trust anchors that exists
in the truststore.";
}
}
}
}
grouping local-or-truststore-host-keys-grouping {
description
"A grouping that expands to allow trust anchors to be
either stored locally, within the using data model, or be
a reference to trust anchors stored in the truststore.";
choice local-or-truststore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the truststore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local trust anchor definitions.
A list is defined so as to be symmetric with the
truststore definition.";
leaf-list host-key {
nacm:default-deny-write;
type ct:ssh
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 6, head 7, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 9, head 7, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 7, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
-host-key;
description
"The binary data for this host key.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
uses ct:trust-anchor-certs-grouping;
}
}
case truststore {
if-feature "truststore-supported";
if-feature "ssh-host-keys";
leaf truststore-reference {
type host-keys-ref;
description
"A reference to a set of trust anchors that exists
in the truststore.";
}
}
}
}
grouping truststore-grouping {
description
"Grouping definition enables use in other contexts. If ever
done, implementations SHOULD augment new 'case' statements
into local-or-keystore 'choice' statements to supply leafrefs
to the new location.";
list certificates {
if-feature "x509-certificates";
key "name";
description
"A list of certificates. These certificates can be
used
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 8, head 9, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 10, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
by a server to authenticate clients, or by a client
to authenticate servers. Each list of certificates
SHOULD be specific to a purpose, as the list as a whole
may be referenced by other modules. For instance, a
RESTCONF server's configuration might use a specific list
of certificates for when authenticating RESTCONF
client connections.";
leaf name {
type string;
description
"An arbitrary name for this list of certificates.";
}
leaf description {
type string;
description
"An arbitrary description for this list of
certificates.";
}
list certificate {
key "name";
description
"A certificate.";
leaf name {
type string;
description
"An arbitrary name for this certificate. The
name must be unique across all lists of
certificates (not just this list) so that leafrefs
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 9, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
from another module can resolve to unique values.";
}
uses ct:trust-anchor-cert-grouping {
refine "cert" {
mandatory true;
}
}
}
}
list host-keys {
if-feature "ssh-host-keys";
key "name";
description
"A list of host keys. These host-keys can
be used by clients to authenticate SSH servers. Each
list of host keys SHOULD be specific to a purpose,
so the list as a whole may be referenced by other modules.
For instance, a NETCONF client's configuration might
point to a specific list of host keys for when
authenticating specific SSH servers.";
leaf name {
type string;
description
"An arbitrary name for this list of SSH
host keys.";
}
leaf description {
type string;
description
"An arbitrary description for this list of SSH
host keys.";
}
list host-key {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 10, head 11, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
#859
[DBG]: LN: Session 1: sending message:
key "name";
description
"A host key.";
leaf name {
type string;
description
"An arbitrary name for this host-key. Must be
unique across all lists of host-keys (not just
this list) so that a leafref to it from another module
can resolve to unique values.";
}
leaf host-key {
type ct:ssh-host-key;
mandatory true;
description
"The binary public key data for this host key.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
}
}
}
container truststore {
nacm:default-deny-write;
description
"The truststore contains sets of X.509 certificates and
SSH host keys.";
uses truststore-grouping;
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 11, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 14, head 12, lenght 3
[INF]: NP: Session 1: thread 0 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 15, head 12, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 12, head 13, lenght 3
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="10"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 13, head 14, lenght 2
[INF]: LN: Schema "ietf-tcp-common" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 16, head 14, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 14, head 15, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 15, head 16, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="10"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-common {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-common";
prefix tcpcmn;
organization
"IETF NETCONF (Network Configuration) Working Group and the
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
&lt;http://datatracker.ietf.org/wg/tcpm/&gt;
WG List: &lt;mailto:[email protected]&gt;
&lt;mailto:[email protected]&gt;
Authors: Kent Watsen &lt;mailto:[email protected]&gt;
Michael Scharf
&lt;mailto:[email protected]&gt;";
description
"This module defines reusable groupings for TCP commons that
can be used as a basis for specific TCP common instances.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 17, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 16, head 17, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 18, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers";
}
feature keepalives-s
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 19, head 17, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 17, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
upported {
description
"Indicates that keepalives are supported.";
}
grouping tcp-common-grouping {
description
"A reusable grouping for configuring TCP parameters common
to TCP connections as well as the operating system as a
whole.";
container keepalives {
if-feature "keepalives-supported";
presence "Indicates that keepalives are enabled.";
description
"Configures the keep-alive policy, to proactively test the
aliveness of the TCP peer. An unresponsive TCP peer is
dropped after approximately (idle-time * 60) + (max-probes
* probe-interval) seconds.";
leaf idle-time {
type uint16 {
range "1..max";
}
units "seconds";
mandatory true;
description
"Sets the amount of time after which if no data has been
received from the TCP peer, a TCP-level probe message
will be sent to test the aliveness of the TCP peer.";
}
leaf m
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#751
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
ax-probes {
type uint16 {
range "1..max";
}
mandatory true;
description
"Sets the maximum number of sequential keep-alive probes
that can fail to obtain a response from the TCP peer
before assuming the TCP peer is no longer alive.";
}
leaf probe-interval {
type uint16 {
range "1..max";
}
units "seconds";
mandatory true;
description
"Sets the time interval between failed probes.";
}
}
}
grouping tcp-connection-grouping {
description
"A reusable grouping for configuring TCP parameters common
to TCP connections.";
uses tcp-common-grouping;
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 20, head 21, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 23, head 21, lenght 3
[INF]: NP: Session 1: thread 4 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 24, head 21, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 21, head 22, lenght 3
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="11"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-ssh-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 22, head 23, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-ssh-server" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 25, head 23, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 23, head 24, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 24, head 25, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 25, head 20, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="11"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-ssh-server {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-ssh-server";
prefix sshs;
import ietf-ssh-common {
prefix sshcmn;
revision-date 2019-07-02;
reference
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers";
}
import ietf-keystore {
prefix ks;
reference
"RFC ZZZZ: A YANG Data Model for a Keystore";
}
import iana-crypt-hash {
prefix ianach;
reference
"RFC 7317: A YANG Data Model for System Management";
}
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:kent+ietf@
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 0, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
watsen.net&gt;
Author: Gary Wu &lt;mailto:[email protected]&gt;";
description
"This module defines reusable groupings for SSH servers that
can be used as a basis for specific SSH server instances.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be int
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
erpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers";
}
feature ssh-server-transport-params-config {
description
"SSH transport layer parameters are configurable on an SSH
server.";
}
feature ssh-server-keepalives {
description
"Per socket SSH keepalive parameters are configurable for
SSH servers on the server implementing this feature.";
}
feature local-client-auth-supported {
description
"Indicates that the SSH server supports local configuration
of client credentials.";
}
feature external-client-auth-supported {
description
"Indicates that the SSH server supports external configuration
of client credentials.";
}
grouping ssh-server-grouping {
description
"A reusable grouping for configu
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 4, head 2, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
ring a SSH server without
any consideration for how underlying TCP sessions are
established.
Note that this grouping uses fairly typical descendent
node names such that a stack of 'uses' statements will
have name conflicts. It is intended that the consuming
data model will resolve the issue (e.g., by wrapping
the 'uses' statement in a container called
'ssh-server-parameters'). This model purposely does
not do this itself so as to provide maximum flexibility
to consuming models.";
container server-identity {
nacm:default-deny-write;
description
"The list of host-keys the SSH server will present when
establishing a SSH connection.";
list host-key {
key "name";
min-elements 1;
ordered-by user;
description
"An ordered list of host keys the SSH server will use to
construct its ordered list of algorithms, when sending
its SSH_MSG_KEXINIT mess
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 4, head 5, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 6, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
age, as defined in Section 7.1
of RFC 4253.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer
Protocol";
leaf name {
type string;
description
"An arbitrary name for this host-key";
}
choice host-key-type {
mandatory true;
description
"The type of host key being specified";
container public-key {
description
"A locally-defined or referenced asymmetric key pair
to be used for the SSH server's host key.";
reference
"RFC ZZZZ: YANG Data Model for a Centralized
Keystore Mechanism";
uses ks:local-or-keystore-asymmetric-key-grouping;
}
container certificate {
if-feature "sshcmn:ssh-x509-certs";
description
"A locally-defined or referenced end-entity
certificate to be used for the SSH
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 5, head 6, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 7, head 6, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 8, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
server's
host key.";
reference
"RFC ZZZZ: YANG Data Model for a Centralized
Keystore Mechanism";
uses ks:local-or-keystore-end-entity-cert-with-key-grouping;
}
}
}
}
container client-authentication {
nacm:default-deny-write;
description
"Specifies if SSH client authentication is required or
optional, and specifies if the SSH client authentication
credentials are configured locally or externally.";
container supported-authentication-methods {
description
"Indicates which authentication methods the server
supports.";
leaf publickey {
type empty;
description
"Indicates that the 'publickey' method is supported.
Note that RFC 6187 X.509v3 Certificates for SSH uses
the 'publickey' method name.";
reference
"RFC 4252: The Secure Shell (SSH) Authenti
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 7, head 8, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 9, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
cation
Protocol.
RFC 6187: X.509v3 Certificates for Secure Shell
Authentication.";
}
leaf passsword {
type empty;
description
"Indicates that the 'password' method is supported.";
reference
"RFC 4252: The Secure Shell (SSH) Authentication
Protocol.";
}
leaf hostbased {
type empty;
description
"Indicates that the 'hostbased' method is supported.";
reference
"RFC 4252: The Secure Shell (SSH) Authentication
Protocol.";
}
leaf none {
type empty;
description
"Indicates that the 'none' method is supported.";
reference
"RFC 4252: The Secure Shell (SSH) Authentication
Protocol.";
}
leaf-list other {
type string;
description
"Indicates
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 8, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
a supported method name not defined by
RFC 4253.";
reference
"RFC 4252: The Secure Shell (SSH) Authentication
Protocol.";
}
}
choice local-or-external {
mandatory true;
description
"Indicates if the client credentials are configured
locally or externally.";
case local {
if-feature "local-client-auth-supported";
description
"Client credentials are configured locally.";
container users {
description
"A list of locally configured users.";
list user {
key "name";
description
"The list of local users configured on this device.";
leaf name {
type string;
description
"The user name string identifying this entry.";
}
leaf password {
type ianach:crypt-hash;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 9, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
description
"The password for this entry.";
}
list authorized-key {
key "name";
description
"A list of public SSH keys for this user. These
keys are allowed for SSH authentication, as
described in RFC 4253.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer
Protocol";
leaf name {
type string;
description
"An arbitrary name for the SSH key.";
}
leaf algorithm {
type string;
mandatory true;
description
"The public key algorithm name for this SSH key.
Valid values are the values in the IANA 'Secure
Shell (SSH) Protocol Parameters' registry,
Public Key Algorithm
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 10, head 11, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
Names.";
reference
"IANA 'Secure Shell (SSH) Protocol Parameters'
registry, Public Key Algorithm Names";
}
leaf key-data {
type binary;
mandatory true;
description
"The binary public key data for this SSH key, as
specified by RFC 4253, Section 6.6, i.e.:
string certificate or public key format
identifier
byte[n] key/certificate data.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer
Protocol";
}
}
}
}
}
case external {
if-feature "external-client-auth-supported";
description
"Client credentials are configured externally, such
as via RADIUS, RFC 7317,
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
or another mechanism.";
leaf client-auth-defined-elsewhere {
type empty;
description
"Indicates that client credentials are configured
elsewhere.";
}
}
}
}
container transport-params {
nacm:default-deny-write;
if-feature "ssh-server-transport-params-config";
description
"Configurable parameters of the SSH transport layer.";
uses sshcmn:transport-params-grouping;
}
container keepalives {
nacm:default-deny-write;
if-feature "ssh-server-keepalives";
presence "Indicates that keepalives are enabled.";
description
"Configures the keep-alive policy, to proactively test
the aliveness of the SSL client. An unresponsive SSL
client is dropped after approximately max-wait *
max-attempts seconds.";
leaf max-wait {
type uint16 {
range "1..max";
}
units "seconds";
default "30";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 12, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 15, head 13, lenght 3
[DBG]: LN: Session 1: sending message:
#578
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 13, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
description
"Sets the amount of time in seconds after which
if no data has been received from the SSL client,
a SSL-level message will be sent to test the
aliveness of the SSL client.";
}
leaf max-attempts {
type uint8;
default "3";
description
"Sets the maximum number of sequential keep-alive
messages that can fail to obtain a response from
the SSL client before assuming the SSL client is
no longer alive.";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 14, head 15, lenght 1
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 16, head 15, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 15, head 16, lenght 1
[INF]: NP: Session 1: thread 3 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 17, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 18, head 16, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="12"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-ssh-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 17, head 18, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 19, head 18, lenght 2
[INF]: LN: Schema "ietf-ssh-common" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 19, head 20, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 20, head 15, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="12"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-ssh-common {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-ssh-common";
prefix sshcmn;
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;
Author: Gary Wu &lt;mailto:[email protected]&gt;";
description
"This module defines a common features, identities, and
groupings for Secure Shell (SSH).
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 3, head 0, lenght 4
[DBG]: LN: Session 1: sending message:
4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers";
}
feature ssh-ecc {
description
"Elliptic Curve Cryptography is supported for SSH.";
reference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
feature ssh-x509-certs {
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
"X.509v3 certificates are supported for SSH per RFC 6187.";
reference
"RFC 6187: X.509v3 Certificates for Secure Shell
Authentication";
}
feature ssh-dh-group-exchange {
description
"Diffie-Hellman Group Exchange is supported for SSH.";
reference
"RFC 4419: Diffie-Hellman Group Exchange for the
Secure Shell (SSH) Transport Layer Protocol";
}
feature ssh-ctr {
description
"SDCTR encryption mode is supported for SSH.";
reference
"RFC 4344: The Secure Shell (SSH) Transport Layer
Encryption Modes";
}
feature ssh-sha2 {
description
"The SHA2 family of cryptographic hash functions is
supported for SSH.";
reference
"FIPS PUB 180-4: Secure Hash Standard (SHS)";
}
identity public-key-alg-base {
description
"Base identity used to identify public key algorithms.";
}
identity ssh-dss {
base public-key-alg-base;
description
"Digital Signature
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 2, head 3, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 4, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 5, head 3, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 3, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
Algorithm using SHA-1 as the
hashing algorithm.";
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
identity ssh-rsa {
base public-key-alg-base;
description
"RSASSA-PKCS1-v1_5 signature scheme using SHA-1 as the
hashing algorithm.";
reference
"RFC 4253:
The Secure Shell (SSH) Transport Layer Protocol";
}
identity ecdsa-sha2-nistp256 {
if-feature "ssh-ecc and ssh-sha2";
base public-key-alg-base;
description
"Elliptic Curve Digital Signature Algorithm (ECDSA) using the
nistp256 curve and the SHA2 family of hashing algorithms.";
reference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
identity ecdsa-sha2-nistp384 {
if-feature "ssh-ecc and ssh-sha2";
base public-key-alg-base;
description
"Elliptic Curve Digital Signature Algorithm (ECDSA) using the
nistp384 curve and the SHA2 family of hashing a
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 4, head 5, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 6, head 5, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
lgorithms.";
reference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
identity ecdsa-sha2-nistp521 {
if-feature "ssh-ecc and ssh-sha2";
base public-key-alg-base;
description
"Elliptic Curve Digital Signature Algorithm (ECDSA) using the
nistp521 curve and the SHA2 family of hashing algorithms.";
reference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
identity x509v3-ssh-rsa {
if-feature "ssh-x509-certs";
base public-key-alg-base;
description
"RSASSA-PKCS1-v1_5 signature scheme using a public key stored
in an X.509v3 certificate and using SHA-1 as the hashing
algorithm.";
reference
"RFC 6187: X.509v3 Certificates for Secure Shell
Authentication";
}
identity x509v3-rsa2048-sha256 {
if-feature "ssh-x509-certs and ssh-sha2";
base public-key-alg-base;
description
"R
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 5, head 6, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 8, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
SASSA-PKCS1-v1_5 signature scheme using a public key stored
in an X.509v3 certificate and using SHA-256 as the hashing
algorithm. RSA keys conveyed using this format MUST have a
modulus of at least 2048 bits.";
reference
"RFC 6187: X.509v3 Certificates for Secure Shell
Authentication";
}
identity x509v3-ecdsa-sha2-nistp256 {
if-feature "ssh-ecc and ssh-x509-certs and ssh-sha2";
base public-key-alg-base;
description
"Elliptic Curve Digital Signature Algorithm (ECDSA)
using the nistp256 curve with a public key stored in
an X.509v3 certificate and using the SHA2 family of
hashing algorithms.";
reference
"RFC 6187: X.509v3 Certificates for Secure Shell
Authentication";
}
identity x509v3-ecdsa-sha2-nistp384 {
if-feature "ssh-ecc and ssh-x509-certs and ssh-sha2";
base public-key-alg-base;
description
"Elliptic Curve Digital Signature Algorithm (ECDSA)
using the nistp3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 7, head 8, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 9, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 8, head 9, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 10, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
84 curve with a public key stored in
an X.509v3 certificate and using the SHA2 family of
hashing algorithms.";
reference
"RFC 6187: X.509v3 Certificates for Secure Shell
Authentication";
}
identity x509v3-ecdsa-sha2-nistp521 {
if-feature "ssh-ecc and ssh-x509-certs and ssh-sha2";
base public-key-alg-base;
description
"Elliptic Curve Digital Signature Algorithm (ECDSA)
using the nistp521 curve with a public key stored in
an X.509v3 certificate and using the SHA2 family of
hashing algorithms.";
reference
"RFC 6187: X.509v3 Certificates for Secure Shell
Authentication";
}
identity key-exchange-alg-base {
description
"Base identity used to identify key exchange algorithms.";
}
identity diffie-hellman-group14-sha1 {
base key-exchange-alg-base;
description
"Diffie-Hellman key exchange with SHA-1 as HASH and
Oakley Group 14 (2048-bit MODP Group).";
reference
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 11, head 9, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 12, head 9, lenght 4
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
}
identity diffie-hellman-group-exchange-sha1 {
if-feature "ssh-dh-group-exchange";
base key-exchange-alg-base;
description
"Diffie-Hellman Group and Key Exchange with SHA-1 as HASH.";
reference
"RFC 4419: Diffie-Hellman Group Exchange for the
Secure Shell (SSH) Transport Layer Protocol";
}
identity diffie-hellman-group-exchange-sha256 {
if-feature "ssh-dh-group-exchange and ssh-sha2";
base key-exchange-alg-base;
description
"Diffie-Hellman Group and Key Exchange with SHA-256 as HASH.";
reference
"RFC 4419: Diffie-Hellman Group Exchange for the
Secure Shell (SSH) Transport Layer Protocol";
}
identity ecdh-sha2-nistp256 {
if-feature "ssh-ecc and ssh-sha2";
base key-exchange-alg-base;
description
"Elliptic Curve Diffie-Hellman (ECDH) key exchange using the
nistp256 curve and the SHA2 family of hashing algorithms.";
r
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 9, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
eference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
identity ecdh-sha2-nistp384 {
if-feature "ssh-ecc and ssh-sha2";
base key-exchange-alg-base;
description
"Elliptic Curve Diffie-Hellman (ECDH) key exchange using the
nistp384 curve and the SHA2 family of hashing algorithms.";
reference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
identity ecdh-sha2-nistp521 {
if-feature "ssh-ecc and ssh-sha2";
base key-exchange-alg-base;
description
"Elliptic Curve Diffie-Hellman (ECDH) key exchange using the
nistp521 curve and the SHA2 family of hashing algorithms.";
reference
"RFC 5656: Elliptic Curve Algorithm Integration in the
Secure Shell Transport Layer";
}
identity encryption-alg-base {
description
"Base identity used to identify encryption algorithms.";
}
identity triple-des-
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 10, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
cbc {
base encryption-alg-base;
description
"Three-key 3DES in CBC mode.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
}
identity aes128-cbc {
base encryption-alg-base;
description
"AES in CBC mode, with a 128-bit key.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
}
identity aes192-cbc {
base encryption-alg-base;
description
"AES in CBC mode, with a 192-bit key.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
}
identity aes256-cbc {
base encryption-alg-base;
description
"AES in CBC mode, with a 256-bit key.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
}
identity aes128-ctr {
if-feature "ssh-ctr";
base encryption-alg-base;
description
"AES in SDCTR mode, with 128-bit key.";
reference
"RFC 4344: The Secure Shell (SSH) Transport Layer Encryption
Mod
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 11, head 12, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
es";
}
identity aes192-ctr {
if-feature "ssh-ctr";
base encryption-alg-base;
description
"AES in SDCTR mode, with 192-bit key.";
reference
"RFC 4344: The Secure Shell (SSH) Transport Layer Encryption
Modes";
}
identity aes256-ctr {
if-feature "ssh-ctr";
base encryption-alg-base;
description
"AES in SDCTR mode, with 256-bit key.";
reference
"RFC 4344: The Secure Shell (SSH) Transport Layer Encryption
Modes";
}
identity mac-alg-base {
description
"Base identity used to identify message authentication
code (MAC) algorithms.";
}
identity hmac-sha1 {
base mac-alg-base;
description
"HMAC-SHA1";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
}
identity hmac-sha2-256 {
if-feature "ssh-sha2";
base mac-alg-base;
description
"HMAC-SHA2-256";
reference
"RFC 6668: SHA-2 Data Integrity Verification for the
Sec
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 13, head 14, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 15, head 14, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ure Shell (SSH) Transport Layer Protocol";
}
identity hmac-sha2-512 {
if-feature "ssh-sha2";
base mac-alg-base;
description
"HMAC-SHA2-512";
reference
"RFC 6668: SHA-2 Data Integrity Verification for the
Secure Shell (SSH) Transport Layer Protocol";
}
grouping transport-params-grouping {
description
"A reusable grouping for SSH transport parameters.";
reference
"RFC 4253: The Secure Shell (SSH) Transport Layer Protocol";
container host-key {
description
"Parameters regarding host key.";
leaf-list host-key-alg {
type identityref {
base public-key-alg-base;
}
ordered-by user;
description
"Acceptable host key algorithms in order of descending
preference. The configured host key algorithms should
be compatible with the algorithm used by the configured
private key. Please see Section 5 of RFC XXXX for
valid combinations.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 14, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
If this leaf-list is not configured (has zero elements)
the acceptable host key algorithms are implementation-
defined.";
reference
"RFC XXXX: YANG Groupings for SSH Clients and SSH Servers";
}
}
container key-exchange {
description
"Parameters regarding key exchange.";
leaf-list key-exchange-alg {
type identityref {
base key-exchange-alg-base;
}
ordered-by user;
description
"Acceptable key exchange algorithms in order of descending
preference.
If this leaf-list is not configured (has zero elements)
the acceptable key exchange algorithms are implementation
defined.";
}
}
container encryption {
description
"Parameters regarding encryption.";
leaf-list encryption-alg {
type identityref {
base encryption-alg-base;
}
ordered-by user;
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 15, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 18, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
#767
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
"Acceptable encryption algorithms in order of descending
preference.
If this leaf-list is not configured (has zero elements)
the acceptable encryption algorithms are implementation
defined.";
}
}
container mac {
description
"Parameters regarding message authentication code (MAC).";
leaf-list mac-alg {
type identityref {
base mac-alg-base;
}
ordered-by user;
description
"Acceptable MAC algorithms in order of descending
preference.
If this leaf-list is not configured (has zero elements)
the acceptable MAC algorithms are implementation-
defined.";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 17, head 18, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 19, head 18, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 20, head 18, lenght 3
[INF]: NP: Session 1: thread 0 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 21, head 18, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 18, head 19, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="13"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-keystore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-keystore" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 20, head 21, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 22, head 21, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 21, head 22, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 22, head 17, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 18, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="13"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-keystore {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-keystore";
prefix ks;
import ietf-crypto-types {
prefix ct;
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;";
description
"This module defines a keystore to centralize management
of security credentials.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and bi
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
nary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC VVVV: A YANG Data Model for a Keystore";
}
feature keystore-supported {
description
"The 'keystore-supported' feature indicates that th
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 3, head 0, lenght 4
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
e server
supports the keystore.";
}
feature local-definitions-supported {
description
"The 'local-definitions-supported' feature indicates that the
server supports locally-defined keys.";
}
feature key-generation {
description
"Indicates that the server supports the actions related to
the life cycling keys in &lt;operational&gt;. To be used by
configuration, keys in &lt;operational&gt; must be copied to
&lt;running&gt;.";
}
typedef asymmetric-key-ref {
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name";
}
description
"This typedef enables modules to easily define a reference
to an asymmetric key stored in the keystore.";
}
grouping key-reference-type-grouping {
description
"A reusable grouping for a choice for the type of key
referenced in the keystore.";
choice key-type {
mandatory true;
description
"A choice between a reference to a
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
symmetric or asymmetric
key in the keystore.";
leaf symmetric-key-ref {
if-feature "keystore-supported";
type leafref {
path "/ks:keystore/ks:symmetric-keys/ks:symmetric-key/ks:name";
}
description
"Identifies a symmetric key used to encrypt this key.";
}
leaf asymmetric-key-ref {
if-feature "keystore-supported";
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key/ks:name";
}
description
"Identifies an asymmetric key used to encrypt this key.";
}
}
}
grouping encrypted-value-grouping {
description
"A reusable grouping for a value that has been encrypted by
a symmetric or asymmetric key in the keystore.";
uses key-reference-type-grouping;
leaf value {
type binary;
description
"The private key, encrypted using the specified symmetric
or asymmetric key.";
}
}
grouping symmetric-key-grou
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
ping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:symmetric-key-grouping {
augment "key-type" {
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-key {
description
"A container for the encrypted symmetric key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-pair-grouping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:asymmetric-key-pair-grouping {
augment "private-key-type" {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 3, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 5, lenght 1
[DBG]: LN: Session 1: sending message:
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-private-key {
description
"A container for the encrypted asymmetric private
key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-pair-with-cert-grouping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:asymmetric-key-pair-with-cert-grouping {
augment "private-key-type" {
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-private-key {
description
"A container for the encrypted asymmetric private
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 6, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-pair-with-certs-grouping {
description
"This grouping is identical to the one in ietf-crypt-types
except that it adds a couple case statements enabling the
key value to be encrypted by a symmetric or an asymmetric
key known to the keystore.";
uses ct:asymmetric-key-pair-with-certs-grouping {
augment "private-key-type" {
description
"Augments a new 'case' statement into the 'choice'
statement defined by the ietf-crypto-types module.";
container encrypted-private-key {
description
"A container for the encrypted asymmetric private
key value.";
uses encrypted-value-grouping;
}
}
}
}
grouping asymmetric-key-certificate-ref-grouping {
description
"This grouping defines a reference to a specific certificate
associated with an asymmetric
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 8, head 5, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 5, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
key stored in the keystore.";
leaf asymmetric-key {
type asymmetric-key-ref;
must "../certificate";
description
"A reference to an asymmetric key in the keystore.";
}
leaf certificate {
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key[ks:name = current()/../asymmetric-key]/ks:certificates/ks:certificate/ks:name";
}
must "../asymmetric-key";
description
"A reference to a specific certificate of the
asymmetric key in the keystore.";
}
}
grouping local-or-keystore-asymmetric-key-grouping {
description
"A grouping that expands to allow the asymmetric key to be
either stored locally, within the using data model, or be
a reference to an asymmetric key stored in the keystore.";
choice local-or-keystore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the keystore.";
case local {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 7, head 8, lenght 1
[DBG]: LN: Session 1: sending message:
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local key definition.";
uses asymmetric-key-pair-grouping;
}
}
case keystore {
if-feature "keystore-supported";
leaf keystore-reference {
type asymmetric-key-ref;
description
"A reference to an asymmetric key that exists in
the keystore. The intent is to reference just the
asymmetric key, not any certificates that may also
be associated with the asymmetric key.";
}
}
}
}
grouping local-or-keystore-asymmetric-key-with-certs-grouping {
description
"A grouping that expands to allow an asymmetric key and its
associated certificates to be either stored locally, within
the using data model, or be a reference to an asymmetric key
(and its associated certificates) stored in the keystore.";
choice local-or-ke
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 9, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 8, head 9, lenght 1
[DBG]: LN: Session 1: sending message:
ystore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the keystore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local key definition.";
uses asymmetric-key-pair-with-certs-grouping;
}
}
case keystore {
if-feature "keystore-supported";
leaf keystore-reference {
type asymmetric-key-ref;
description
"A reference to an asymmetric-key (and all of its
associated certificates) in the keystore.";
}
}
}
}
grouping local-or-keystore-end-entity-cert-with-key-grouping {
description
"A grouping that expands to allow an end-entity certificate
(and its associated private key) to be either stored locally,
within the using data model, or be a reference to a specific
certificate in
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 10, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
the keystore.";
choice local-or-keystore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the keystore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local key definition.";
uses asymmetric-key-pair-with-cert-grouping;
}
}
case keystore {
if-feature "keystore-supported";
container keystore-reference {
description
"A reference to a specific certificate (and its
associated private key) in the keystore.";
uses asymmetric-key-certificate-ref-grouping;
}
}
}
}
grouping keystore-grouping {
description
"Grouping definition enables use in other contexts. If ever
done, implementations SHOULD augment new 'case' statements
into local-or-keystore 'choice' statements to supply leafre
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 9, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 10, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
fs
to the new location.";
container asymmetric-keys {
description
"A list of asymmetric keys.";
list asymmetric-key {
key "name";
description
"An asymmetric key.";
leaf name {
type string;
description
"An arbitrary name for the asymmetric key.";
}
uses ks:asymmetric-key-pair-with-certs-grouping;
}
}
container symmetric-keys {
description
"A list of symmetric keys.";
list symmetric-key {
key "name";
description
"A symmetric key.";
leaf name {
type string;
description
"An arbitrary name for the symmetric key.";
}
uses ks:symmetric-key-grouping;
}
}
}
container keystore {
nacm:default-deny-write;
description
"The keystore contains a list of keys.";
uses keystore-grouping;
}
rpc generate-symmetric-key {
description
"Requests the device to
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 11, head 12, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 13, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 14, head 12, lenght 3
[DBG]: LN: Session 1: sending message:
generate an symmetric key using
the specified key algorithm, optionally encrypted using
a key in the keystore. The output is this RPC can be
used as input to a subsequent configuration request.";
input {
leaf algorithm {
type ct:encryption-algorithm-t;
mandatory true;
description
"The algorithm to be used when generating the key.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
container encrypt-with {
presence "Indicates that the key should be encrypted using
the specified symmetric or asymmetric key. If not
specified, then the private key is not encrypted
when returned.";
description
"A container for the 'key-type' choice.";
uses key-reference-type-grouping;
}
}
output {
uses ks:symmetric-key-grouping;
}
}
rpc generate-asymmetric-key {
description
"Requests the device to generate an asymmetric
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
#932
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 15, head 13, lenght 3
[DBG]: LN: Session 1: sending message:
key using
the specified key algorithm, optionally encrypted using
a key in the keystore. The output is this RPC can be
used as input to a subsequent configuration request.";
input {
leaf algorithm {
type ct:asymmetric-key-algorithm-t;
mandatory true;
description
"The algorithm to be used when generating the key.";
reference
"RFC CCCC: Common YANG Data Types for Cryptography";
}
container encrypt-with {
presence "Indicates that the key should be encrypted using
the specified symmetric or asymmetric key. If not
specified, then the private key is not encrypted
when returned.";
description
"A container for the 'key-type' choice.";
uses key-reference-type-grouping;
}
}
output {
uses ks:asymmetric-key-pair-grouping;
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 13, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 14, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 14, head 15, lenght 2
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 17, head 15, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="14"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>iana-crypt-hash</identifier><version>2014-08-06</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "iana-crypt-hash" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 17, head 12, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 14, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="14"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module iana-crypt-hash {
namespace "urn:ietf:params:xml:ns:yang:iana-crypt-hash";
prefix ianach;
organization
"IANA";
contact
" Internet Assigned Numbers Authority
Postal: ICANN
12025 Waterfront Drive, Suite 300
Los Angeles, CA 90094-2536
United States
Tel: +1 310 301 5800
E-Mail: [email protected]&gt;";
description
"This YANG module defines a type for storing passwords
using a hash function and features to indicate which hash
functions are supported by an implementation.
The latest revision of this YANG module can be obtained from
the IANA web site.
Requests for new values should be made to IANA via
email ([email protected]).
Copyright (c) 2014 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 0, lenght 4
[DBG]: LN: Session 1: sending message:
and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
to the license terms contained in, the Simplified BSD License
set forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(http://trustee.ietf.org/license-info).
The initial version of this YANG module is part of RFC 7317;
see the RFC itself for full legal notices.";
revision 2014-08-06 {
description
"Initial revision.";
reference
"RFC 7317: A YANG Data Model for System Management";
}
feature crypt-hash-md5 {
description
"Indicates that the device supports the MD5
hash function in 'crypt-hash' values.";
reference
"RFC 1321: The MD5 Message-Digest Algorithm";
}
feature crypt-hash-sha-256 {
description
"Indicates that the device supports the SHA-256
hash function in 'crypt-hash' values.";
reference
"FIPS.180-4.2012: Secure Hash Standard (SHS)";
}
feature
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
crypt-hash-sha-512 {
description
"Indicates that the device supports the SHA-512
hash function in 'crypt-hash' values.";
reference
"FIPS.180-4.2012: Secure Hash Standard (SHS)";
}
typedef crypt-hash {
type string {
pattern "$0$.*|$1$[a-zA-Z0-9./]{1,8}$[a-zA-Z0-9./]{22}|$5$(rounds=\\d+$)?[a-zA-Z0-9./]{1,16}$[a-zA-Z0-9./]{43}|$6$(rounds=\\d+$)?[a-zA-Z0-9./]{1,16}$[a-zA-Z0-9./]{86}";
}
description
"The crypt-hash type is used to store passwords using
a hash function. The algorithms for applying the hash
function and encoding the result are implemented in
various UNIX systems as the function crypt(3).
A value of this type matches one of the forms:
$0$&lt;clear text password&gt;
$&lt;id&gt;$&lt;salt&gt;$&lt;password hash&gt;
$&lt;id&gt;$&lt;parameter&gt;$&lt;salt&gt;$&lt;password hash&gt;
The '$0$' prefix signals that the value is clear text. When
such a value is received by the server
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
, a hash value is
calculated, and the string '$&lt;id&gt;$&lt;salt&gt;$' or
$&lt;id&gt;$&lt;parameter&gt;$&lt;salt&gt;$ is prepended to the result. This
value is stored in the configuration data store.
If a value starting with '$&lt;id&gt;$', where &lt;id&gt; is not '0', is
received, the server knows that the value already represents a
hashed value and stores it 'as is' in the data store.
When a server needs to verify a password given by a user, it
finds the stored password hash string for that user, extracts
the salt, and calculates the hash with the salt and given
password as input. If the calculated hash value is the same
as the stored value, the password given by the client is
accepted.
This type defines the following hash functions:
id | hash function | feature
---+---------------+-------------------
1 | MD5 | crypt-hash-md5
5 | SHA-256 | crypt-hash-sha-256
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 4, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 5, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#360
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
6 | SHA-512 | crypt-hash-sha-512
The server indicates support for the different hash functions
by advertising the corresponding feature.";
reference
"IEEE Std 1003.1-2008 - crypt() function
RFC 1321: The MD5 Message-Digest Algorithm
FIPS.180-4.2012: Secure Hash Standard (SHS)";
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
##
[INF]: NP: Session 1: thread 0 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 7, head 5, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 5, head 6, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 8, head 6, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 6, head 7, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="15"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tls-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 7, head 8, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-tls-server" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 8, head 3, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 4, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 0, head 0, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 0, head 5, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="15"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tls-server {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-tls-server";
prefix tlss;
import ietf-tls-common {
prefix tlscmn;
revision-date 2019-07-02;
reference
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers";
}
import ietf-truststore {
prefix ts;
reference
"RFC YYYY: A YANG Data Model for a Truststore";
}
import ietf-keystore {
prefix ks;
reference
"RFC ZZZZ: A YANG Data Model for a Keystore";
}
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 0, head 6, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
t&gt;
Author: Gary Wu &lt;mailto:[email protected]&gt;";
description
"This module defines reusable groupings for TLS servers that
can be used as a basis for specific TLS server instances.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers";
}
feature tls-server-hello-params-config {
description
"TLS hello message parameters are configurable on a TLS
server.";
}
feature tls-server-keepalives {
description
"Per socket TLS keepalive parameters are configurable for
TLS servers on the server implementing this feature.";
}
feature local-client-auth-supported {
description
"Indicates that the TLS server supports local
configuration of client credentials.";
}
feature external-client-auth-supported {
description
"Indicates that the TLS server supports external
configuration of client credentials.";
}
grouping tls-server-grouping {
description
"A reusable grouping for configuring a TLS serve
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
r without
any consideration for how underlying TCP sessions are
established.
Note that this grouping uses fairly typical descendent
node names such that a stack of 'uses' statements will
have name conflicts. It is intended that the consuming
data model will resolve the issue (e.g., by wrapping
the 'uses' statement in a container called
'tls-server-parameters'). This model purposely does
not do this itself so as to provide maximum flexibility
to consuming models.";
container server-identity {
nacm:default-deny-write;
description
"A locally-defined or referenced end-entity certificate,
including any configured intermediate certificates, the
TLS server will present when establishing a TLS connection
in its Certificate message, as defined in Section 7.4.2
in RFC 5246.";
reference
"RFC 5246:
The Transport Layer Security (TLS) Protocol Version 1.2
RFC
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 2, head 3, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ZZZZ:
YANG Data Model for a 'Keystore' Mechanism";
uses ks:local-or-keystore-end-entity-cert-with-key-grouping;
}
container client-authentication {
nacm:default-deny-write;
presence "Indicates that certificate based client authentication
is supported (i.e., the server will request that the
client send a certificate).";
description
"Specifies if TLS client authentication is required or
optional, and specifies if the certificates needed to
authenticate the TLS client are configured locally or
externally. If configured locally, the data model
enables both trust anchors and end-entity certificate
to be set.";
choice required-or-optional {
mandatory true;
description
"Indicates if TLS-level client authentication is required
or optional. This is necessary for some protocols (e.g.,
RESTCONF) the may optionally authenticate a client via
TLS-
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 3, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
level authentication, HTTP-level authentication, or
both simultaneously).";
leaf required {
type empty;
description
"Indicates that TLS-level client authentication is
required.";
}
leaf optional {
type empty;
description
"Indicates that TLS-level client authentication is
optional.";
}
}
choice local-or-external {
mandatory true;
description
"Indicates if the certificates needed to authenticate
the client are configured locally or externally. The
need to support external configuration for client
authentication stems from the desire to support
consuming data models that prefer to place client
authentication with client definitions, rather then
in a data model principally concerned with configuring
the transport.";
case local {
if-feature "local-cl
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 5, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
ient-auth-supported";
description
"The certificates needed to authenticate the clients
are configured locally.";
leaf ca-certs {
if-feature "ts:x509-certificates";
type ts:certificates-ref;
description
"A reference to a list of certificate authority (CA)
certificates used by the TLS server to authenticate
TLS client certificates. A client certificate is
authenticated if it has a valid chain of trust to
a configured CA certificate.";
reference
"RFC YYYY: YANG Data Model for Global Trust Anchors";
}
leaf client-certs {
if-feature "ts:x509-certificates";
type ts:certificates-ref;
description
"A reference to a list of client certificates
used by the TLS server to authenticate TLS
client certificates. A clients certificate
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 6, head 7, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 8, head 7, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
is authenticated if it is an exact match to
a configured client certificate.";
reference
"RFC YYYY: YANG Data Model for Global Trust Anchors";
}
}
case external {
if-feature "external-client-auth-supported";
description
"The certificates needed to authenticate the clients
are configured externally.";
leaf client-auth-defined-elsewhere {
type empty;
description
"Indicates that certificates needed to authenticate
clients are configured elsewhere.";
}
}
}
}
container hello-params {
nacm:default-deny-write;
if-feature "tls-server-hello-params-config";
description
"Configurable parameters for the TLS hello message.";
uses tlscmn:hello-params-grouping;
}
container keepalives {
nacm:default-deny-write;
if-feature "tls-server-keepalives";
presence "In
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#983
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
dicates that keepalives are enabled.";
description
"Configures the keep-alive policy, to proactively test
the aliveness of the TLS client. An unresponsive
TLS client is dropped after approximately max-wait
* max-attempts seconds.";
leaf max-wait {
type uint16 {
range "1..max";
}
units "seconds";
default "30";
description
"Sets the amount of time in seconds after which if
no data has been received from the TLS client, a
TLS-level message will be sent to test the
aliveness of the TLS client.";
}
leaf max-attempts {
type uint8;
default "3";
description
"Sets the maximum number of sequential keep-alive
messages that can fail to obtain a response from
the TLS client before assuming the TLS client is
no longer alive.";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 9, head 10, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 11, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 10, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 10, head 11, lenght 2
[INF]: NP: Session 1: thread 1 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 13, head 11, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 11, head 12, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="16"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tls-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-tls-common" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 14, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 15, head 13, lenght 3
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 13, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="16"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tls-common {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-tls-common";
prefix tlscmn;
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;
Author: Gary Wu &lt;mailto:[email protected]&gt;";
description
"This module defines a common features, identities, and
groupings for Transport Layer Security (TLS).
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set fort
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 14, head 15, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 15, head 16, lenght 1
[DBG]: LN: Session 1: sending message:
h in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers";
}
feature tls-1_0 {
description
"TLS Protocol Version 1.0 is supported.";
reference
"RFC 2246: The TLS Protocol Version 1.0";
}
feature tls-1_1 {
description
"TLS Protocol Version 1.1 is supported.";
reference
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 17, head 16, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 18, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
"RFC 4346: The Transport Layer Security (TLS) Protocol
Version 1.1";
}
feature tls-1_2 {
description
"TLS Protocol Version 1.2 is supported.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
feature tls-1_3 {
description
"TLS Protocol Version 1.2 is supported.";
reference
"RFC 8446: The Transport Layer Security (TLS) Protocol
Version 1.3";
}
feature tls-ecc {
description
"Elliptic Curve Cryptography (ECC) is supported for TLS.";
reference
"RFC 8422: Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS)";
}
feature tls-dhe {
description
"Ephemeral Diffie-Hellman key exchange is supported for TLS.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
feature tls-3des {
description
"The Triple-DES block cipher is supported for
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 19, head 17, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 17, head 18, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
TLS.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
feature tls-gcm {
description
"The Galois/Counter Mode authenticated encryption mode is
supported for TLS.";
reference
"RFC 5288: AES Galois Counter Mode (GCM) Cipher Suites for
TLS";
}
feature tls-sha2 {
description
"The SHA2 family of cryptographic hash functions is supported
for TLS.";
reference
"FIPS PUB 180-4: Secure Hash Standard (SHS)";
}
identity tls-version-base {
description
"Base identity used to identify TLS protocol versions.";
}
identity tls-1.0 {
if-feature "tls-1_0";
base tls-version-base;
description
"TLS Protocol Version 1.0.";
reference
"RFC 2246: The TLS Protocol Version 1.0";
}
identity tls-1.1 {
if-feature "tls-1_1";
base tls-version-base;
description
"TLS Protocol Version 1.1.";
reference
"RFC 4346: The Transport
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 18, head 19, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
Layer Security (TLS) Protocol
Version 1.1";
}
identity tls-1.2 {
if-feature "tls-1_2";
base tls-version-base;
description
"TLS Protocol Version 1.2.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity cipher-suite-base {
description
"Base identity used to identify TLS cipher suites.";
}
identity rsa-with-aes-128-cbc-sha {
base cipher-suite-base;
description
"Cipher suite TLS_RSA_WITH_AES_128_CBC_SHA.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity rsa-with-aes-256-cbc-sha {
base cipher-suite-base;
description
"Cipher suite TLS_RSA_WITH_AES_256_CBC_SHA.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity rsa-with-aes-128-cbc-sha256 {
if-feature "tls-sha2";
base cipher-suite-base;
description
"Ci
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 19, head 20, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 22, head 20, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
pher suite TLS_RSA_WITH_AES_128_CBC_SHA256.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity rsa-with-aes-256-cbc-sha256 {
if-feature "tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity dhe-rsa-with-aes-128-cbc-sha {
if-feature "tls-dhe";
base cipher-suite-base;
description
"Cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity dhe-rsa-with-aes-256-cbc-sha {
if-feature "tls-dhe";
base cipher-suite-base;
description
"Cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity dhe-rsa-with-aes-128
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 20, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 23, head 21, lenght 3
[DBG]: LN: Session 1: sending message:
-cbc-sha256 {
if-feature "tls-dhe and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity dhe-rsa-with-aes-256-cbc-sha256 {
if-feature "tls-dhe and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity ecdhe-ecdsa-with-aes-128-cbc-sha256 {
if-feature "tls-ecc and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-ecdsa-with-aes-256-cbc-sha384 {
if-feature "tls-ecc and tls-sha2";
base cipher-suite-base;
descr
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 21, head 22, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 24, head 22, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
iption
"Cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-rsa-with-aes-128-cbc-sha256 {
if-feature "tls-ecc and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-rsa-with-aes-256-cbc-sha384 {
if-feature "tls-ecc and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-ecdsa-with-aes-128-gcm-sha256 {
if-feature "tls-ecc and tls-gcm and tls-sha2";
base cipher-suite-base;
description
"Ciph
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 22, head 23, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 25, head 23, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 23, head 24, lenght 2
[DBG]: LN: Session 1: sending message:
er suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-ecdsa-with-aes-256-gcm-sha384 {
if-feature "tls-ecc and tls-gcm and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-rsa-with-aes-128-gcm-sha256 {
if-feature "tls-ecc and tls-gcm and tls-sha2";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity ecdhe-rsa-with-aes-256-gcm-sha384 {
if-feature "tls-ecc and tls-gcm and tls-sha2";
base cipher-suite-base;
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 24, head 25, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 26, head 25, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 27, head 25, lenght 3
[DBG]: LN: Session 1: sending message:
"Cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384.";
reference
"RFC 5289: TLS Elliptic Curve Cipher Suites with
SHA-256/384 and AES Galois Counter Mode (GCM)";
}
identity rsa-with-3des-ede-cbc-sha {
if-feature "tls-3des";
base cipher-suite-base;
description
"Cipher suite TLS_RSA_WITH_3DES_EDE_CBC_SHA.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
}
identity ecdhe-rsa-with-3des-ede-cbc-sha {
if-feature "tls-ecc and tls-3des";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA.";
reference
"RFC 8422: Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS)";
}
identity ecdhe-rsa-with-aes-128-cbc-sha {
if-feature "tls-ecc";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA.";
reference
"RFC 8422: Elliptic Curve Cryptograp
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 25, head 26, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 28, head 26, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 26, head 27, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 27, head 28, lenght 1
[DBG]: LN: Session 1: sending message:
hy (ECC) Cipher Suites
for Transport Layer Security (TLS)";
}
identity ecdhe-rsa-with-aes-256-cbc-sha {
if-feature "tls-ecc";
base cipher-suite-base;
description
"Cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA.";
reference
"RFC 8422: Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS)";
}
grouping hello-params-grouping {
description
"A reusable grouping for TLS hello message parameters.";
reference
"RFC 5246: The Transport Layer Security (TLS) Protocol
Version 1.2";
container tls-versions {
description
"Parameters regarding TLS versions.";
leaf-list tls-version {
type identityref {
base tls-version-base;
}
description
"Acceptable TLS protocol versions.
If this leaf-list is not configured (has zero elements)
the acceptable TLS protocol versions are implementation-
defined
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 28, head 23, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#823
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
.";
}
}
container cipher-suites {
description
"Parameters regarding cipher suites.";
leaf-list cipher-suite {
type identityref {
base cipher-suite-base;
}
ordered-by user;
description
"Acceptable cipher suites in order of descending
preference. The configured host key algorithms should
be compatible with the algorithm used by the configured
private key. Please see Section 5 of RFC XXXX for
valid combinations.
If this leaf-list is not configured (has zero elements)
the acceptable cipher suites are implementation-
defined.";
reference
"RFC XXXX: YANG Groupings for TLS Clients and TLS Servers";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 2
[INF]: NP: Session 1: thread 4 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 4, head 2, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="17"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-truststore</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 5, head 3, lenght 3
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 3, head 4, lenght 2
[INF]: LN: Schema "ietf-truststore" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 6, head 4, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 4, head 5, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 5, head 6, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 6, head 1, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="17"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-truststore {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-truststore";
prefix ts;
import ietf-netconf-acm {
prefix nacm;
reference
"RFC 8341: Network Configuration Access Control Model";
}
import ietf-crypto-types {
prefix ct;
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;";
description
"This module defines a truststore to centralize management
of trust anchors including both X.509 certificates and
SSH host keys.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 3, head 0, lenght 4
[DBG]: LN: Session 1: sending message:
reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: A YANG Data Model for a Truststore";
}
feature truststore-supported {
descripti
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
on
"The 'truststore-supported' feature indicates that the
server supports the truststore.";
}
feature local-definitions-supported {
description
"The 'local-definitions-supported' feature indicates that
the server supports locally-defined trust anchors.";
}
feature x509-certificates {
description
"The 'x509-certificates' feature indicates that the server
implements the /truststore/certificates subtree.";
}
feature ssh-host-keys {
description
"The 'ssh-host-keys' feature indicates that the server
implements the /truststore/host-keys subtree.";
}
typedef certificates-ref {
type leafref {
path "/ts:truststore/ts:certificates/ts:name";
}
description
"This typedef enables modules to easily define a reference
to a set of certificates defined in the truststore.";
}
typedef host-keys-ref {
type leafref {
path "/ts:truststore/ts:host-keys/ts:name";
}
description
"This typedef
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
enables modules to easily define a reference
to a set of host keys defined in the truststore.";
}
grouping local-or-truststore-certs-grouping {
description
"A grouping that expands to allow trust anchors to be
either stored locally, within the using data model, or be
a reference to trust anchors stored in the truststore.";
choice local-or-truststore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the truststore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local trust anchor definitions.
A list is defined so as to be symmetric with the
truststore definition.";
uses ct:trust-anchor-certs-grouping;
}
}
case truststore {
if-feature "truststore-supported";
if-feature "x509-certificates";
leaf tr
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 3, head 4, lenght 1
[DBG]: LN: Session 1: sending message:
uststore-reference {
type certificates-ref;
description
"A reference to a set of trust anchors that exists
in the truststore.";
}
}
}
}
grouping local-or-truststore-host-keys-grouping {
description
"A grouping that expands to allow trust anchors to be
either stored locally, within the using data model, or be
a reference to trust anchors stored in the truststore.";
choice local-or-truststore {
mandatory true;
description
"A choice between an inlined definition and a definition
that exists in the truststore.";
case local {
if-feature "local-definitions-supported";
container local-definition {
description
"Container to hold the local trust anchor definitions.
A list is defined so as to be symmetric with the
truststore definition.";
leaf-list host-key {
nacm:default-deny-write;
type ct:ss
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 4, head 6, lenght 0
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
h-host-key;
description
"The binary data for this host key.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
uses ct:trust-anchor-certs-grouping;
}
}
case truststore {
if-feature "truststore-supported";
if-feature "ssh-host-keys";
leaf truststore-reference {
type host-keys-ref;
description
"A reference to a set of trust anchors that exists
in the truststore.";
}
}
}
}
grouping truststore-grouping {
description
"Grouping definition enables use in other contexts. If ever
done, implementations SHOULD augment new 'case' statements
into local-or-keystore 'choice' statements to supply leafrefs
to the new location.";
list certificates {
if-feature "x509-certificates";
key "name";
description
"A list of certificates. These certificates can be
use
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 0, head 1, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 1, lenght 0
[DBG]: LN: Session 1: sending message:
d by a server to authenticate clients, or by a client
to authenticate servers. Each list of certificates
SHOULD be specific to a purpose, as the list as a whole
may be referenced by other modules. For instance, a
RESTCONF server's configuration might use a specific list
of certificates for when authenticating RESTCONF
client connections.";
leaf name {
type string;
description
"An arbitrary name for this list of certificates.";
}
leaf description {
type string;
description
"An arbitrary description for this list of
certificates.";
}
list certificate {
key "name";
description
"A certificate.";
leaf name {
type string;
description
"An arbitrary name for this certificate. The
name must be unique across all lists of
certificates (not just this list) so that leafrefs
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
from another module can resolve to unique values.";
}
uses ct:trust-anchor-cert-grouping {
refine "cert" {
mandatory true;
}
}
}
}
list host-keys {
if-feature "ssh-host-keys";
key "name";
description
"A list of host keys. These host-keys can
be used by clients to authenticate SSH servers. Each
list of host keys SHOULD be specific to a purpose,
so the list as a whole may be referenced by other modules.
For instance, a NETCONF client's configuration might
point to a specific list of host keys for when
authenticating specific SSH servers.";
leaf name {
type string;
description
"An arbitrary name for this list of SSH
host keys.";
}
leaf description {
type string;
description
"An arbitrary description for this list of SSH
host keys.";
}
list host-key {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
#860
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
key "name";
description
"A host key.";
leaf name {
type string;
description
"An arbitrary name for this host-key. Must be
unique across all lists of host-keys (not just
this list) so that a leafref to it from another module
can resolve to unique values.";
}
leaf host-key {
type ct:ssh-host-key;
mandatory true;
description
"The binary public key data for this host key.";
reference
"RFC YYYY: Common YANG Data Types for Cryptography";
}
}
}
}
container truststore {
nacm:default-deny-write;
description
"The truststore contains sets of X.509 certificates and
SSH host keys.";
uses truststore-grouping;
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 2, lenght 3
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 5, head 2, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 2, head 3, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 3, head 4, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="18"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-netconf-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 6, head 4, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[INF]: LN: Schema "ietf-netconf-server" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 7, head 5, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 5, head 6, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 6, head 7, lenght 1
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="18"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-netconf-server {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-netconf-server";
prefix ncs;
import ietf-yang-types {
prefix yang;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-x509-cert-to-name {
prefix x509c2n;
reference
"RFC 7407: A YANG Data Model for SNMP Configuration";
}
import ietf-tcp-client {
prefix tcpc;
reference
"RFC AAAA: YANG Groupings for TCP Clients and TCP Servers";
}
import ietf-tcp-server {
prefix tcps;
reference
"RFC AAAA: YANG Groupings for TCP Clients and TCP Servers";
}
import ietf-ssh-server {
prefix sshs;
revision-date 2019-07-02;
reference
"RFC BBBB: YANG Groupings for SSH Clients and SSH Servers";
}
import ietf-tls-server {
prefix tlss;
revision-date 2019-07-02;
reference
"RFC CC
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 7, head 2, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
CC: YANG Groupings for TLS Clients and TLS Servers";
}
organization
"IETF NETCONF (Network Configuration) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
WG List: &lt;mailto:[email protected]&gt;
Author: Kent Watsen &lt;mailto:[email protected]&gt;
Author: Gary Wu &lt;mailto:[email protected]&gt;
Author: Juergen Schoenwaelder
&lt;mailto:[email protected]&gt;";
description
"This module contains a collection of YANG definitions
for configuring NETCONF servers.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.or
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 3, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
g/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: NETCONF Client and Server Models";
}
feature ssh-listen {
description
"The 'ssh-listen' feature indicates that the NETCONF server
supports opening a port to accept NETCONF over SSH
client connections.";
reference
"RFC 6242:
Using the NETCONF Protocol over Secure Shell (SSH)";
}
feature tls-listen {
description
"The 'tls-listen' feature indicates that the NETC
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 1, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ONF server
supports opening a port to accept NETCONF over TLS
client connections.";
reference
"RFC 7589: Using the NETCONF Protocol over Transport
Layer Security (TLS) with Mutual X.509
Authentication";
}
feature ssh-call-home {
description
"The 'ssh-call-home' feature indicates that the NETCONF
server supports initiating a NETCONF over SSH call
home connection to NETCONF clients.";
reference
"RFC 8071: NETCONF Call Home and RESTCONF Call Home";
}
feature tls-call-home {
description
"The 'tls-call-home' feature indicates that the NETCONF
server supports initiating a NETCONF over TLS call
home connection to NETCONF clients.";
reference
"RFC 8071: NETCONF Call Home and RESTCONF Call Home";
}
grouping netconf-server-grouping {
description
"Top-level grouping for NETCONF server configuration.";
container listen {
if-feature "ssh-listen or tls-listen";
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 5, head 3, lenght 3
[DBG]: LN: Session 1: sending message:
presence "Enables server to listen for NETCONF client connections.";
description
"Configures listen behavior";
leaf idle-timeout {
type uint16;
units "seconds";
default "3600";
description
"Specifies the maximum number of seconds that a NETCONF
session may remain idle. A NETCONF session will be
dropped if it is idle for an interval longer than this
number of seconds. If set to zero, then the server
will never drop a session because it is idle. Sessions
that have a notification subscription active are never
dropped.";
}
list endpoint {
key "name";
min-elements 1;
description
"List of endpoints to listen for NETCONF connections.";
leaf name {
type string;
description
"An arbitrary name for the NETCONF listen endpoint.";
}
choice transport {
mandatory true;
de
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 3, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
scription
"Selects between available transports.";
case ssh {
if-feature "ssh-listen";
container ssh {
description
"SSH-specific listening configuration for inbound
connections.";
container tcp-server-parameters {
description
"A wrapper around the TCP client parameters
to avoid name collisions.";
uses tcps:tcp-server-grouping {
refine "local-port" {
default "830";
description
"The NETCONF server will listen on the
IANA-assigned well-known port value
for 'netconf-ssh' (830) if no value
is specified.";
}
}
}
container ssh-server-parameters {
description
"A wrapper around the SSH server parameters
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
to avoid name collisions.";
uses sshs:ssh-server-grouping;
}
}
}
case tls {
if-feature "tls-listen";
container tls {
description
"TLS-specific listening configuration for inbound
connections.";
container tcp-server-parameters {
description
"A wrapper around the TCP client parameters
to avoid name collisions.";
uses tcps:tcp-server-grouping {
refine "local-port" {
default "6513";
description
"The NETCONF server will listen on the
IANA-assigned well-known port value
for 'netconf-tls' (6513) if no value
is specified.";
}
}
}
container tls-server-parameters {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 5, head 6, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 8, head 6, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
description
"A wrapper around the TLS server parameters to
avoid name collisions.";
uses tlss:tls-server-grouping {
refine "client-authentication" {
description
"NETCONF/TLS servers MUST validate client
certificates.";
}
augment "client-authentication" {
description
"Augments in the cert-to-name structure.";
container cert-maps {
description
"The cert-maps container is used by a TLS-
based NETCONF server to map the NETCONF
client's presented X.509 certificate to
a NETCONF username. If no matching and
valid cert-to-name list entry can be found,
then the NETCONF server MUST close the
co
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 6, head 7, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
nnection, and MUST NOT accept NETCONF
messages over it.";
reference
"RFC WWWW: NETCONF over TLS, Section 7";
uses x509c2n:cert-to-name;
}
}
}
}
}
}
}
}
}
container call-home {
if-feature "ssh-call-home or tls-call-home";
presence "Enables the NETCONF server to initiate the underlying
transport connection to NETCONF clients.";
description
"Configures call home behavior.";
list netconf-client {
key "name";
min-elements 1;
description
"List of NETCONF clients the NETCONF server is to
initiate call-home connections to in parallel.";
leaf name {
type string;
description
"An arbitrary name for the remote NETCONF client.";
}
container endpoints {
description
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 7, head 8, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
"Container for the list of endpoints.";
list endpoint {
key "name";
min-elements 1;
ordered-by user;
description
"A non-empty user-ordered list of endpoints for this
NETCONF server to try to connect to in sequence.
Defining more than one enables high-availability.";
leaf name {
type string;
description
"An arbitrary name for this endpoint.";
}
choice transport {
mandatory true;
description
"Selects between available transports.";
case ssh {
if-feature "ssh-call-home";
container ssh {
description
"Specifies SSH-specific call-home transport
configuration.";
container tcp-client-parameters {
description
"A wrapper around t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 11, head 9, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 9, head 10, lenght 2
[DBG]: LN: Session 1: sending message:
he TCP client parameters
to avoid name collisions.";
uses tcpc:tcp-client-grouping {
refine "remote-port" {
default "4334";
description
"The NETCONF server will attempt to connect
to the IANA-assigned well-known port for
'netconf-ch-tls' (4334) if no value is
specified.";
}
}
}
container ssh-server-parameters {
description
"A wrapper around the SSH server parameters
to avoid name collisions.";
uses sshs:ssh-server-grouping;
}
}
}
case tls {
if-feature "tls-call-home";
container tls {
description
"Speci
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 10, head 11, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 12, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 13, head 11, lenght 3
[DBG]: LN: Session 1: sending message:
fies TLS-specific call-home transport
configuration.";
container tcp-client-parameters {
description
"A wrapper around the TCP client parameters
to avoid name collisions.";
uses tcpc:tcp-client-grouping {
refine "remote-port" {
default "4335";
description
"The NETCONF server will attempt to connect
to the IANA-assigned well-known port for
'netconf-ch-tls' (4335) if no value is
specified.";
}
}
}
container tls-server-parameters {
description
"A wrapper around the TLS server parameters
to avoid name collisions.";
uses tlss:tls-server-grouping {
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 11, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 14, head 12, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 12, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
refine "client-authentication" {
description
"NETCONF/TLS servers MUST validate client
certificates.";
}
augment "client-authentication" {
description
"Augments in the cert-to-name structure.";
container cert-maps {
description
"The cert-maps container is used by a
TLS-based NETCONF server to map the
NETCONF client's presented X.509
certificate to a NETCONF username. If
no matching and valid cert-to-name list
entry can be found, then the NETCONF
server MUST close the connection, and
MUST NOT accept NETCONF messages over
it."
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 13, head 14, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 15, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
;
reference
"RFC WWWW: NETCONF over TLS, Section 7";
uses x509c2n:cert-to-name;
}
}
}
}
}
}
}
}
}
container connection-type {
description
"Indicates the NETCONF server's preference for how the
NETCONF connection is maintained.";
choice connection-type {
mandatory true;
description
"Selects between available connection types.";
case persistent-connection {
container persistent {
presence "Indicates that a persistent connection is
to be maintained.";
description
"Maintain a persistent connection to the NETCONF
client. If the connection goes down, immediately
start trying t
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 14, head 15, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 16, head 15, lenght 2
[DBG]: LN: Session 1: sending message:
o reconnect to the NETCONF client,
using the reconnection strategy.
This connection type minimizes any NETCONF client
to NETCONF server data-transfer delay, albeit at
the expense of holding resources longer.";
}
}
case periodic-connection {
container periodic {
presence "Indicates that a periodic connection is
to be maintained.";
description
"Periodically connect to the NETCONF client.
This connection type increases resource
utilization, albeit with increased delay in
NETCONF client to NETCONF client interactions.
The NETCONF client SHOULD gracefully close the
connection using &lt;close-session&gt; upon completing
planned activities. If the NETCONF session is
not closed gracefully,
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: sending message:
the NETCONF server MUST
immediately attempt to reestablish the connection.
In the case that the previous connection is still
active (i.e., the NETCONF client has not closed
it yet), establishing a new connection is NOT
RECOMMENDED.";
leaf period {
type uint16;
units "minutes";
default "60";
description
"Duration of time between periodic connections.";
}
leaf anchor-time {
type yang:date-and-time {
pattern "\\d{4}-\\d{2}-\\d{2}T\\d{2}:\\d{2}(Z|[\\+\\-]\\d{2}:\\d{2})";
}
description
"Designates a timestamp before or after which a
series of periodic connections are determined.
The periodic connections occur at a whole
multipl
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 18, head 16, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 17, head 18, lenght 1
[DBG]: LN: Session 1: sending message:
e interval from the anchor time. For
example, for an anchor time is 15 minutes past
midnight and a period interval of 24 hours, then
a periodic connection will occur 15 minutes past
midnight everyday.";
}
leaf idle-timeout {
type uint16;
units "seconds";
default "120";
description
"Specifies the maximum number of seconds that
a NETCONF session may remain idle. A NETCONF
session will be dropped if it is idle for an
interval longer than this number of seconds.
If set to zero, then the server will never
drop a session because it is idle.";
}
}
}
}
}
container reconnect-strategy {
description
"The reconnection stra
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 19, head 18, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
tegy directs how a NETCONF server
reconnects to a NETCONF client, after discovering its
connection to the client has dropped, even if due to a
reboot. The NETCONF server starts with the specified
endpoint and tries to connect to it max-attempts times
before trying the next endpoint in the list (round
robin).";
leaf start-with {
type enumeration {
enum "first-listed" {
description
"Indicates that reconnections should start with
the first endpoint listed.";
}
enum "last-connected" {
description
"Indicates that reconnections should start with
the endpoint last connected to. If no previous
connection has ever been established, then the
first endpoint configured is used. NETCONF
servers SHOULD be able to rememb
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 18, head 19, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 21, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
er the last
endpoint connected to across reboots.";
}
enum "random-selection" {
description
"Indicates that reconnections should start with
a random endpoint.";
}
}
default "first-listed";
description
"Specifies which of the NETCONF client's endpoints
the NETCONF server should start with when trying
to connect to the NETCONF client.";
}
leaf max-attempts {
type uint8 {
range "1..max";
}
default "3";
description
"Specifies the number times the NETCONF server tries
to connect to a specific endpoint before moving on
to the next endpoint in the list (round robin).";
}
}
}
}
}
container netconf-server {
description
"Top-level container for NETCONF server co
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
#74
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 22, head 20, lenght 3
[DBG]: LN: Session 1: sending message:
nfiguration.";
uses netconf-server-grouping;
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 20, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 21, head 22, lenght 1
[INF]: NP: Session 1: thread 0 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 23, head 22, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 22, head 23, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 24, head 23, lenght 2
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="19"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-x509-cert-to-name</identifier><version>2014-12-10</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 23, head 24, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-x509-cert-to-name" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 25, head 24, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 26, head 24, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 24, head 25, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 25, head 26, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 26, head 21, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="19"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-x509-cert-to-name {
namespace "urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name";
prefix x509c2n;
import ietf-yang-types {
prefix yang;
}
organization
"IETF NETMOD (NETCONF Data Modeling Language) Working Group";
contact
"WG Web: &lt;http://tools.ietf.org/wg/netmod/&gt;
WG List: &lt;mailto:[email protected]&gt;
WG Chair: Thomas Nadeau
&lt;mailto:[email protected]&gt;
WG Chair: Juergen Schoenwaelder
&lt;mailto:[email protected]&gt;
Editor: Martin Bjorklund
&lt;mailto:[email protected]&gt;
Editor: Juergen Schoenwaelder
&lt;mailto:[email protected]&gt;";
description
"This module contains a collection of YANG definitions for
extracting a name from an X.509 certificate.
The algorithm used
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 1, head 0, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 2, head 0, lenght 3
[DBG]: LN: Session 1: sending message:
to extract a name from an X.509 certificate
was first defined in RFC 6353.
Copyright (c) 2014 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
to the license terms contained in, the Simplified BSD License
set forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(http://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC 7407; see
the RFC itself for full legal notices.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model for
the Simple Network Management Protocol (SNMP)";
revision 2014-12-10 {
description
"Initial revision.";
reference
"RFC 7407: A YANG Data Model for SNMP Configuration";
}
identity cert-to-name {
description
"Base identity for algorithms to derive a name fro
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 3, head 0, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
m a
certificate.";
}
identity specified {
base cert-to-name;
description
"Directly specifies the name to be used for the certificate.
The value of the leaf 'name' in the cert-to-name list is
used.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSpecified";
}
identity san-rfc822-name {
base cert-to-name;
description
"Maps a subjectAltName's rfc822Name to a name. The local part
of the rfc822Name is passed unaltered, but the host-part of
the name must be passed in lowercase. For example, the
rfc822Name field [email protected] is mapped to name
[email protected].";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANRFC822Name";
}
identity san-dns-name {
base cer
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 1, head 2, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 2, head 3, lenght 1
[DBG]: LN: Session 1: sending message:
t-to-name;
description
"Maps a subjectAltName's dNSName to a name after first
converting it to all lowercase (RFC 5280 does not specify
converting to lowercase, so this involves an extra step).
This mapping results in a 1:1 correspondence between
subjectAltName dNSName values and the name values.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANDNSName";
}
identity san-ip-address {
base cert-to-name;
description
"Maps a subjectAltName's iPAddress to a name by
transforming the binary-encoded address as follows:
1) for IPv4, the value is converted into a
decimal-dotted quad address (e.g., '192.0.2.1').
2) for IPv6 addresses, the value is converted into a
32-character, all-lowercase hexadecimal string
without any colon separators.
This mapping results in a
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 3, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 3, head 4, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 5, head 4, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 6, head 4, lenght 3
[DBG]: LN: Session 1: sending message:
1:1 correspondence between
subjectAltName iPAddress values and the name values.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANIpAddress";
}
identity san-any {
base cert-to-name;
description
"Maps any of the following fields using the corresponding
mapping algorithms:
+------------+-----------------+
| Type | Algorithm |
|------------+-----------------|
| rfc822Name | san-rfc822-name |
| dNSName | san-dns-name |
| iPAddress | san-ip-address |
+------------+-----------------+
The first matching subjectAltName value found in the
certificate of the above types MUST be used when deriving
the name. The mapping algorithm specified in the
'Algorithm' column MUST be used to derive the name.
This mapping results in a 1:1 correspondenc
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 7, head 5, lenght 3
[DBG]: LN: Session 1: sending message:
e between
subjectAltName values and name values. The three sub-mapping
algorithms produced by this combined algorithm cannot produce
conflicting results between themselves.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertSANAny";
}
identity common-name {
base cert-to-name;
description
"Maps a certificate's CommonName to a name after converting
it to a UTF-8 encoding. The usage of CommonNames is
deprecated, and users are encouraged to use subjectAltName
mapping methods instead. This mapping results in a 1:1
correspondence between certificate CommonName values and name
values.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertCommonName";
}
typedef tls-fingerprint {
type y
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 5, head 6, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
ang:hex-string {
pattern "([0-9a-fA-F]){2}(:([0-9a-fA-F]){2}){0,254}";
}
description
"A fingerprint value that can be used to uniquely reference
other data of potentially arbitrary length.
A tls-fingerprint value is composed of a 1-octet hashing
algorithm identifier followed by the fingerprint value. The
first octet value identifying the hashing algorithm is taken
from the IANA 'TLS HashAlgorithm Registry' (RFC 5246). The
remaining octets are filled using the results of the hashing
algorithm.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.SnmpTLSFingerprint";
}
grouping cert-to-name {
description
"Defines nodes for mapping certificates to names. Modules
that use this grouping should describe how the resulting
name is used.";
list cert-to-name {
key "id";
description
"Th
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 8, head 6, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 6, head 7, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
is list defines how certificates are mapped to names.
The name is derived by considering each cert-to-name
list entry in order. The cert-to-name entry's fingerprint
determines whether the list entry is a match:
1) If the cert-to-name list entry's fingerprint value
matches that of the presented certificate, then consider
the list entry a successful match.
2) If the cert-to-name list entry's fingerprint value
matches that of a locally held copy of a trusted CA
certificate, and that CA certificate was part of the CA
certificate chain to the presented certificate, then
consider the list entry a successful match.
Once a matching cert-to-name list entry has been found, the
map-type is used to determine how the name associated with
the certificate should be determined. See the map-type
leaf's description for details on determining the name value.
If it
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 7, head 8, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 10, head 8, lenght 3
[DBG]: LN: Session 1: sending message:
is impossible to determine a name from the cert-to-name
list entry's data combined with the data presented in the
certificate, then additional cert-to-name list entries MUST
be searched to look for another potential match.
Security administrators are encouraged to make use of
certificates with subjectAltName fields that can be mapped to
names so that a single root CA certificate can allow all
child certificates' subjectAltName fields to map directly to
a name via a 1:1 transformation.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol (SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNEntry";
leaf id {
type uint32;
description
"The id specifies the order in which the entries in the
cert-to-name list are searched. Entries with lower
numbers are searched first.";
reference
"RFC 6
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 8, head 9, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 11, head 9, lenght 3
[DBG]: LN: Session 1: sending message:
353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNID";
}
leaf fingerprint {
type tls-fingerprint;
mandatory true;
description
"Specifies a value with which the fingerprint of the
full certificate presented by the peer is compared. If
the fingerprint of the full certificate presented by the
peer does not match the fingerprint configured, then the
entry is skipped, and the search for a match continues.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNFingerprint";
}
leaf map-type {
type identityref {
base cert-to-name;
}
mandatory true;
description
"Specifies the algorithm
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 9, head 10, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 12, head 10, lenght 3
[DBG]: LN: Session 1: sending message:
#956
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 10, head 11, lenght 2
[DBG]: LN: Session 1: sending message:
used to map the certificate
presented by the peer to a name.
Mappings that need additional configuration objects should
use the 'when' statement to make them conditional based on
the map-type.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNMapType";
}
leaf name {
when "../map-type = 'x509c2n:specified'";
type string;
mandatory true;
description
"Directly specifies the NETCONF username when the
map-type is 'specified'.";
reference
"RFC 6353: Transport Layer Security (TLS) Transport Model
for the Simple Network Management Protocol
(SNMP).
SNMP-TLS-TM-MIB.snmpTlstmCertToTSNData";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 11, head 12, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 13, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 14, head 12, lenght 3
[INF]: NP: Session 1: thread 4 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 12, head 13, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 15, head 13, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 16, head 13, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 13, head 14, lenght 3
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="20"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-client</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 14, head 15, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-tcp-client" was requested.
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="20"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-client {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-client";
prefix tcpc;
import ietf-inet-types {
prefix inet;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-tcp-common {
prefix tcpcmn;
reference
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers";
}
organization
"IETF NETCONF (Network Configuration) Working Group and the
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
&lt;http://datatracker.ietf.org/wg/tcpm/&gt;
WG List: &lt;mailto:[email protected]&gt;
&lt;mailto:[email protected]&gt;
Authors: Kent Watsen &lt;mailto:[email protected]&gt;
Michael Scharf
&lt;mailto:[email protected]&gt;"
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 18, head 15, lenght 4
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 15, head 16, lenght 3
[DBG]: LN: Session 1: sending message:
;
description
"This module defines reusable groupings for TCP clients that
can be used as a basis for specific TCP client instances.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and o
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 16, head 17, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 17, head 18, lenght 1
[DBG]: LN: Session 1: sending message:
nly when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers";
}
feature local-binding-supported {
description
"Indicates that the server supports configuring local
bindings (i.e., the local address and local port) for
TCP clients.";
}
feature tcp-client-keepalives {
description
"Per socket TCP keepalive parameters are configurable for
TCP clients on the server implementing this feature.";
}
grouping tcp-client-grouping {
description
"A reusable grouping for configuring a TCP client.
Note that this grouping uses fairly typical descendent
node names such that a stack of 'uses' statements will
have name conflicts. It is intended that the consuming
data model will resolve the issue (e.g., by wrapping
the 'uses' statement in a container called
'tcp-client-paramete
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 19, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 20, head 18, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 21, head 18, lenght 4
[DBG]: LN: Session 1: sending message:
rs'). This model purposely does
not do this itself so as to provide maximum flexibility
to consuming models.";
leaf remote-address {
type inet:host;
mandatory true;
description
"The IP address or hostname of the remote peer to
establish a connection with. If a domain name is
configured, then the DNS resolution should happen on
each connection attempt. If the the DNS resolution
results in multiple IP addresses, the IP addresses
are tried according to local preference order until
a connection has been established or until all IP
addresses have failed.";
}
leaf remote-port {
type inet:port-number;
default "0";
description
"The IP port number for the remote peer to establish a
connection with. An invalid default value (0) is used
(instead of 'mandatory true') so that as application
level data model may 'refine' it with an application
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 18, head 19, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 19, head 20, lenght 2
[DBG]: LN: Session 1: sending message:
specific default port number value.";
}
leaf local-address {
if-feature "local-binding-supported";
type inet:ip-address;
description
"The local IP address/interface (VRF?) to bind to for when
connecting to the remote peer. INADDR_ANY ('0.0.0.0') or
INADDR6_ANY ('0:0:0:0:0:0:0:0' a.k.a. '::') MAY be used to
explicitly indicate the implicit default, that the server
can bind to any IPv4 or IPv6 addresses, respectively.";
}
leaf local-port {
if-feature "local-binding-supported";
type inet:port-number;
default "0";
description
"The local IP port number to bind to for when connecting
to the remote peer. The port number '0', which is the
default value, indicates that any available local port
number may be used.";
}
uses tcpcmn:tcp-connection-grouping {
augment "keepalives" {
if-feature "tcp-client-keepalives";
description
"Add an if-feat
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 20, head 21, lenght 1
[DBG]: LN: Session 1: sending message:
#135
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 22, head 21, lenght 2
[DBG]: LN: Session 1: sending message:
ure statement so that implementations
can choose to support TCP client keepalives.";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 23, head 21, lenght 3
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 21, head 22, lenght 2
[INF]: NP: Session 1: thread 3 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 24, head 22, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 25, head 22, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 26, head 22, lenght 5
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 22, head 23, lenght 4
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="21"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-common</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 23, head 24, lenght 3
[INF]: LY: Resolving unresolved data nodes and their constraints...
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 24, head 25, lenght 2
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-tcp-common" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 25, head 26, lenght 1
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 26, head 21, lenght 0
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="21"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-common {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-common";
prefix tcpcmn;
organization
"IETF NETCONF (Network Configuration) Working Group and the
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
&lt;http://datatracker.ietf.org/wg/tcpm/&gt;
WG List: &lt;mailto:[email protected]&gt;
&lt;mailto:[email protected]&gt;
Authors: Kent Watsen &lt;mailto:[email protected]&gt;
Michael Scharf
&lt;mailto:[email protected]&gt;";
description
"This module defines reusable groupings for TCP commons that
can be used as a basis for specific TCP common instances.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 0, head 0, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 0, head 22, lenght 0
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 0, head 0, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 1, head 0, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 2, head 0, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 0, head 1, lenght 2
[DBG]: LN: Session 1: sending message:
. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers";
}
feature keepalives-s
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 1, head 2, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 3, head 2, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 4, head 2, lenght 3
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 2, head 3, lenght 2
[DBG]: LN: Session 1: sending message:
upported {
description
"Indicates that keepalives are supported.";
}
grouping tcp-common-grouping {
description
"A reusable grouping for configuring TCP parameters common
to TCP connections as well as the operating system as a
whole.";
container keepalives {
if-feature "keepalives-supported";
presence "Indicates that keepalives are enabled.";
description
"Configures the keep-alive policy, to proactively test the
aliveness of the TCP peer. An unresponsive TCP peer is
dropped after approximately (idle-time * 60) + (max-probes
* probe-interval) seconds.";
leaf idle-time {
type uint16 {
range "1..max";
}
units "seconds";
mandatory true;
description
"Sets the amount of time after which if no data has been
received from the TCP peer, a TCP-level probe message
will be sent to test the aliveness of the TCP peer.";
}
leaf m
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 3, head 4, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 5, head 4, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 6, head 4, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 4, head 5, lenght 2
[DBG]: LN: Session 1: sending message:
#751
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 5, head 6, lenght 1
[DBG]: LN: Session 1: sending message:
ax-probes {
type uint16 {
range "1..max";
}
mandatory true;
description
"Sets the maximum number of sequential keep-alive probes
that can fail to obtain a response from the TCP peer
before assuming the TCP peer is no longer alive.";
}
leaf probe-interval {
type uint16 {
range "1..max";
}
units "seconds";
mandatory true;
description
"Sets the time interval between failed probes.";
}
}
}
grouping tcp-connection-grouping {
description
"A reusable grouping for configuring TCP parameters common
to TCP connections.";
uses tcp-common-grouping;
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 7, head 6, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 8, head 6, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 6, head 7, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 9, head 7, lenght 3
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 7, head 8, lenght 2
[INF]: NP: Session 1: thread 2 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 10, head 8, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 8, head 9, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: removed 9, head 10, lenght 1
[DBG]: LN: Session 1: received message:
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="22"><get-schema xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring"><identifier>ietf-tcp-server</identifier><version>2019-07-02</version><format>yang</format></get-schema></rpc>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 11, head 10, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[INF]: LN: Schema "ietf-tcp-server" was requested.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 10, head 11, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 12, head 11, lenght 2
[INF]: LY: Resolving unresolved data nodes and their constraints...
[INF]: LY: All data nodes and constraints resolved.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 11, head 12, lenght 1
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 13, head 12, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: Session 1: sending message:
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="22"><data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring">module ietf-tcp-server {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-tcp-server";
prefix tcps;
import ietf-inet-types {
prefix inet;
reference
"RFC 6991: Common YANG Data Types";
}
import ietf-tcp-common {
prefix tcpcmn;
reference
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers";
}
organization
"IETF NETCONF (Network Configuration) Working Group and the
IETF TCP Maintenance and Minor Extensions (TCPM) Working Group";
contact
"WG Web: &lt;http://datatracker.ietf.org/wg/netconf/&gt;
&lt;http://datatracker.ietf.org/wg/tcpm/&gt;
WG List: &lt;mailto:[email protected]&gt;
&lt;mailto:[email protected]&gt;
Authors: Kent Watsen &lt;mailto:[email protected]&gt;
Michael Scharf
&lt;mailto:[email protected]&gt;"
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 12, head 13, lenght 1
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 14, head 13, lenght 2
[DBG]: LN: Session 1: sending message:
;
description
"This module defines reusable groupings for TCP servers that
can be used as a basis for specific TCP server instances.
Copyright (c) 2019 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.;
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and on
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 15, head 13, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 13, head 14, lenght 2
[DBG]: LN: Session 1: sending message:
#1024
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 16, head 14, lenght 3
[DBG]: LN: Session 1: sending message:
ly when, they appear in all
capitals, as shown here.";
revision 2019-07-02 {
description
"Initial version";
reference
"RFC XXXX: YANG Groupings for TCP Clients and TCP Servers";
}
feature tcp-server-keepalives {
description
"Per socket TCP keepalive parameters are configurable for
TCP servers on the server implementing this feature.";
}
grouping tcp-server-grouping {
description
"A reusable grouping for configuring a TCP server.
Note that this grouping uses fairly typical descendent
node names such that a stack of 'uses' statements will
have name conflicts. It is intended that the consuming
data model will resolve the issue (e.g., by wrapping
the 'uses' statement in a container called
'tcp-server-parameters'). This model purposely does
not do this itself so as to provide maximum flexibility
to consuming models.";
leaf local-address {
type inet:ip-address;
mandatory true;
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: removed 14, head 15, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 17, head 15, lenght 3
[DBG]: LN: Session 1: sending message:
#984
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: removed 15, head 16, lenght 2
[DBG]: LN: Session 1: sending message:
description
"The local IP address to listen on for incoming
TCP client connections. INADDR_ANY (0.0.0.0) or
INADDR6_ANY (0:0:0:0:0:0:0:0 a.k.a. ::) MUST be
used when the server is to listen on all IPv4 or
IPv6 addresses, respectively.";
}
leaf local-port {
type inet:port-number;
default "0";
description
"The local port number to listen on for incoming TCP
client connections. An invalid default value (0)
is used (instead of 'mandatory true') so that an
application level data model may 'refine' it with
an application specific default port number value.";
}
uses tcpcmn:tcp-connection-grouping {
augment "keepalives" {
if-feature "tcp-server-keepalives";
description
"Add an if-feature statement so that implementations
can choose to support TCP server keepalives.";
}
}
}
}
</data></rpc-reply>
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: removed 16, head 17, lenght 1
[DBG]: LN: Session 1: sending message:
##
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548438430128 queue: added 18, head 17, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: removed 17, head 18, lenght 1
[INF]: NP: Session 1: thread 1 event new RPC.
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 19, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 21, head 18, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 18, lenght 5
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 19, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 21, head 18, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 18, lenght 5
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 19, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 21, head 18, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 18, lenght 5
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 19, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 21, head 18, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 22, head 18, lenght 5
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548463608240 queue: added 19, head 18, lenght 2
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548446822832 queue: added 20, head 18, lenght 3
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548494505280 queue: added 21, head 18, lenght 4
[DBG]: LN: PS 0x0x55ac1b33a0 TID 548455215536 queue: added 22, head 18, lenght 5
^C[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
[ERR]: LN: nc_ps_poll: failed to wait for a pollsession condition (Connection timed out).
QEMU: Terminated
qemu-system-microblazeel: /pmu@0: Disconnected clk=360237247674 ns
brchiu@APPASSIONATA:~/rdf0476-zcu111-rf-dc-eval-tool-2019-1/apu/rfsoc_petalinux_bsp/pre-built/linux/images$
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment